Before you begin

Updated on

This section talks about how to login and the pre-requisites before starting the Lab

1. Click GO

Once the login button is highlighted in blue, click GO! to start the experience.

2. Horizon Login

Use the Testdrive Credentials provided in the Login Credentials menu on the top right corner to sign-in to VMware Horizon.


  1. Click the copy icon next to the username to copy
  2. Paste it on the Horizon username field by clicking on it, followed by pressing CTRL+v (Windows) or Command (⌘) + v (macOS) on your keyboard
  3. Next, click the copy icon next to the password to copy
  4. Paste it on the Horizon password field by clicking on it, followed by pressing CTRL+v (Windows) or Command (⌘) + v (macOS) on your keyboard
  5. Click Login to access


Other pasting options:

  • Windows: use right-click on your mouse/ trackpad and select Paste
  • macOS: press and hold the control key while you click the Horizon username/password field and select Paste

3. Launch Desktop

Once logged in, search for 'NSX Security' on the Apps Tab and click on the Horizon  Desktop to launch it on your Browser.

4. Access NSX Security Desktop

Now you'll be on the NSX Security desktop. At this point you can begin the walkthrough steps listed in the next section.

5. Access NSX 4.1 Manager

The console is accessed through a supported web browser Chrome. Login to NSX Manager:

  • Click on NSX 4.1 shortcut on the Desktop. Shortcut will open the URL to NSX: https://nsx-mgr.vmwdp.com
  • On the next page, you will see a message Your connection is not private. Click on Advanced -> Proceed to nsx-mgr.vmwdp.com (unsafe)
  • Username/Password: Credentials are located on the Desktop in a text document called Credentials. Use the NSX Manager ones (demo1_nsxsecop)

6. Prerequisites for Ransomware Lab

In the lab, to simulate an enterprise environment, the following VMs have been deployed: a VDI Desktop and a production data base server.  These two VMs are connected to NSX overlay segments.

7. Prerequisites for Ransomware Lab (contd.)

A supplementary VM has been deployed to play the role of an attacker, an external resource from where the attacks are initiated. This VM is attached to a VLAN type port group to a virtual distributed switch. Agent operating system (OS) type and roles are as shown above.

8. Networking and Security with NSX ATP

VMware NSX is a full-stack Networking Security solution, Integrated from Layer 2 to Layer 7. Complete East-West Security for Zero-Trust Ransomware and Lateral movement of threats make East-West the new battleground.

NSX DFW Distributed Firewall (01) is a hypervisor kernel-based firewall that monitors all your East-West traffic. DFW can be applied to individual workloads like VMs and enforce a Zero-Trust security model. Micro-segmentation logically divides a department or set of applications into security segments and distribute firewalls to each VM.

VMware NSX Threat Prevention (02) helps make it easier to protect your organization from ransomware. With just a few clicks, you can enable NSX features that detect and prevent malicious files from moving through North-South on your NSX Gateway Firewall (04). NSX Network Detection and Response collects traffic to uncover all threat movements, correlating and visualizing the complete campaign blueprint.

NSX Distributed Firewall and NSX Advanced Threat Prevention along with NSX Advanced Load Balancer running across Clouds offer a software-delivered, distributed architecture and advanced threat prevention. It enables Zero-Trust security, easy to deploy and automates policy while reducing overall costs.

NSX Intelligence (03) is a comprehensive security solution with AI/ML capabilities built-in that provides visibility and context to security teams both Layer 4 and Layer 7, enabling customer to quickly identify and respond to security threats. NSX ATP, on the other hand, is a set of advanced security features that can detect and prevent sophisticated attacks such as malware, ransomware, and phishing. By combining the capabilities of NSX Intelligence and NSX ATP, network security teams can detect, isolate, and remediate security threats before they cause any significant damage