A hands-on project that deploys two Windows VMs in a single Azure VNet, secures them with NSGs/Windows Firewall, and configures a Windows file share on the Server VM that is mapped and used from the Client VM. Includes end-to-end connectivity testing (ICMP) and read/write validation both directions.
How to read this section:
Each step has a short instruction and one screenshot with a precise title. Follow the steps in order; you’ll end with verified two-way file sharing.
-
Create a Resource Group
-
Create a Virtual Network (Basics)
-
Define Address Space and Subnet
-
Review + Create the VNet
-
Verify VNet shows in the Resource Group
-
Open the VNet Overview
-
Deploy Two Windows VMs (ServerVM & ClientVM)
-
Capture VM Details
-
Open NSG and Allow Required Inbound Traffic
-
RDP into ServerVM
-
Create the shared folder
-
Enable sharing + permissions
-
Create a test file on the Server
-
RDP into ClientVM
-
Map a network drive to the Server share
-
Confirm the mapped drive shows the server’s file
-
Open the file from the Client
-
Create a file from the Client in the share
-
Confirm the Server sees the new client file
-
(Before enabling ICMP) Ping failure (expected)
-
(After enabling ICMP) Ping success
-
Client → Server ping success
- Both VMs deployed in IT-VNet (10.0.0.0/16, default /24).
- Windows share exposed from ServerVM at
\\10.0.0.4\SharedFiles. - ClientVM successfully mapped Z: and read Server’s file.
- ClientVM created a file in the share; it appeared on ServerVM (write verified).
- ICMP working both directions after enabling NSG + host firewall rules.
- Azure subscription, Owner/Contributor rights for RG.
- RDP access to both public IPs (lab only).
- Windows user creds for each VM.
- Unmap the drive on ClientVM.
- Stop/Delete the two VMs, NICs, public IPs, and the RG to avoid charges.




























