Discover the new Windows Server 2025 with EDV-Solutions

Welcome to the future of server management! With Windows Server 2025, Microsoft presents a revolutionary platform that takes your IT infrastructure to the next level. At EDV-Solutions, we are proud to offer you this groundbreaking technology.

Windows Server 2025: The latest features and improvements

1. improved system monitoring and logging

  • Real-time performance data: Monitor CPU, memory, network traffic and memory usage in real time.
  • Centralized logging: All system events are logged centrally to enable in-depth analyses.

2. Intelligent backup and restore system

  • Machine learning: Optimization of backup schedules and storage space through the use of AI.
  • Automatic data deduplication: Reduction of storage space requirements through automatic deduplication and compression.

3. Container integration with Kubernetes

  • Improved support: Seamless integration and management of container workloads with Kubernetes.

4. Advanced network security functions

  • Shielded VMs: Improved security functions for virtual machines.
  • Advanced network security options: Additional security measures for your network.

5. Optimiertes Storage Management mit SMB Direct

  • Faster storage options: Optimized storage management for better performance and efficiency.

6. Extended support for edge computing

  • Simplified deployments: Support for workgroup clusters and extended edge scenarios.

7. Active Directory-Domänendienste

  • Improvements to AD DS and AD LDS: Introduction of a 32k database page size for better scalability and performance.

File servers are the most widely used servers in the world

Windows Server file servers host billions of files for millions of customers and enable file storage and retrieval with built-in scaling. Security, quotas, backup, replication and recovery are all built into the operating system.

Active Directory Domain Service

Active Directory Domain Services host and authenticate billions of local user identities for millions of customers to securely manage identities and protect your organization.

Hosting of old and new applications

Windows Server hosts millions of apps - from simple IIS web apps to complex applications such as SharePoint, Exchange, databases and third-party products - and provides built-in security, high availability and replication for servers and clusters.

Hosting of Windows and Linux VMs and containers

Hosts Hyper-V virtual machines via Windows Server containers, Linux containers and Kubernetes clusters and supports integration with native Azure services.

 

Implementation of a secure hybrid network

This reference architecture shows a secure hybrid network that extends a local network in Azure. The architecture implements a perimeter network, also known as a DMZ, between the local network and an Azure virtual network. All incoming and outgoing data traffic passes through the Azure firewall.

Components

The architecture comprises the following components:

  • Local network. A private local network within an organization.
  • Azure virtual network. The virtual network hosts the solution components and other resources that run in Azure.

    Virtual network routes define the IP traffic flow within the Azure virtual network. There are two user-defined routing tables, as shown in the diagram.

    In the gateway subnet, the data traffic is forwarded via the Azure Firewall instance.  -

  • Gateway: The gateway provides connections between the routers in the local network and the virtual network. The gateway is located in its own subnet.
  • Azure Firewall. The Azure Firewall is a managed firewall that is used as a service. The firewall instance is located in its own subnet.
  • Network security groups.  Use Security groups, to restrict network data traffic in the virtual network.
  • Azure BastionAzure Bastion allows you to log in to the virtual computers (VMs) in the virtual network via SSH or RDP (Remote Desktop Protocol) without making the VMs directly available on the Internet. You can use Bastion to manage the VMs in the virtual network.

Possible use cases

This architecture requires a connection to your local data center, either using a VPN gateway or an ExpressRoute connection. Typical applications for this architecture are

  • Hybrid applications in which workloads are executed partly locally and partly in Azure.
  • Infrastructure that requires differentiated control of data traffic coming from a local data center into a virtual Azure network.
  • Applications that need to monitor outgoing traffic. Monitoring is a requirement of many commercial systems, often due to government regulations, and can help prevent the disclosure of private information.

Recommendations for access control

Use role-based access control in Azure (Azure Role-Based Access Control, Azure RBAC) to manage the resources in your application. Consider creating the following custom roles:

  • A DevOps role with permissions to manage the infrastructure for the application, to deploy the application components and to monitor and restart VMs.
  • A central IT administrator role for managing and monitoring network resources.
  • An IT security administrator role to manage the secure network resources, such as the firewall.

The IT administrator role should not have access to the firewall resources. Access should be restricted to the IT security administrator role.

Recommendations for resource groups

Azure resources such as VMs, virtual networks and load balancing modules can be easily managed by grouping them into resource groups. Assign Azure roles to each resource group to restrict access.

It is advisable to create the following resource groups:

  • A resource group that contains the virtual network (without the VMs), the network security groups and the gateway resources for connecting to the local network. Assign the central IT administrator role to this resource group.
  • A resource group that contains the VMs for the Azure Firewall instance and custom routes for the gateway subnet. Assign the IT security administrator role to this resource group.
  • Separate resource groups for each virtual spoke network containing the load balancer and the VMs.

Network recommendations

To allow inbound traffic from the Internet, add a Destination Network Address Translation (DNAT) rule to the Azure Firewall.

  • Destination address = public IP address of the firewall instance
  • Translated address = private IP address within the virtual network

Use tunnel enforcement for all outgoing Internet traffic through your local network by using a site-to-site VPN tunnel and use Network Address Translation (NAT) for routing to the Internet. This design prevents the accidental disclosure of any confidential information while allowing all outbound traffic to be inspected and monitored.

Do not completely block internet traffic from the resources in the subnets of the spoke network. Blocking traffic will prevent these resources from using Azure PaaS services that rely on public IP addresses, such as VM diagnostic logging, downloading VM extensions, and other functions. Azure Diagnostics also requires components to have read and write access to an Azure Storage account.

Check that outgoing Internet traffic is properly tunneled. If you are using a VPN connection with the routing and RAS service on a local server, use a tool such as WireShark.

Recommendations

These considerations are based on the pillars of the Azure Well-Architected Framework, a set of principles that can improve the quality of workloads. For more information, see Microsoft Azure Well-Architected Framework.

Efficient performance

Performance efficiency is the ability of your workload to efficiently scale to meet user requirements. For more information, see Overview of the "Performance efficiency" pillar.

For more information about VPN Gateway bandwidth limits, see Gateway SKUs. For larger bandwidths, you can consider upgrading to an ExpressRoute gateway. ExpressRoute provides up to 10 Gb/s bandwidth with less latency than a VPN connection.

For more information about the scalability of Azure gateways, see the scalability sections at:

  • Implementing a secure hybrid network architecture with Azure and local VPN
  • Implementing a secure hybrid network architecture with Azure ExpressRoute

For detailed information on managing virtual networks and NSGs on a large scale, see Tutorial: Creating a protected hub-and-spoke network.

Security

Security offers protection against deliberate attacks and the misuse of your valuable data and systems. You can find more information under Overview of the "Security" pillar.

This reference architecture implements several levels of security.

Route all local user requests through an Azure Firewall

The user-defined route in the gateway subnet blocks all user requests that do not originate from the local network. The route forwards permitted requests to the firewall. The requests are forwarded to the resources in the virtual spoke networks if they are permitted by the firewall rules. You can add more routes, but make sure that they do not inadvertently bypass the firewall or block management traffic for the management subnet.
 

Using NSGs to block/pass traffic to virtual network networks

Traffic to and from resource subnets in virtual spoke networks is restricted by the use of NSGs. If you have a need to extend the NSG rules to allow wider access to these resources, weigh these needs against the security risks. Each new inbound communication path represents an opportunity for accidental or intentional disclosure of data or corruption of applications.

Basic security Administrative rules

AVNM allows you to create baselines for security rules that can take precedence over network security group rules.Security management rules are evaluated before NSG rules and have the same nature as NSGs, with support for prioritization, service tags and L3-L4 protocols. This allows central IT to enforce basic security rules that are independent of additional NSG rules from Spoke-VNet owners. To facilitate a controlled rollout of security rule changes, you can use AVNM's Deployments feature to securely release the breaking changes of these configurations in the hub-and-spoke environments.
 

DevOps-Access

Use Azure RBAC to restrict the operations that DevOps can perform at each level. Use the least privilege approach when granting permissions. Log all management operations and perform regular monitoring to ensure that all configuration changes are based on planning.

Cost optimization

Cost optimization is about finding ways to reduce unnecessary expenditure and improve operational efficiency.

Integrated DNS and DHCP services

Provide local DNS and DHCP services to millions of customers.

 

Licensing