Preparing to AZ-303

7 minute read

Topics to cover for exam AZ-303 Microsoft Azure Architect Technologies

Microsoft checks following areas in the exam.

  • Implement and monitor an Azure infrastructure (50-55%)
  • Implement management and security solutions (25-30%)
  • Implement solutions for apps (10-15%)
  • Implement and manage data platforms (10-15%)

Percentages are the relative weighting of the subject area in the exam. It seems that the emphasis is heavily on Azure infrastructure.

Detailed list can be found in this pdf report.

🎯 Prepare for topic: Implement and monitor an Azure infrastructure

Azure Infrastructure related Microsoft Learn learning paths:

Architect network infrastructure in Azure: 12 modules to learn architect a secure, flexible, network infrastructure in Azure and connect on-premises networks to Azure resources. Before starting the learning path you should be familiar with network concepts such as: VPN, IP addressing and routing. A good book (pdf) to learn these concepts is Azure Networking Cookbook by Mustafa Toroman.

Azure documentation related to Implement and monitor and Azure infrastructure topics is covered in more details below.

Implement cloud infrastructure monitoring

  • monitor security
  • monitor performance
  • monitor health and availability
  • monitor cost
  • configure advanced logging
  • initiate automated responses by using Action Groups
  • configure and manage advanced alerts

Implement storage accounts

  • select storage account options based on a use case
  • configure Azure Files and Azure Blob storage
  • configure network access to the storage account
  • implement Shared Access Signatures and access policies
  • implement Azure AD authentication for storage
  • manage access keys
  • implement Azure storage replication
  • implement Azure storage account failover

Implement VMs for Windows and Linux

  • configure high availability
  • configure storage for VMs
  • select virtual machine size
  • implement Azure Dedicated Hosts
  • deploy and configure Virtual Machine Scale Sets
  • configure Azure Disk Encryption

Automate deployment and configuration of resources

  • save a deployment as an Azure Resource Manager template
  • modify Azure Resource Manager template (JSON and Bicep)
  • evaluate location of new resources
  • configure a VHD image
  • deploy from an image
  • manage an image library
  • create and execute an Azure Automation runbook

🎯 Implement virtual networking

Learn about subnetworks:

Related Azure services

Azure-Virtual-Networks Azure Virtual Network

Azure-Virtual-Machines Azure Virtual Machines

Azure VPN Gateway Azure VPN Gateway

✔ Implement VNet to VNet connections

Connecting a virtual network to another virtual network (VNet-to-VNet) is similar to connecting a VNet to an on-premises site location. Both connectivity types use a VPN gateway to provide a secure tunnel using IPsec/IKE.

vnet-to-vnet

✔ Azure VPN gateways

A VPN gateway is a specific type of virtual network gateway that is used to send encrypted traffic between networks over the public Internet.

  • The VNet gateway uses specific subnet called the gateway subnet.
  • Each VNet can have two VNet gateways; one VPN gateway and one ExpressRoute gateway.
  • VNet can have only one VPN gateway.
  • VPN gateway supports multiple connections.
  • Gateway SKU defines what kind of workloads, throughputs, features, and SLAs are supported. Use Virtual WAN for more than 30 S2S VPN tunnels.
    • Basic VPN Gateway supports max. 10 S2S or Vnet-to-Vnet tunnels and it should only be used for Dev/Test workloads.
    • VpnGW1/Az, VpnGW2/Az and VpnGW3/Az SKU supports max 30 tunnels. There are two VPN types: PolicyBased and RouteBased. PolicyBased is supported only with Basic gateway SKU. PolicyBased VPNs supports only S2S connections, and only for certain configurations. Most VPN Gateway configurations require a RouteBased VPN.

PolicyBased VPN

  • Supports only IKEv1 which is deprecating.
  • Uses static routing.
  • Used usually for compatibility with legacy on-premises VPN devices.

RouteBased VPN

  • Supports IKEv2.
  • Uses any-to-any (wildcard) traffic selectors.
  • Can use dynamic routing protocols.

Use RouteBased VPN type for:

  • Connections between virtual networks.
  • Point-to-site connections.
  • Multisite connections.
  • Coexistence with an Azure ExpressRoute gateway.

High availability for VPN Gateways

VPN gateway connectivity scenarios

  • Connect Azure VNet to other Azure VNet through a network-to-network connection.

  • Connect on-premise to Azure VNet through a site-to-site (S2S) VPN connection between two endpoints that are located on the public Internet. Site-to-site VPN connection is terminated by a VPN device on the on-premises network and an Azure VPN gateway on the Azure virtual network. VPN device in local network is configured with a shared key and public IP address of VNet gateway. Site-to-Site connection.

  • Connect individual devices to Azure VNet through a point-to-site (P2S) connection. P2S connection requires a RouteBased VPN type.

Learn more

✔ Implement VNet peering

You can connect virtual networks to each other with virtual network peering. Once virtual networks are peered, resources in both virtual networks can communicate with each other using private IP addresses.

Connectivity scenarios that VNet peering supports:

  • VNets in different Azure regions for example between VNet1 in Nort Europe data center and VNet2 in West Europe datacenter.
  • VNets in two different subsriptions.
  • VNets in two different Azure AD tenants.

🚩 NOTE

to connect the networks by using virtual network peering, you have to create connections in each virtual network - both ways from VNet1 -> VNet2 and VNet2 -> VNet1. To maintain VNet peering configurations user needs at least Network Contributor RBAC role on the VNet.

overlapping address spaces

❌ WARNING

Do not overlapp address spaces. IP address spaces of connected Azure VNets and on-premises must not overlap. This is also true for peered virtual networks. Otherwise there will be pain and crying.

Share on-premise connecitivity between VNets

Transitive connections to on-premise with Azure VPN gateway transit: configure the Allow gateway transit option in the hub VNet with on-premise gateway. Also configure the Use remote gateways option in any spoke virtual networks. See how-to configure VPN gateway transit for virtual network peering with hub-spoke architecture in Azure. peering with gateway transit

Learn more

Implement Azure Active Directory

  • add custom domains
  • configure Azure AD Identity Protection
  • implement self-service password reset
  • implement Conditional Access including MFA
  • configure fraud alerts
  • configure verification methods
  • implement and manage guest accounts
  • manage multiple directories

Implement and manage hybrid identities

  • install and configure Azure AD Connect
  • identity synchronization options
  • configure and manage password sync and password writeback
  • configure single sign-on
  • configure Azure AD Connect cloud sync
  • use Azure AD Connect Health

🎯 Prepare for topic: Implement Management and Security Solutions

Manage workloads in Azure

  • migrate workloads using Azure Migrate
  • implement Azure Backup for Azure workloads
  • implement disaster recovery
  • implement Azure Automation Update Management

Implement load balancing

Implement network security

Implement Azure Load Balancer

implement an Azure Application Gateway

implement Web Application Firewall

implement Azure Firewall

implement Azure Firewall Manager

implement Azure Front Door

implement Azure Traffic Manager

🎯 Implement Network Security Groups

Related Azure Services

Azure-Network-Security-Group-icon Azure Network Security Group (NSG) is used to filter network traffic to and from Azure resources in an Azure virtual network.

Network security groups are assigned to a network interface of a VM or a subnet.

NSG assignment

Security Rules

  • NSG security rules are evaluated by priority, using the 5-tuple information (source, source port, destination, destination port, and protocol).
  • On first rule match further processing stops.
  • Rules can allow or deny traffic.
  • Augmented rules are used to simplify management of large number of rules.
  • Service tags are used to control traffic to Azure service type globally or specific region. Service Tags

Learn more

Implement Application Security Groups

Related Azure Services

Azure-Application-Security-Group-icon Azure Application Security Group (ASG) allowes grouping of virtual machines and define network security policies based on those groups.

Learn more

implement Bastion

Implement and manage Azure governance solutions

  • create and manage hierarchical structure that contains management groups, subscriptions and resource groups
  • assign RBAC roles
  • create a custom RBAC role
  • configure access to Azure resources by assigning roles
  • configure management access to Azure
  • interpret effective permissions
  • set up and perform an access review
  • implement and configure Azure Policy
  • implement and configure Azure Blueprints

Manage security for applications

  • implement and configure Key Vault
  • implement and configure Managed Identities
  • register and manage applications in Azure AD

See also

Updated: