To create a new virtual machine, go to the main dashboard, click Virtual Machines, and select Azure Virtual Machine. If you’re using the free account, this may apply to your free credits. Be sure to pause your VM when not in use to save money.
Next, we will need to select the subscription and resource group that we have previously created, “infrastructure” and “red-ops”. In the instance details section, we will specify a name for the virtual machine; I have named it “mythicC2” since it will serve as the host for the Mythic C2 framework.
We will keep the default configuration for the Availability Zone and Security Type, which is Zone 1 and Trusted launch respectively.
To select the machine specification, we can choose the Standard option with 8GB of memory; the available options might be different if using the trial version.
As for the Administrator account section, we will need to choose the SSH key for authentication and then create a new SSH key pair that can be used later to access the VM.
All inbound connections are blocked by default, except for port 22 (SSH).
Next, for the OS disk size, we will go with the default option of 30GB, with no encryption, as we don’t need it for the current testing purposes.
If you want to use encryption, you will need to enable the feature on your subscription before you can use it. Here is the link to Microsoft documentation on “encryption at host level” for more information.
For the networking interface, we will keep the default configuration that will allow the SSH port to open publicly.
The same applies to the Management section; I kept the default settings. The Management section handles VM configurations, including identity management, backup configuration, and certificate-based authentication.
Also, in the Monitoring section, I didn’t make any changes to the default settings. However, you have the option to customize alert rules to receive notifications for significant events related to your VM.
Additionally, you can use other features such as diagnostics to troubleshoot boot failures, and health monitoring to ensure the infrastructure’s availability and performance.
The Advanced section offers more comprehensive options and settings that go beyond the basic configurations. It includes Extensions that allow for additional software modules to be added to the VM to provide specific functionalities, and Policies that enforce rules for the VM, such as security policies, resource allocation limits, and guest configuration restrictions.
Since we won’t need to modify this part for our VM, we can proceed to the next section.
After adding a tag to the VM, we review the information and click “Review + Create”. We then enter an email and phone number to receive notifications regarding the created resource.
Lastly, we will be prompted to download the private key to access the machine later after it gets deployed.
As seen below in Figure 21, our machine is deployed and ready to use.