Azure Administrator Associate (AZ-104)
1 Manage Azure identities and governance
1-1 Manage Azure AD objects
1-2 Manage role-based access control (RBAC)
1-3 Manage subscriptions and governance
2 Implement and manage storage
2-1 Manage storage accounts
2-2 Manage blob storage
2-3 Manage disk storage
2-4 Manage file shares
2-5 Implement Azure Backup
3 Deploy and manage Azure compute resources
3-1 Manage virtual machines (VMs)
3-2 Manage VM extensions
3-3 Manage virtual machine scale sets (VMSS)
3-4 Manage Azure App Services
3-5 Manage Azure Container Instances (ACI)
3-6 Manage Azure Kubernetes Service (AKS)
4 Configure and manage virtual networking
4-1 Manage Azure virtual networks
4-2 Manage network security groups (NSGs)
4-3 Manage Azure DNS
4-4 Manage Azure load balancers
4-5 Manage Azure Application Gateway
4-6 Manage Azure VPN Gateway
4-7 Manage Azure ExpressRoute
4-8 Manage Azure Traffic Manager
4-9 Manage Azure Content Delivery Network (CDN)
5 Monitor and back up Azure resources
5-1 Monitor resources using Azure Monitor
5-2 Implement and manage Azure Backup
5-3 Implement and manage Azure Site Recovery
5-4 Implement and manage Azure Security Center
5-5 Implement and manage Azure Update Management
Manage Storage Accounts

Manage Storage Accounts

Storage accounts in Azure provide a unique namespace to store and access your data objects. They offer a range of storage solutions including blobs, files, queues, tables, and disks. Understanding how to manage these accounts is essential for efficient data management in Azure.

Key Concepts

Storage Account Types

Azure offers several types of storage accounts, each designed for specific scenarios:

Replication Options

Replication options ensure your data is durable and available:

Access Tiers

Access tiers help optimize storage costs based on data access patterns:

Security Features

Azure provides several security features to protect your data:

Conclusion

Managing storage accounts in Azure involves understanding and leveraging various types, replication options, access tiers, and security features. By carefully selecting and configuring these elements, you can optimize storage costs, ensure data durability and availability, and maintain robust security practices.