Logo Threat Intelligence

How to use Windows as an Evolve Virtual Appliance

Threat Intelligence • Aug 10, 2021

Evolve provides the ability to generate pre-configured Evolve Virtual Appliances for a variety of platforms, such as VMware, Hyper-V, AWS, Azure and Docker – as detailed within our  Getting Started with the Evolve Virtual Appliance blog post.
In addition to these platforms, a Windows host can always be utilised as an Evolve Virtual Appliance, as detailed in the steps below.
Step 1 : Download the VPN Gateway configuration from the Evolve Console. Navigate to Security Zones > Gateways and click the Download button for the relevant VPN Gateway:

step 1 - windows evolve virtual app

Step 2 : Evolve will provide a ZIP file with the required configuration files, including your corresponding Evolve Certificate for trusted encryption and authentication.
Step 3 : Download an OpenVPN client from the following source:

Step 4 : Unzip VPN gateway configuration into the:
  • C:\Program Files\OpenVPN\config

Step 5 : Rename evolve.conf to evolve.ovpn
Step 6 : Navigate to the Control Panel > Network and Sharing Centre > Change Adapter Settings. Enable Internet Connection sharing on your LAN interface, typically named Ethernet, selecting the OpenVPN TAP interface to share with:

step 6 - windows as an evolve virtual app

Step 7 : Change OpenVPN TAP interface back to DHCP addressing*:
  • Step 7.1: 

step 7.1 - windows evolve virtual app

  • Step 7.2:

step 7.2 - windows evolve virtual app

*The sharing will set a static IP, which we don’t want.
Step 8 : Connect VPN, there will be an OpenVPN GUI as an option:

step 8 - windows evolve virtual app

Step 9 – Done!
You’ll see traffic going across VPN to host on the network:

step 9 - windows evolve virtual app 1

And traceroute too:

step 9 - windows evolve virtual app 2

Now that we’ve shared how to use Windows as an Evolve Virtual Appliance, book a demo with our Cybersecurity Experts and see how Evolve can augment your security team with specialist security automation and orchestration capabilities.

Cybersecurity Project Management
By Threat Intelligence 24 Apr, 2024
In this blog, we're exploring cybersecurity project management and the role it plays in securing a business.
By Threat Intelligence 19 Apr, 2024
Unlock the secrets to navigating the intricacies of the Defence Industry Security Program (DISP) with confidence. Our expert team offers invaluable insights and tailored support to help you meet DISP's rigorous security assessment requirements.
Threat Modeling
By Threat Intelligence 12 Apr, 2024
In this blog post, we'll explore what threat modeling is all about, why it's important, and how it can prevent cyberattacks.
CVE-2024-3094 Exposes Vulnerabilities in Linux Systems
By Threat Intelligence 04 Apr, 2024
Stay informed about the latest security threat - CVE-2024-3094 represents a supply chain compromise discovered within the latest versions of xz Utils. Read our blog post now for essential insights and mitigation strategies.
Share by: