10.  Topic 2, Contoso 
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
Task 1:
Task 2:
Task 3:
Task 4:
Task 5:
Task 6:
Task 7:
Task 8:[email protected]  if the average CPU usage of a virtual machine named VM1 is greater than 70 percent for a period of 15 minutes. Task 9:
Task 10:
Task 11:
Task 12:
To start the case study
Overview
Contoso has two Azure subscriptions named Sub1 and Sub2. Both subscriptions are associated to an Azure Active Directory (Azure AD) tenant named contoso.com. 
Technical requirements
Existing Environment
Contoso.com contains the security groups shown in the following table. 
Sub1
Sub1 contains the locks shown in the following table. 
Sub1 contains the Azure policies shown in the following table. 
Sub2
Sub2 contains the virtual machines shown in the following table. 
All virtual machines have the public IP addresses and the Web Server (IIS) role installed. The firewalls for each virtual machine allow ping requests and web requests. 
Sub2 contains the network security groups (NSGs) shown in the following table. 
NSG1 has the inbound security rules shown in the following table. 
NSG2 has the inbound security rules shown in the following table. 
NSG3 has the inbound security rules shown in the following table. 
NSG4 has the inbound security rules shown in the following table. 
NSG1, NSG2, NSG3, and NSG4 have the outbound security rules shown in the following table. 
Technical requirements
You need to ensure that User2 can implement PIM.