Software and Licenses¶
Obtaining Windows Software Licenses¶
The following table lists the software that is required for the virtual machines inside the NDG Security+ v4 pod. Your organization needs to be a member of the vendor programs listed in the Source column to obtain and use the licenses. To subscribe to the Microsoft Azure Dev Tools for Teaching program, visit: https://azureforeducation.microsoft.com/en-us/Institutions.
PC Name |
OS Version |
|---|---|
WinOS |
Windows Server 2019 Standard (64-bit) |
Note
For more information regarding the Microsoft Azure Dev Tools for Teaching program, you may visit their FAQ page:
https://azure.microsoft.com/en-us/education/institutions/dev-tools-for-teaching-faq/.
It is recommended to acquire the Multiple Activation Key (MAK) lab key license for a specified Windows product.
This type of key enables you to activate multiple installations of a product with the same key.
Please note that activating licenses is only required on master pods. Doing a Link Clone of the template pod will preserve the activation on the cloned VMs in the user pods. It is important to note that when activating Windows, the VMs have temporary Internet access so that they can contact Microsoft Licensing Servers.
Setup NDG VM Distribution System¶
The virtual machines are made available from the NDG VM Distribution System. Please follow the guide at NDG VM Distribution System.
This pod requires you are connected to the following storage connections:
vmdist.ndg_genitvmdist.ndg_genit.windows
To request access to the preconfigured virtual machine templates from EPNC (Education Pathway National Center):
Go to the CSSIA Resources page: CSSIA Resources
Select
CSSIA VM Image Sharing Agreement.Complete and submit your access request by following the instructions on the request form.
EPNC will provide, via email, password-protected download links. Access to the download links is provided only to customers who are current with their NETLAB+ support contract and are participants in the appropriate partner programs (i.e., Cisco Networking Academy, VMware IT Academy, Red Hat Academy, and/or Palo Alto Networks Cybersecurity Academy).
Once all virtual machines have been downloaded, they can be deployed following the steps in the appropriate pod installation guide. Each virtual machine is deployed individually.