Administrator Guide
Table Of Contents
- Dell Hybrid Cloud System for Microsoft Cloud Platform System Standard Version 1.5 Administrators Guide based on release 1803
- Overview
- Administration
- What to do first
- Next steps
- Managing Dell Hybrid Cloud System for Microsoft
- Creating tenant VM networks
- Adding tenant VM networks to the cloud
- Flagging the operating system VHD in the VM templates
- Enabling guest-specified IP addresses in VMM
- Creating additional tenant storage shares
- Using Windows Azure Pack
- Default Windows Azure Pack configuration
- Before you go into production
- Setting up tenant portal access on an isolated network
- Replacing self-signed certificates
- Disabling the tenant AuthSite and the admin Windows AuthSite websites
- Updating to a Security Token Service and re-establishing trust
- How to open the management portal for administrators
- How to open the management portal for tenants
- Offering services to tenants
- Optional configuration
- Automating tasks for efficiency
- Windows Azure Pack API reference content for developers
- Configuring disaster recovery protection
- Operations
- Monitoring
- Backup and recovery
- Onboard to Azure Backup
- Default backup schedule and retention policy
- DPM protection groups
- Disable machine account password rotation on management VMs
- Protecting tenant VMs
- Recovering VMs and databases—high level
- Recovering from management component failures
- Recovering a tenant VM
- Recovering DPM from DPM failures
- Adding extra disks to DPM
- Monitoring DPM
- Using the Dell Hybrid Cloud System for Microsoft data consistency runbooks
- Updating the Dell Hybrid Cloud System for Microsoft
- Shutting down and starting up the stamp
- Security
- Appendix A Expanding the stamp
- Appendix B Performing a factory reset
- Appendix C Retrieving cluster names, host names, and IP addresses
- Appendix D Ports and protocols

• If you are using certica
tes that are registered at the website level, copy the folder tree from the share that you created in Step 1
to this new share, and then use the guidance in the next step to replace the existing .pfx les in the folder tree with the new ones.
You could also create a similar folder tree in the new share, instead of copying the folder tree.
3 Prepare the
\\<
Prex
>CON01>\ImportCerts le share with the new .pfx certicates. You can specify only one .pfx le per folder.
Depending on the certicates that you have, do one of the following:
• If you have a wildcard certica
te for the domain (for example, *.contoso.com), you only need to copy the .pfx le to the share,
for example:
\\<Prex>CON01\ImportCerts\contoso.com.pfx. This layout is the quickest way to update all websites with the same
SSL certicate.
• You can also add the .pfx
les at the VM level. For example:
\\<Prefix>CON01\ImportCerts
\MgmtSvc-AdminAPI
\<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-AdminSite
\<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-AuthSite
<Prefix>APT01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-Monitoring
\<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-TenantAPI
\<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-TenantPublicAPI
\<Prefix>APT01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-TenantSite
\<Prefix>APT01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-Usage
\<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-UsageCollector
\<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-WebAppGallery
<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\MgmtSvc-WindowsAuthSite
<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\SMA
<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
\SPF
<Prefix>APA01
CF75D3CAE126353B0700F9820ECBA0F67F75001C.pfx
The
Set-SslCerticate runbook that you run in the next section processes the folder tree in the following order:
Security 137