- 11 переглядів
Overview
Fabrikam, Inc is a manufacturing company that has a main office in New York and a branch office in Seattle.
Existing Environment
On-premises Servers
The on-premises network contains servers that run Windows Server as shown in the following table.
DC1 hosts all the operation master roles.
WEB1 and WEB2 run an Internet Information Services (IIS) web app named Webapp1.
On-premises Network
The New York and Seattle offices are connected by using redundant WAN links.
The client computers in each office get IP addresses from their local DHCP server.
DHCP1 contains a scope named Scope1 that has addresses for the New York office, DHCP2 contains a scope named Scope2 that has addresses for the Seattle office.
Identity Infrastructure
The network contains a single on-premises Active Directory Domain Services (AD DS) domain named corp.falbrikam.com. Currently, all the service accounts use individual domain user accounts.
All domain controllers have the DNS Server role installed and host a copy of the Active Directory integrated DNS zone of corp.fabrikam.com.
The corp.fabrikam.com AD DS domain syncs with an Azure Active Directory (Azure AD) tenant.
Group Policy Objects (GPOs)
The corp.fabrikam.com domain contains the organizational units (OUs) and custom Group Policy Objects (GPOs) shown in the following table.
Requirements
Planned Changes
Fabrikam identifies the following planned changes:
-Create a single Azure subscription named Sub1 that will contain a single Azure virtual network named Vnet1.
-Replace the WAN links between the Seattle and New York offices by using Azure Virtual WAN and FxpressRoute. Both on premises offices will be connected to Vnet1 by using ExpressRoute.
-Create three Azure file shares named newyorkhiles, seattlefiles, and companyfiles.
-Create a domain controller named dc3.corp.fabrikam.com in Vnet1.
-Deploy an Azure Virtual Desktop host pool to Vnet1. The Azure Virtual Desktop session hosts will be hybrid Azure AD-joined.
-License all servers for Microsoft Defender for servers.
-Use Azure Policy to enforce configuration management policies on the servers in Azure and on-premises.
Networking Requirements
Fabrikam identifies the following networking requirements:
-Implement Virtual WAN and ensure that all the network traffic between the sites uses Virtual WAN. All communications must occur over ExpressRoute.
-If a DHCP server fails, ensure that the client computers can continue to receive their dynamic IP address and renew their existing lease.
-Ensure that the resources in Vnet1 can resolve the names of the on-premises servers in the corp.fabrikam.com domain.
Security Requirements
Fabrikam identifies the following security requirements:
-Apply GPO4 to the Azure Virtual Desktop session hosts. Ensure that Azure Virtual Desktop user sessions lock after being idle for 10 minutes. Users must be able to control the lockout time manually from their client computer.
-Ensure that server administrators request approval before they can establish a Remote Desktop connection to an Azure virtual machine. If the request is approved, the connection must be established within two hours.
-Prevent user passwords from containing all or part of words that are based on the company name, such as Fab, f@br1kAm or fabr!|.
-Ensure that all instances of Webapp1 use the same service account. The password of the service account must change automatically every 30 days.
-Prevent domain controllers from directly contacting hosts on the internet.
File Sharing Requirements
You need to configure the synchronization of Azure files to meet the following requirements:
-Ensure that seattlefiles syncs to FS2.
-Ensure that newyorkfiles syncs to FS1.
-Ensure that companyfiles syncs to both FS1 and FS2.
You need to configure the Group Policy settings to ensure that the Azure Virtual Desktop session hosts meet the security requirements.
What should you configure?
- A. loopback processing in GPO4
- B. security filtering for the link of GPO1
- C. loopback processing in GPO1
- D. the Enforced property for the link of GPO4
- E. the Enforced property for the link of GPO1
- F. security filtering for the link of GPO4
- A. loopback processing in GPO4
The suggested answer is correct
- Apply GPO4 to the Azure Virtual Desktop session hosts. Ensure that Azure Virtual Desktop user sessions lock after being idle for 10 minutes. Users must be able to control the lockout time manually from their client computer.
johosofat
Highly Voted 2 years ago
Selected Answer: A
There is some complexity around this choice- for eample the VMS are hybrid-joined and this opens the door to other policies coming into play- but in a very narrow band- i did find that loopback processing is common for VDI deployments- i decided to just go for that basic answer and move on- but this may need a more detailed explanation - https://anthonyfontanez.com/index.php/2021/10/11/group-policy-loopback-processing-done-correctly/
upvoted 5 times
MR_Eliot
Most Recent 1 year, 2 months ago
Selected Answer: A
A seems the most logical answer to the question. Since OU4 only contains AVD computer accounts, no need for security filtering.
upvoted 2 times
syu31svc
1 year, 8 months ago
Enforced means that the GPO must be applied so D and E are out Security filtering means who can apply a GPO https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo So B and F are out A would be the answer since it is for GPO4
upvoted 4 times
Leocan
2 years ago
In some cases, users may need policy applied to them based on the location of the computer object alone. You can use the Group Policy loopback feature to apply Group Policy Objects (GPOs) that depend only on which computer the user signs in to. https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/loopback-processing-of-group-policy
upvoted 2 times
edykss
2 years, 1 month ago
Answer A is correct
upvoted 3 times