Configure Security Recommendations for Virtual Machines

This "Configure Security Recommendations for Virtual Machines" IT Pro Challenges virtual lab teaches learners how to configure security recommendations for a virtual machine by enabling security recommendations and Azure Disk Encryption. Skills learned in this lab are crucial for the job roles of System Administrators and Azure Administrators.

45
M
Time
Beginner
difficulty
ceu/cpe

Course Content

No items found.
No items found.
Course Description

A virtual machine is a machine file, typically described as an image, which works as an actual machine. In other words, it is just like creating a machine within a machine. It operates in a window, much like any other program, giving the end-user the equivalent action on a virtual machine as they would have using the host operating system. An Azure virtual machine comes with the adaptability of virtualization without having to purchase and manage the physical device that runs the virtual machine. You can create and deploy the applications with the presumption that your data is guarded and safe in highly secure data centers.

In this lab, you will learn the method behind the creation and deployment of an Azure Virtual Machine and then the steps of the configuration of security recommendations for the VM. The other guided challenges in this series are "Configure Application Insights and Log Retention for Web Apps" and "Can You Enable Database Authentication Using Azure AD?"

Understand the Scenario

You can use Azure Virtual Machines to deploy a broad range of computing solutions in an active process. For instance, you can deploy any workload or applications on almost any operating system. In this hands-on-lab, you are a system administrator for a company that is migrating its application services from its own datacenter to Azure. Your job is to deploy an Azure Virtual Machine and to configure security recommendations for the virtual machine, as a proof of concept. To accomplish this task, you are provided with an Azure resource group named @lab.CloudResourceGroup(1829). Name that initially contains no resources. You will create the necessary resources to complete the challenge.

Create an Azure Virtual Machine

The first step in this challenge is to create an Azure virtual machine. For this, learners will first create an Azure Virtual Machine named VM1-11764091 and configure the virtual machine to use Windows Server 2016 Datacenter. After this, they will learn how to set the size of the virtual machine to Standard B2s with Standard HDD managed disks and enable RDP access. After setting the size of the virtual machine, they will set the Username and Password to connect to the virtual machine by using RDP. Finally, learners will verify the logical disks available by using Windows Disk Management and disconnect the RDP session. They will execute this task by connecting to the virtual machine by using RDP and verifying the disks currently available by using Windows Disk Management. Disk Management is a Windows utility that allows users to inspect and maintain the disk drives placed in their machine and the partitions connected with those drives.

Enable Security Recommendations

Recommendations are steps for you to apply to secure the Azure resources. Security Center systematically investigates the security state of the Azure resources to recognize possible security vulnerabilities. It gives you recommendations on how to eliminate them. After creating the Azure Virtual Machine, the next step is to enable security recommendations. To execute this, you will first open the Security page for security recommendations and review the security recommendations. Here you will learn how to:

  • Follow the "Install endpoint protection solution on virtual machines recommendation" and proceed to the Extensions page of the virtual machine and add the extension for Microsoft Antimalware manually.
  • Follow the "Management ports should be closed on your virtual machines" recommendation and proceed to the Networking page of the virtual machine and remove the inbound rule for RDP manually.

Enable Azure Disk Encryption

Azure Disk Encryption secures your data to satisfy your organizational security responsibilities. It applies the Bitlocker characteristic of Windows to give volume encryption for the data disks and OS of Azure virtual machines. It is combined with Azure Key Vault to manage and control the disk encryption keys. In this final section of the lab, learners will learn how to follow the "Disk Encryption should be enabled on virtual machines" recommendation and how to apply Azure Disk Encryption manually. Here, they will first launch Azure Cloud Shell for PowerShell and use advanced settings to create a storage account and file share for Cloud Shell in the existing resource group. After this, they will create an Azure Key Vault and enable Azure Disk Encryption for the virtual machine by using specific commands. Finally, they will verify that the Azure Disk Encryption is enabled.

Lab Summary Conclusion

After completing the "Configure Security Recommendations for Virtual Machines" virtual lab, you will have accomplished the following:

  • Created an Azure Virtual Machine.
  • Enabled security recommendations.
  • Enabled Azure Disk Encryption.
This course is part of a Career Path:
No items found.

Instructed by

Instructor
Elizabeth Sims
Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Configure Security Recommendations for Virtual Machines Certificate of Completion

Course
This is some text inside of a div block.

Configure Security Recommendations for Virtual Machines

Course

This "Configure Security Recommendations for Virtual Machines" IT Pro Challenges virtual lab teaches learners how to configure security recommendations for a virtual machine by enabling security recommendations and Azure Disk Encryption. Skills learned in this lab are crucial for the job roles of System Administrators and Azure Administrators.

Path Releasing Q2 2025
Full access included with 
Insider Pro
 and 
Teams

H

45

M
Time

Beginner

i
This is some text inside of a div block.
Experience Level

i

This is some text inside of a div block.
CEU's

1

Enrollees

Heading

H

Heading

M
Time

Heading

i
This is some text inside of a div block.
Experience Level

Heading

i

This is some text inside of a div block.
CEU's

Heading

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

This "Configure Security Recommendations for Virtual Machines" IT Pro Challenges virtual lab teaches learners how to configure security recommendations for a virtual machine by enabling security recommendations and Azure Disk Encryption. Skills learned in this lab are crucial for the job roles of System Administrators and Azure Administrators.

Read More

Course Description

A virtual machine is a machine file, typically described as an image, which works as an actual machine. In other words, it is just like creating a machine within a machine. It operates in a window, much like any other program, giving the end-user the equivalent action on a virtual machine as they would have using the host operating system. An Azure virtual machine comes with the adaptability of virtualization without having to purchase and manage the physical device that runs the virtual machine. You can create and deploy the applications with the presumption that your data is guarded and safe in highly secure data centers.

In this lab, you will learn the method behind the creation and deployment of an Azure Virtual Machine and then the steps of the configuration of security recommendations for the VM. The other guided challenges in this series are "Configure Application Insights and Log Retention for Web Apps" and "Can You Enable Database Authentication Using Azure AD?"

Understand the Scenario

You can use Azure Virtual Machines to deploy a broad range of computing solutions in an active process. For instance, you can deploy any workload or applications on almost any operating system. In this hands-on-lab, you are a system administrator for a company that is migrating its application services from its own datacenter to Azure. Your job is to deploy an Azure Virtual Machine and to configure security recommendations for the virtual machine, as a proof of concept. To accomplish this task, you are provided with an Azure resource group named @lab.CloudResourceGroup(1829). Name that initially contains no resources. You will create the necessary resources to complete the challenge.

Create an Azure Virtual Machine

The first step in this challenge is to create an Azure virtual machine. For this, learners will first create an Azure Virtual Machine named VM1-11764091 and configure the virtual machine to use Windows Server 2016 Datacenter. After this, they will learn how to set the size of the virtual machine to Standard B2s with Standard HDD managed disks and enable RDP access. After setting the size of the virtual machine, they will set the Username and Password to connect to the virtual machine by using RDP. Finally, learners will verify the logical disks available by using Windows Disk Management and disconnect the RDP session. They will execute this task by connecting to the virtual machine by using RDP and verifying the disks currently available by using Windows Disk Management. Disk Management is a Windows utility that allows users to inspect and maintain the disk drives placed in their machine and the partitions connected with those drives.

Enable Security Recommendations

Recommendations are steps for you to apply to secure the Azure resources. Security Center systematically investigates the security state of the Azure resources to recognize possible security vulnerabilities. It gives you recommendations on how to eliminate them. After creating the Azure Virtual Machine, the next step is to enable security recommendations. To execute this, you will first open the Security page for security recommendations and review the security recommendations. Here you will learn how to:

  • Follow the "Install endpoint protection solution on virtual machines recommendation" and proceed to the Extensions page of the virtual machine and add the extension for Microsoft Antimalware manually.
  • Follow the "Management ports should be closed on your virtual machines" recommendation and proceed to the Networking page of the virtual machine and remove the inbound rule for RDP manually.

Enable Azure Disk Encryption

Azure Disk Encryption secures your data to satisfy your organizational security responsibilities. It applies the Bitlocker characteristic of Windows to give volume encryption for the data disks and OS of Azure virtual machines. It is combined with Azure Key Vault to manage and control the disk encryption keys. In this final section of the lab, learners will learn how to follow the "Disk Encryption should be enabled on virtual machines" recommendation and how to apply Azure Disk Encryption manually. Here, they will first launch Azure Cloud Shell for PowerShell and use advanced settings to create a storage account and file share for Cloud Shell in the existing resource group. After this, they will create an Azure Key Vault and enable Azure Disk Encryption for the virtual machine by using specific commands. Finally, they will verify that the Azure Disk Encryption is enabled.

Lab Summary Conclusion

After completing the "Configure Security Recommendations for Virtual Machines" virtual lab, you will have accomplished the following:

  • Created an Azure Virtual Machine.
  • Enabled security recommendations.
  • Enabled Azure Disk Encryption.

Train Your Team

Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

Included in a Path

Elizabeth Sims
Cloud Security Architect
Read Full Bio
Learn

Learn core concepts and get hands-on with key skills.

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

Get Hands-on Learning

Put your skills to the test in virtual labs, challenges, and simulated environments.

Measure Your Progress

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

Connect with the Community

Connect with peers and mentors through our supportive community of cybersecurity professionals.

Success from Our Learners

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.