Skip to content

Commit 0bd2832

Browse files
authored
Removed bold encoding from level 3 headings
1 parent f658c45 commit 0bd2832

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/virtual-machines/linux/how-to-verify-encryption-status.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ You can validate the **general** encryption status of an encrypted VM using the
8484

8585
You can capture the encryption settings from each individual disk using the following PowerShell commands:
8686

87-
### **Single-Pass**
87+
### Single-Pass
8888
If single-pass, the encryption settings are stamp on each of the disks (OS and Data), you can capture the OS disk encryption settings in single pass as follows:
8989

9090
``` powershell
@@ -132,7 +132,7 @@ $VM = Get-AzVM -Name ${VMNAME} -ResourceGroupName ${RGNAME}
132132
```
133133
![Verify data single ps 001](./media/disk-encryption/verify-encryption-linux/verify-data-single-ps-001.png)
134134

135-
### **Dual-Pass**
135+
### Dual-Pass
136136
In Dual Pass, the encryption settings are stamped in the VM model and not on each individual disk.
137137

138138
To verify the encryption settings were stamped in dual-pass, you can use the following commands:
@@ -156,11 +156,11 @@ Write-Host "====================================================================
156156
```
157157
![Verify dual pass PowerShell 1](./media/disk-encryption/verify-encryption-linux/verify-dual-ps-001.png)
158158

159-
### **Unattached disks**
159+
### Unattached disks
160160

161161
Check the encryption settings for disks that aren't attached to a VM.
162162

163-
**Managed disks**
163+
### Managed disks
164164
```powershell
165165
$Sourcedisk = Get-AzDisk -ResourceGroupName ${RGNAME} -DiskName ${TARGETDISKNAME}
166166
Write-Host "============================================================================================================================================================="
@@ -184,7 +184,7 @@ az vm encryption show --name ${VMNAME} --resource-group ${RGNAME} --query "subst
184184
```
185185
![Verify general using CLI ](./media/disk-encryption/verify-encryption-linux/verify-gen-cli.png)
186186

187-
### **Single Pass**
187+
### Single Pass
188188
You can validate the encryption settings from each individual disk using the following AZ CLI commands:
189189

190190
```bash
@@ -239,7 +239,7 @@ done
239239

240240
![Data single CLI ](./media/disk-encryption/verify-encryption-linux/data-single-cli.png)
241241

242-
**Dual Pass**
242+
### Dual Pass
243243

244244
``` bash
245245
az vm encryption show --name ${VMNAME} --resource-group ${RGNAME} -o table
@@ -263,11 +263,11 @@ done
263263

264264
![Verify vm profile dual using CLI ](./media/disk-encryption/verify-encryption-linux/verify-vm-profile-dual-cli.png)
265265

266-
### **Unattached disks**
266+
### Unattached disks
267267

268268
Check the encryption settings for disks that aren't attached to a VM.
269269

270-
### **Managed disks**
270+
### Managed disks
271271

272272
```bash
273273
RGNAME="RGNAME"
@@ -280,7 +280,7 @@ echo -ne "Disk Encryption Key: "; az disk show -g ${RGNAME} -n ${TARGETDISKNAME}
280280
echo -ne "key Encryption Key: "; az disk show -g ${RGNAME} -n ${TARGETDISKNAME} --query encryptionSettingsCollection.encryptionSettings[].keyEncryptionKey.keyUrl -o tsv; \
281281
echo "============================================================================================================================================================="
282282
```
283-
### **Unmanaged disks**
283+
### Unmanaged disks
284284

285285
Unmanaged disks are VHD files that are stored as page blobs in Azure storage accounts.
286286

0 commit comments

Comments
 (0)