How to:

  • Use a resource group for the deployment

  • Create a virtual network with one subnet

  • Use a network security group to govern traffic flow

  • Connect to the virtual machine

  • Verify connectivity

  • View and interpret the effective routes

  • View and interpret the effective security rules

  • Use the next hop utility

  • Use the IP flow verify utility