You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-windows-vm.md
+20-25Lines changed: 20 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: domain-services
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 10/30/2019
11
+
ms.date: 02/19/2020
12
12
ms.author: iainfou
13
13
14
14
#Customer intent: As an server administrator, I want to learn how to join a Windows Server VM to an Azure Active Directory Domain Services managed domain to provide centralized identity and policy.
@@ -21,7 +21,7 @@ In this tutorial, you learn how to:
21
21
22
22
> [!div class="checklist"]
23
23
> * Create a Windows Server VM
24
-
> * Connect to the Windows Server VM to an Azure virtual network
24
+
> * Connect the Windows Server VM to an Azure virtual network
25
25
> * Join the VM to the Azure AD DS managed domain
26
26
27
27
If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -38,6 +38,8 @@ To complete this tutorial, you need the following resources:
38
38
* If needed, [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
39
39
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
40
40
* Make sure that Azure AD Connect password hash synchronization or self-service password reset has been performed so the account is able to sign in to Azure AD DS managed domain.
41
+
* An Azure Bastion host deployed in your Azure AD DS virtual network.
42
+
* If needed, [create an Azure Bastion host][azure-bastion].
41
43
42
44
If you already have a VM that you want to domain-join, skip to the section to [join the VM to the Azure AD DS managed domain](#join-the-vm-to-the-azure-ad-ds-managed-domain).
43
45
@@ -67,13 +69,13 @@ If you already have a VM that you want to domain-join, skip to the section to [j
67
69
| Username | Enter a username for the local administrator account to create on the VM, such as *azureuser*|
68
70
| Password | Enter, and then confirm, a secure password for the local administrator to create on the VM. Don't specify a domain user account's credentials. |
69
71
70
-
1. By default, VMs created in Azure aren't accessible from the Internet. This configuration helps improve the security of the VM and reduces the area for potential attack. In the next step of this tutorial, you need to connect to the VM using remote desktop protocol (RDP) and then join the Windows Server to the Azure AD DS managed domain.
72
+
1. By default, VMs created in Azure are accessible from the Internet using RDP. When RDP is enabled, automated sign in attacks are likely to occur, which may disable accounts with common names such as *admin* or *administrator* due to multiple failed successive sign in attempts.
71
73
72
-
When RDP is enabled, automated sign in attacks are likely to occur, which may disable accounts with common names such as *admin* or *administrator* due to multiple failed successive sign in attempts. RDP should only be enabled when required, and limited to a set of authorized IP ranges. [Azure Just In Time VM access][jit-access] as part of Azure Security Center can enable these short-lived, restricted RDP sessions. You can also [create and use an Azure Bastion host (currently in preview)][azure-bastion] to allow access only through the Azure portal over SSL.
74
+
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Azure portal over SSL. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
73
75
74
-
For this tutorial, manually enable RDP connections to the VM.
76
+
For now, disable direct RDP connections to the VM.
75
77
76
-
Under **Public inbound ports**, select the option to **Allow selected ports**. From the drop-down menu for **Select inbound ports**, choose *RDP (3389)*.
78
+
Under **Public inbound ports**, select *None*.
77
79
78
80
1. When done, select **Next: Disks**.
79
81
1. From the drop-down menu for **OS disk type**, choose *Standard SSD*, then select **Next: Networking**.
@@ -117,20 +119,23 @@ It takes a few minutes to create the VM. The Azure portal shows the status of th
117
119
118
120
## Connect to the Windows Server VM
119
121
120
-
Now let's connect to the newly created Windows Server VM using RDP and join the Azure AD DS managed domain. Use the local administrator credentials that you specified when the VM was created in the previous step, not any existing domain credentials.
122
+
To securely connect to your VMs, use an Azure Bastion host. With Azure Bastion, a managed host is deployed into your virtual network and provides web-based RDP or SSH connections to VMs. No public IP addresses are required for the VMs, and you don't need to open network security group rules for external remote traffic. You connect to VMs using the Azure portal from your web browser.
123
+
124
+
To use a Bastion host to connect to your VM, complete the following steps:
125
+
126
+
1. In the **Overview** pane for your VM, select **Connect**, then **Bastion**.
121
127
122
-
1. In the **Overview** pane, select **Connect**.
128
+

123
129
124
-

130
+
1. Enter the credentials for your VM that you specified in the previous section, then select **Connect**.
125
131
126
-
1. Select the option to *Download RDP File*. Save this RDP file in your web browser.
127
-
1. To connect to your VM, open the downloaded RDP file. If prompted, select **Connect**.
128
-
1. Enter the local administrator credentials you entered in the previous step to create the VM, such as *localhost\azureuser*
129
-
1. If you see a certificate warning during the sign in process, select **Yes** or **Continue** to connect.
132
+

133
+
134
+
If needed, allow your web browser to open pop-ups for the Bastion connection to be displayed. It takes a few seconds to make the connection to your VM.
130
135
131
136
## Join the VM to the Azure AD DS managed domain
132
137
133
-
With the VM created and an RDP connection establish, now let's join the Windows Server virtual machine to the Azure AD DS managed domain. This process is the same as a computer connecting to a regular on-premises Active Directory Domain Services domain.
138
+
With the VM created and a web-based RDP connection established using Azure Bastion, now let's join the Windows Server virtual machine to the Azure AD DS managed domain. This process is the same as a computer connecting to a regular on-premises Active Directory Domain Services domain.
134
139
135
140
1. If **Server Manager** doesn't open by default when you sign in to the VM, select the **Start** menu, then choose **Server Manager**.
136
141
1. In the left pane of the **Server Manager** window, select **Local Server**. Under **Properties** on the right pane, choose **Workgroup**.
@@ -171,23 +176,14 @@ Once the Windows Server VM has restarted, any policies applied in the Azure AD D
171
176
172
177
## Clean up resources
173
178
174
-
In the next tutorial, you use this Windows Server VM to install the management tools that let you administer the Azure AD DS managed domain. If you don't want to continue in this tutorial series, review the following clean up steps to [disable RDP](#disable-rdp) or [delete the VM](#delete-the-vm). Otherwise, [continue to the next tutorial](#next-steps).
179
+
In the next tutorial, you use this Windows Server VM to install the management tools that let you administer the Azure AD DS managed domain. If you don't want to continue in this tutorial series, review the following clean up steps to [delete the VM](#delete-the-vm). Otherwise, [continue to the next tutorial](#next-steps).
175
180
176
181
### Un-join the VM from Azure AD DS managed domain
177
182
178
183
To remove the VM from the Azure AD DS managed domain, follow through the steps again to [join the VM to a domain](#join-the-vm-to-the-azure-ad-ds-managed-domain). Instead of joining the Azure AD DS managed domain, choose to join a workgroup, such as the default *WORKGROUP*. After the VM has rebooted, the computer object is removed from the Azure AD DS managed domain.
179
184
180
185
If you [delete the VM](#delete-the-vm) without unjoining from the domain, an orphaned computer object is left in Azure AD DS.
181
186
182
-
### Disable RDP
183
-
184
-
If you continue to use the Windows Server VM created in this tutorial for running your own applications or workloads, recall that RDP was open over the Internet. To improve the security and reduce the risk of attack, RDP should be disabled over the Internet. To disable RDP to the Windows Server VM over the internet, complete the following steps:
185
-
186
-
1. From the left-hand menu, select **Resource groups**
187
-
1. Choose your resource group, such as *myResourceGroup*.
188
-
1. Choose your VM, such as *myVM*, then select *Networking*.
189
-
1. Under **Inbound network security rules** for the network security group, select the rule that allows RDP, then choose **Delete**. It takes a few seconds to remove the inbound security rule.
190
-
191
187
### Delete the VM
192
188
193
189
If you're not going use this Windows Server VM, delete the VM using the following steps:
@@ -246,6 +242,5 @@ To administer your Azure AD DS managed domain, configure a management VM using t
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-create-management-vm.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,8 @@ To complete this tutorial, you need the following resources and privileges:
42
42
* A Windows Server VM that is joined to the Azure AD DS managed domain.
43
43
* If needed, see the previous tutorial to [create a Windows Server VM and join it to a managed domain][create-join-windows-vm].
44
44
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
45
+
* An Azure Bastion host deployed in your Azure AD DS virtual network.
46
+
* If needed, [create an Azure Bastion host][azure-bastion].
45
47
46
48
## Sign in to the Azure portal
47
49
@@ -82,16 +84,15 @@ In the previous tutorial, a Windows Server VM was created and joined to the Azur
82
84
To get started, connect to the Windows Server VM as follows:
83
85
84
86
1. In the Azure portal, select **Resource groups** on the left-hand side. Choose the resource group where your VM was created, such as *myResourceGroup*, then select the VM, such as *myVM*.
85
-
1. In the **Overview**windows of the VM, select **Connect**.
87
+
1. In the **Overview**pane for your VM, select **Connect**, then **Bastion**.
86
88
87
-

89
+

88
90
89
-
You can also [create and use an Azure Bastion host (currently in preview)][azure-bastion] to allow access only through the Azure portal over SSL.
91
+
1. Enter the credentials for your VM, then select **Connect**.
90
92
91
-
1. Select the option to *Download RDP File*. Save this RDP file in your web browser.
92
-
1. To connect to your VM, open the downloaded RDP file. If prompted, select **Connect**.
93
-
1. Enter the credentials of a user that's part of the *Azure AD DC administrators* group, such as *contoso\dee*
94
-
1. If you see a certificate warning during the sign in process, select **Yes** or **Continue** to connect.
93
+

94
+
95
+
If needed, allow your web browser to open pop-ups for the Bastion connection to be displayed. It takes a few seconds to make the connection to your VM.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-config-problem-wrong-users-provisioned.md
0 commit comments