Project: Securing a Business NetworkSummary
In this project, you are given a “broken” Windows 10 PC and asked to figure out what’s wrong with it
and then make changes to fix and secure it. The process of analyzing and applying security happens in
workplaces around the globe and is exactly what cybersecurity professionals do daily. This project gives
you the opportunity to apply what you’ve learned in the course by investigating a Windows 10 PC,
securing it, and then explaining what you found and did in your security report. The same skills you use
on one PC can be applied to thousands.
As a part of this project, you are given a document template ( template will be shared in studypool
page) that contains the high-level steps you’ll take as part of securing a typical computer system. You’ll
use the virtual Windows 10 PC to answer the questions and challenges listed in the project document.
For each step, you need to write your answers in the document template, explain how you got the
answers, and provide screenshots showing your work.
To take a screenshot on a Windows system, you can use the Snipping Tool or Snip & Sketch application
(Windows logo key + Shift + S). To take a screenshot on a Macintosh system, press and hold these three
keys together: Shift, Command, and 3. You can then paste the image into your report.
It’s important that you read through the entire document before securing the system and completing
your report.
Advice for students
•
This project is based on instruction throughout the course. It takes you through the NIST CSF, CIS
Controls, and Hacker Lifecycle. If you get stuck, go back to that section in the course and review
the material.
•
It’s important that you write each of the steps you take and use screenshots to show your work.
•
You should keep in mind that there are numerous ways to solve each of the challenges. You
should use the method you are most comfortable with rather than getting the “right” answers.
That’s why it’s important to show your work in your report.
•
Complete all of the sections in the template. Credit is given for partial answers.
•
There are many security problems with the sample PC. The intent is to give you a challenge
based on what you’ve learned in this course and what you’ll see in real life.
•
Important note: After you update the JoesGaragePC with the Microsoft updates, the updates
may disable the remote access to the JoesGaragePC. Therefore, before you restart the machine,
it is advisable to verify that remote access is enabled. See the snapshot below that describes
how to allow remote access to the JoesGaragePC.
Submission Instructions
1. Make sure to check over the Project Rubric to ensure you have met all of the project
specifications
2. Final review of the document for completion, typos, clarity, name, date, etc.
3. Save your document as a PDF file and include your name in the file name
4. Check if the document is still correctly formatted in the form of a PDF
5. Upload and submit the PDF file for evaluation
IMPORTANT: Please always remember to shut down ALL of the virtual machines when
not in use to avoid charges! The status of ALL virtual machines should be stopped!
For the current project, you will work in the following VM:
VM Name
OS
Purpose
JoesGaragePC
Windows 10 Pro
Course project
Only for Windows 10 Users: set up an Azure VM in your personal Azure account
If you have a Windows 10 computer, you can follow the steps below and run the given Azure
Powershell script to create a VM in your Azure account.
You will work in JoesGaragePC for this project.
Prerequisites: You should have an Azure account.
1. Download this Zip file ( zipfile will be shared in studypool page as file) that, and unzip it when the
download is completed. It has an Azure Powershell script, InitializeUdacity.CYBERND01.LabVM1.ps1.
2.
After downloading the script, follow these steps ( steps will be shared in studypool page as file)
that to run the script file. Running the script successfully will create a VM – JoesGaragePC in your Azure
account. The setup process may take up to 20-30 min to finish.
3.
You may receive a certificate warning during the sign-in process. Click Yes or Continue to create
the connection.
4.
Once the Azure VM is up and running, use the Remote Desktop Connection to connect remotely
to the new VM from your local Windows 10 machine. Use the IP address as “Computer name” and click
Connect. Username and password are:
Username: JoesAuto
Password: @UdacityLearning#1
IMPORTANT: Always shut down all your virtual machines, across all regions, when not in use to avoid
charges!
You have been hired to secure the PC used at your friend’s business: Joe’s Auto Body. Joe provides car
repair services throughout the tri-state area. He suspects that others may have broken into his PC and
could be using it to transfer files across the internet. He has asked that you secure it for him according to
industry best practices, so it can be once again used as a standard PC.
You will be given access to a virtual image of Joe’s Auto Body’s PC. It’s a copy of the actual computer
operating system in use that will be transferred to Joe’s computer once you are done. You will also be
given a document template that contains the high-level steps you’ll need to take as part of securing a
typical computer system. For each step, you need to write your answers in the document template,
explain how you got the answers, and provide screenshots showing your work.
Submission
Submission Instructions
1. Make sure to check over the Project Rubric to ensure you have met all of the project
specifications
2. Final review of the document for completion, typos, clarity, name, date, etc.
3. Save your document as a PDF file and include your name in the file name
4. Check if the document is still correctly formatted in the form of a PDF
5. Upload and submit the PDF file for evaluation
IMPORTANT: Please always remember to shut down ALL of the virtual machines when not in use to
avoid charges! The status of ALL virtual machines should be stopped!
Submission Checklist
Before you submit, check if the following have been completed:
Everything in the Rubric is in the document.
Final review of document for completion, typos, clarity, name, date, etc.
The document is in the form of a PDF and is still correctly formatted.
The PDF file’s name should include your name to make it unique.
Ready to Submit?
Once you have all the items above completed, you can click the submit button. Follow the directions to
submit your project in one of the following ways:
1. A zip file
2. A single PDF file
Project Rubric:
Udacity Cybersecurity Course #1 Project
Contents
Student Information
2
Scenario
3
1. Reconnaissance
4
2. Securing the PC
6
3. Securing Access
8
4. Securing Applications
10
5. Securing Files and Folders
13
6. Basic Computer Forensics (Advanced)
14
7. Project Completion
15
Learning Objectives:
●
●
●
●
Explain security fundamentals including core security principles, critical security controls,
and cybersecurity best practices.
Evaluate specific security techniques used to administer a system that meets industry
standards and core controls
Assess high-level risks, vulnerabilities and attack vectors of a sample system
Explain methods for establishing and maintaining the security of a network, computing
environment, and application.
Cybersecurity ND #1 Project Template Page | 1
Student Information
Student Name:
Date of completion:
Cybersecurity ND #1 Project Template Page | 2
Scenario
Congratulations!
You have been hired to secure the PC used at your friend’s business: Joe’s Auto Body. Joe provides car
repair services throughout the tri-state area. He’s had previous employees use it for activities un-related
to work (e.g., web browsing, personal email, social media, games, etc.) and he now uses it to store his
critical business information. He suspects that others may have broken into it and may be using it to
transfer files across the internet. He has asked that you secure it for him according to industry best
practices, so it can be once again used as a standard PC.
You will be given access to a virtual image of Joe’s Auto Body’s PC. It’s a copy of the actual computer
operating system in use that will be transferred to Joe’s computer once you are done.
This template provides you with the high-level steps you’ll need to take as part of securing a typical
computer system. For each step, use the virtual Windows 10 PC to answer the questions and challenges
listed in this project. You’ll also need to explain how you got the answers and provide screenshots
showing your work.
It’s important that you read through the entire document before securing the system and completing
this report.
To start, you need to login to the virtual PC. You can use Joe’s account using the user-id and password
below. You may also use any other account on the PC.
Account Name: JoesAuto
Password: @UdacityLearning#1
Cybersecurity ND #1 Project Template Page | 3
1. Reconnaissance
The first step in securing any system is to know what it is, what’s on it, what it’s used for and who uses
it. That’s the concept of systems reconnaissance and asset inventory. In this step, you’ll document the
hardware, software, user access, system and security services on the PC.
Complete each section below.
Hardware
1. Fill in the following table with system information for Joe’s PC.
Device Name
Processor
Install RAM
System Type
Windows Edition
Version
Installed on
OS build
2. Explain how you found this information:
3. Provide a screenshot showing this information about Joe’s PC:
Software
Another common early step in securing is taking an inventory of software or applications installed on a
computer system. These are programs outside of the standard operating system.
1. List at least 5 installed applications on Joe’s computer:
●
●
●
●
●
2. Explain how you found this information. Provide screenshots showing this information.
3. The Center for Internet Security Controls lists this as one of their steps for security. Which step
does this fulfill?
Cybersecurity ND #1 Project Template Page | 4
Accounts
As part of your security assessment, you should know the user accounts that may access the PC.
1. List the names of the accounts found on Joe’s PC and their access level.
Account Name
Full Name
Access Level
2. Provide a screenshot of the Local Users.
Services
Services are applications often running in the background. Most of them provide needed functionality
for the PC. Some may also be used to violate security policies.
1. Provide a screenshot of the services running on this PC.
Security Services
Joe wants to ensure that standard security services are running on his PC. He’s content with using
default Windows security settings and applications except for the rules outlined later. Reminder that at
this point you are just reporting what you observe. Do not make any changes to security settings yet.
1. To view a summary of security on Windows 10, start from the Control Panel. Use the “Find a
setting” bar and search on Windows Defender. You can also search for Windows Defender using
the Windows Run bar. Take a screenshot of what you see on the Windows Security screen and
include it here:
2. The Windows 10 Security settings are also found from the Control Panel > System and Security >
Security and Maintenance. Start by viewing “Review your computer’s status and resolve
issues.” Provide a screenshot of this below:
3. Click on View in Windows Security to see the status there. Provide a screenshot of the Firewall
settings.
4. From the Control Panel, go to System and Security. In that window, select Windows Defender
Firewall. Provide a screenshot of it here:
Cybersecurity ND #1 Project Template Page | 5
5. PC users should be notified whenever there is a security or maintenance message. In the Security
& Maintenance window, click on Change Security and Maintenance settings and take a
screenshot. Paste it here:
6. Document the status of the PC’s security settings listed below. Include the process you used to
determine this information along with any screenshots. At this point, you are only documenting
what you find. Do not make changes (yet).
Security Feature
Firewall product and status – Private network
Firewall product and status – Public network
Virus protection product and status
Internet Security messages
Network firewall messages
Virus protection messages
User Account Control Setting
Status
7. Now that you are familiar with the security settings on Joe’s PC, explain at least three
vulnerabilities and risks with these settings. In other words, what can happen to Joe’s PC if these
are not changed?
[Hint: Refer to the CIS Controls document for ideas.]
●
●
●
2. Securing the PC
Baselines
Joe has asked that you follow industry standards and baselines for security settings on this system.
1. What industry standard should Joe use for setting security policies at his organization and justify
your choice?
2. What industry baseline do you recommend to Joe?
[Hint: Look in the documents folder]
The System and Security functions in the Windows Control Panel are where you can establish the
security settings for the PC. This is found from the Control Panel > System and Security > Security and
Maintenance. On the Security and Maintenance window, you see a synopsis of the Windows 10 security
settings.
3. Assume Joe uses the CIS as his baseline, what controls or steps does this meet?
Cybersecurity ND #1 Project Template Page | 6
System and Security
At this point, you need to enable security services for this PC. Pick at least 3 of the following 5 areas to
secure in order to satisfactorily meeting the project requirements:
●
●
●
●
●
Firewall
Virus & Threat Protection
App & Browser Control
User Account Control settings
Securing Removable Media
Firewall
You need to ensure the Windows Firewall is enabled for all network access.
1. Explain the process you take to do this.
2. Include screenshots showing the firewall is turned on.
3. What protection does this provide?
Virus & Threat Protection
You need to ensure the Windows Defender anti-virus is enabled to always protect against
current threats. It should be set to automatically update and continually scan the PC for
malicious software. Note: Ignore any alerts about setting up OneDrive.
1. Explain the process you take to do this.
2. Include screenshots to confirm that anti-virus is enabled.
Once you determine that virus & threat protection is on and updated, you need to turn on
messages about the Network firewall and Virus protection. Refer to the instructions above for
viewing the settings within Security and Maintenance, Review recent messages and resolve
problems.
1. Turn on the Network firewall and Virus protection messages using Change Security and
Maintenance Settings.
2. Show a screenshot here of them enabled.
3. Provide at least two risks mitigated by enabling these security settings:
●
●
4. From the CIS baseline controls, provide the controls satisfied by completing this.
App & Browser Control
Cybersecurity ND #1 Project Template Page | 7
The App protection within Windows Defender helps to protect your device by checking for
unrecognized apps and files and from malicious sites and downloads. Review the settings found
within the Account protection window, and App & browser control windows found on the
Windows Defender Security page.
Advanced students: You should also review the settings on the Exploit protection page.
1. Change the settings to provide maximum protection for Joe’s PC and provide a
screenshot of your results.
User Account Control Settings
Joe wants to prevent potentially harmful programs from making changes and wants to be
notified whenever apps try to make changes to his computer. This is done through the User
Account Control Setting.
1. What is the current UAC setting on Joe’s computer?
This is available from the above security settings.
2. What should it be set to? Include a screenshot of the new setting.
Securing Removable Media
A security best practice is to not allow the use of removable hard drives (USB sticks, Memory
Cards, and DVDs). They are needed as part of Joe’s backup policy. The next best thing is to make
sure that any applications don’t automatically start when the media is inserted and the user is
asked what should happen. This is set from the Control Panel > Hardware and Sound > Autoplay
menu.
1. On Joe’s computer, go to that function and deselect “Use AutoPlay for all media and
devices.”
2. For the Removable Drive, make the default, “Ask me every time.” Include a screenshot of
your results.
3. Securing Access
Ensuring only specific people have access on a computer system is a common step in information
security. It starts by understanding who should have access and the rules or policies that need to be
followed.
On Joe’s computer, only the following accounts should be in use:
● JoesAuto
● Jane Smith (Joe’s assistant)
Cybersecurity ND #1 Project Template Page | 8
●
●
●
A User – Used for exercises (Not used in this project)
Notadmin – Built-in administrator account (Not used for this project)
Windows built-in accounts: Guest, DefaultAccount, and WDAGUtility (Not used for this project)
Joe’s Auto Access Rules:
●
●
●
●
●
●
Only JoesAuto and A User should have administrative privileges on this PC.
Joe wants to prevent potentially harmful programs from making changes and wants to be
notified whenever apps try to make changes to his computer.
All valid users should have a password following Joe’s password policy below
o At least 8 characters
o Complexity enabled
o Changed every 120 days
o Cannot be the same as the previous 5 passwords
Account should be automatically disabled after 5 unsuccessful login attempts. The account
should be locked for 15 minutes and then should automatically unlock.
Upon first logging into the PC, Joe wants a warning banner letting anyone using to know that
this is to only be used for work at Joe’s Auto Body shop by authorized people.
There is to be no remote access to this computer.
User Accounts
1.
2.
3.
4.
What user accounts should not be there?
Bonus questions: What is Hacker’s password?
Explain the steps you take to disable or remove unwanted accounts.
Why is it important to disable or remove unneeded accounts from a PC or application? Include
potential vulnerabilities and risks.
Only specific accounts should have administrator privileges. This reduces the ability for unwanted
applications to be installed, including malware.
5. Which account(s) have administrator rights that shouldn’t?
6. Explain how you determined this. Provide screenshots as needed.
Administrator privileges for too many users are another security challenge.
7. Provide at least three risks associated with users having administrator rights on a PC.
●
●
●
Cybersecurity ND #1 Project Template Page | 9
Now, you need to remove administrator privileges for any user(s) that should not have it.
8. Explain the process for doing this. Include screenshots to show your work.
9. What is the security principle behind this?
10. The Center for Internet Security Controls lists this as one of their steps for security. Which step
does this fulfill?
Setting Access and Authentication Policies
After you talked with Joe about security, he has asked that the access rules outlined above be in place
on his PC. These are set using the Local Security Policy function in Windows 10. On the Windows search
bar, type “Local Security Policy” to access it. Click the > arrow next to both “Account Policies” and “Local
Policies” and review their contents.
1. Provide a screenshot of the Local Security Policy window here.
[Note: Local Security Policy is not available on Windows 10 Home edition.]
2. Explain the process for setting the password and access control policies locally on a Windows 10
PC. Provide screenshots showing how you set the rules on the PC.
● Setting the Password Policy:
● Setting the Account Lockout Policy:
Auditing and Logging
Security best practices like those found in the CIS Controls or NIST Cybersecurity Framework require
systems to log events. You need to enable the Audit Policy for Joe’s PC to meet these standards.
1. From the Local Security Policy window, select Audit Policy and make applicable changes to Joe’s
PC to enable minimal logging of logon, account, privilege use and policy changes.
2. Provide a screenshot of your changes here.
4. Securing Applications
As part of the inventory process, you determined computer programs or applications on the PC. The
next step is to decide which ones are needed for business and which ones should be removed.
Unneeded programs could be vulnerable to attacks and allow unauthorized access into the computer.
They also consume system resources and could also violate licensing agreements.
Joe has established the following rules regarding PC applications:
●
●
●
Joe wants everyone to use the latest version of the Chrome browser by default.
There should be no games or non-work-related applications installed or downloaded.
Joe is also concerned that there are “hacking” programs downloaded or installed on the PC that
should be removed.
Cybersecurity ND #1 Project Template Page | 10
●
This PC is used for standard office functions. The auto-body has a separate service they use for
their website and to transfer files from their suppliers.
Remove unneeded or unwanted applications
1. List at least three application(s) that violate this policy.
●
●
●
2. Name at least three vulnerabilities, threats or risks with having unnecessary applications:
●
●
●
3. Joe wants you to make sure unneeded applications or programs are no longer on the PC. Explain
the steps you take to disable or remove them. Include screenshots to show your work.
Default Browser
As mentioned in the policy, Joe wants all users to use Chrome as their browser by default.
1. Explain how you set default applications within the Windows 10 operating system. Include
screenshots as necessary.
2. Why should Internet Explorer be disabled from Windows PCs? Provide at least two risks or
vulnerabilities associated with it.
●
●
Because of the reasons you give above, Internet Explorer should be removed. To do that, go to the
Control Panel, select Programs. On the Programs and Features window, select “Turn Windows features
on or off.”
3. Provide a screenshot showing Internet Explorer 11 is off.
Windows Services
There are Windows features running on Joe’s computer that could allow unwanted activity or files. He
suspects that someone may have used the PC as a web server in the past. Joe wants you to confirm if
web services are turned on, stop it if it is and make sure it is not running whenever the computer
restarts.
1. How did you determine these services were running? Include screenshots to show how you
found them.
Cybersecurity ND #1 Project Template Page | 11
2. Advanced users should provide at least two methods for determining a web server is running on
a host
3. How do you disable them and make sure they are not restarted?
4. Advanced Users: The File Transfer Protocol FTP service is also running on this PC and shouldn’t.
Explain the process for disabling it and ensuring it is not automatically restarted.
Patching and Updates
Keeping the operating system current on patches and fixes is a critical part of security. Joe wants his PC
to be on the latest version of Windows 10. He also wants you to set it up for automated updates.
1. Explain the process for doing this. Include screenshots as needed.
2. Go ahead and update this PC to the latest version. Warning this may take a while and require
numerous restarts. When it is complete, provide a screenshot showing the PC is on the latest
version.
All applications should also be up to date on patches or fixes provided by the manufacturer. Any old
versions of software should be uninstalled.
3. List at least two applications on Joe’s PC that are out of date. List them below:
●
●
4. Explain the steps you took to determine this information.
5. Explain the steps for updating each of these applications. Include screenshots as needed.
5. Securing Files and Folders
Joe has some work files in his Business folder that he wants to secure since they contain his customer
information. They are labeled “JoesWork.”
Joe suspects that other users on this computer beside him and Jane can see and change his business
files. He wants you to check to make sure that only those two users have privileges to view or change
the files.
Encrypting files and folders
1. Explain the process for checking this and changing any necessary settings on the file. Include
screenshots showing that ONLY Joe and Jane have permissions to change Joes work files.
[Hint: Right-click the folder and select Properties.]
2. Joe wants his work files encrypted with the password, “SU37*$xv3p1” Explain how you would do
this. What encryption method do you recommend? You may use the pre-installed program 7-Zip
for this.
3. What security fundamental does this provide?
Cybersecurity ND #1 Project Template Page | 12
4. The Center for Internet Security Controls lists this as one of their steps for security. Which step
does this fulfill?
Shared Folders
Shared folders are a common way to make files available to multiple users. There’s a folder under Joe’s
documents called “Business Files” that Joe wants shared with his administrator Jane.
1. Explain how you would do that and provide a screenshot showing how you can do it. Make sure
it’s only shared between Joe and Jane.
2. For advanced students: Joe wants to make sure there are no other folders shared on the PC.
Explain how you view all shared files and folders on a Windows 10 PC. Include a screenshot as
proof.
6. Basic Computer Forensics (Optional)
Joe has asked that you investigate his PC to see if there are any other files left behind by previous
unwanted users that may show they wanted to harm Joe’s business. Look through the unwanted users’
folders and list suspicious files. General students should document three issues and advanced students
at least five issues. Include a brief explanation of their contents and their risks. [Hint: there is a “Hacker”
in the PC]
●
●
7. Project Completion
Take the following steps when you are done answering the challenges and securing Joe’s PC:
●
●
●
Save your answer template as both a Word document and PDF. Make sure your name and date
are on it.
Shutdown the virtual Windows 10 PC.
Submit the PDF to Udacity for review.
Cybersecurity ND #1 Project Template Page | 13
Setup Student Lab
This document outlines the steps to follow to set up the Windows 10 Azure virtual machine
(VM thereafter) required for the Lab activities.
Pre-requisites
For an optimal experience, the following are required for the setup:
1. An Azure subscription. If you don’t have an Azure subscription, create a free account
before you begin. The account created at this stage does not have to be the same as the
account used to create the JumpBox.
2. The completion of the steps described in “Create the JumpBox”.
Step 0. Update the execution policy for PowerShell scripts.
1. Connect and log into the JumpBox (shown by Step 4 in “Create the JumpBox”)
2. Start Windows PowerShell as Administrator: Search Bar > Type ‘PowerShell’ > right-click
and select ‘Run as Administrator’
When the PowerShell window opens:
Type Set-ExecutionPolicy RemoteSigned -Force to set the policy to RemoteSigned and
Press Enter or Return.
Type Get-ExecutionPolicy to verify the current settings for the execution policy and
Press Enter or Return.
Type Exit and Press Enter or Return.
Example:
Step 1. Implementation
1. You can find the PowerShell script either in the Resources Tab of the Udacity Classroom
or linked on the page you’ll need it for as a ZIP file. Once you download the ZIP file and
uncompress it, copy the PowerShell script (.ps1 file) and place it on the desktop of the
JumpBox VM you created. Note: you will receive multiple .ps1 files in the course, here
using an example.ps1 as an example. Make sure that the file name includes the .ps1
extension, it may get removed when copying over – if it is removed you may manually
add it.
2. Right-click on the .ps1 file and select Properties
3. If you see an “Unblock” box, check the box to unblock the file. If you don’t see the
Unblock checkbox, you do not need to perform anything here. The “Unblock” box will
disappear after users give permission to run the file. (This is just a one-time process).
4. Start Windows PowerShell as Administrator: Search Bar > Type ‘PowerShell’ > right-click
and select ‘Run as Administrator’
5. Type the following 2 commands to launch execution.
Set-Location “desktop”
.\example.ps1
Note: in the second line: “.\example.ps1”, you need to change ‘example.ps1’ to the
name of the .ps1 file you obtained from the classroom.
Example: if the .ps1 file you obtained from the classroom is “InitializeUdacity.CYBERND01.LabVM1.ps1”, you should have:
The script performs the following actions:
–
Installs the Azure PowerShell module, if not already existent
Creates a Resource Group
Grants the Udacity App access to the resource group
Creates an image of the LAB VM
Step 2. Detailed Script Execution Steps
1. The script installs the Azure PowerShell module, if not already existent, enter Y to
install. It may take 10 min to install the Azure PowerShell module. Please be patient.
2. Once the installation completed, please log into your Azure subscription and proceed
3. The Udacity Lab resource group is initialized, then permission requested. Enter Y to
proceed. It may take a while to connect.
4. A browser will open with the permission granting page. Log-in to your Azure
subscription, grant access by clicking ‘Accept’, and close the browser. Note: a browser
will ALWAYS pop up but the permission granting page may or may not show up.
5. Press a key to confirm completion of the permission granting operation and proceed.
At this stage, the virtual machine creation starts. It may take a few minutes to complete
the creation. Please be patient. Upon completion, the following message appears:
Important: Save a copy of the transcript file for troubleshooting purposes if required.
Step 3. Get remote control of the Lab VM
1. Go back to the Virtual machine page. Click on the lab VM that you want to get remote
control of. Note: You might need to log out and log back in or refresh the browser for the
lab VM to show up. You should go from seeing only your JumpBox VM to also seeing the
VM for the script that you just ran. You will need the IP address of that VM to get the
remote control. Note: make sure both the lab VM and the JumpBox are RUNNING before
getting the remote control
2. Go back to JumpBox, type, and select “remote desktop connection” in the windows
search bar
3. Enter the IP address and click Connect
4. Use the username and password provided in the classroom to log in. You will receive a
warning. Click Yes to continue.
Congratulations, you have set up and have control of the lab VM.
Step 4. Return to lab VM
1. If you want to return to Lab, go to the Virtual machine page in the Azure portal. Make
sure both the JumpBox and the lab VM are running. You can start them by clicking the
“Start” button on the overview page.
2. Connect and log into to JumpBox (shown by Step 4 in “Create the JumpBox”)
3. Follow step 3 in this document to get remote control of the Lab VM
IMPORTANT: Please always remember to shut down ALL of
the virtual machines when not in use to avoid charges! The
status of the ALL VM should be stopped
You can shut down the VM by clicking the Power button and “shut down” inside the VM or
click on the “Stop” button on the VM overview page.
Click the Power icon and click “shut down” inside the VM
Click the Stop button on the VM overview page
Make sure the status is Stopped.