Software and Licenses

Obtaining Windows Software Licenses

The following table lists the software that is required for the virtual machines inside the NDG Forensics v2 pod. Your organization needs to be a member of the vendor programs listed in the Source column to obtain and use the licenses. To subscribe to the Microsoft Azure Dev Tools for Teaching program, visit: https://azureforeducation.microsoft.com/en-us/Institutions.

Windows Requirements

PC Name

OS Version

WinOS

Windows Server 2016 Standard (64-bit)

Note

For more information regarding the Microsoft Azure Dev Tools for Teaching program, you may visit their FAQ page: https://azure.microsoft.com/en-us/education/institutions/dev-tools-for-teaching-faq/. It is recommended to acquire the Multiple Activation Key (MAK) lab key license for a specified Windows product. This type of key enables you to activate multiple installations of a product with the same key.

Please note that activating licenses is only required on master pods. Doing a Link Clone of the template pod will preserve the activation on the cloned VMs in the user pods. It is important to note that when activating Windows, the VMs have temporary Internet access so that they can contact Microsoft Licensing Servers.


Setup NDG VM Distribution System

The virtual machines are made available from the NDG VM Distribution System. Please follow the guide at NDG VM Distribution System.

This pod requires you are connected to the following storage connections:

  • vmdist.ndg_genit

  • vmdist.ndg_genit.windows

To request access to the preconfigured virtual machine templates from EPNC (Education Pathway National Center):

  1. Go to the CSSIA Resources page: CSSIA Resources

  2. Select CSSIA VM Image Sharing Agreement.

  3. Complete and submit your access request by following the instructions on the request form.

  4. EPNC will provide, via email, password-protected download links. Access to the download links is provided only to customers who are current with their NETLAB+ support contract and are participants in the appropriate partner programs (i.e., Cisco Networking Academy, VMware IT Academy, Red Hat Academy, and/or Palo Alto Networks Cybersecurity Academy).

  5. Once all virtual machines have been downloaded, they can be deployed following the steps in the appropriate pod installation guide. Each virtual machine is deployed individually.