You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/how-to-verify-encryption-status.md
+70-95Lines changed: 70 additions & 95 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: How to verify encryption status for Linux
3
-
description: This article provides instructions on verifying the encryption status from platform and OS level.
2
+
title: Verify encryption status for Linux - Azure Disk Encryption
3
+
description: This article provides instructions on verifying the encryption status from the platform and OS level.
4
4
author: kailashmsft
5
5
ms.service: security
6
6
ms.topic: article
@@ -13,79 +13,62 @@ ms.custom: seodec18
13
13
14
14
15
15
16
-
# How to verify encryption status for Linux
16
+
# Verify encryption status for Linux
17
17
18
-
**This scenario applies for ADE dual-pass and single-pass extensions.**
19
-
This Document scope is to validate the encryption status of a virtual machine using different methods.
18
+
The scope of this article is to validate the encryption status of a virtual machine by using different methods: the Azure portal, PowerShell, the Azure CLI, or the OS of the virtual machine (VM).
20
19
21
-
### Environment
20
+
You can validate the encryption status during or after the encryption, by either:
22
21
23
-
- Linux distributions
22
+
- Checking the disks attached to a particular VM.
23
+
- Querying the encryption settings on each disk, whether the disk is attached or unattached.
24
24
25
-
### Procedure
26
-
27
-
A virtual machine has been encrypted using dual-pass or single-pass.
28
-
29
-
The encryption status can be validated during or after the encryption using different methods.
25
+
This scenario applies for Azure Disk Encryption dual-pass and single-pass extensions. Linux distributions are the only environment for this scenario.
30
26
31
27
>[!NOTE]
32
-
>We're using variables throughout the document, replace the values accordingly.
33
-
34
-
### Verification
35
-
36
-
The verification can be done from the Portal, PowerShell, AZ CLI and, or from the VM OS side.
37
-
38
-
This verification can be done by checking the disks attached to a particular VM.
39
-
40
-
Or by querying the encryption settings on each individual disk whether the disk is attached or unattached.
28
+
>We're using variables throughout the article. Replace the values accordingly.
41
29
42
-
Below the different validations methods:
43
-
44
-
## Using the Portal
30
+
## Portal
45
31
46
32
Validate the encryption status by checking the extensions section on the Azure portal.
47
33
48
-
Inside the **Extensions** section, you'll see the ADE extension listed.
49
-
50
-
Click it and take a look at the **status message**, it will indicate the current encryption status:
51
-
52
-

34
+
In the Azure portal, inside the **Extensions** section, select the Azure Disk Encryption extension in the list. The information for **Status message** indicates the current encryption status:
53
35
54
-
In the list of extensions, you'll see the corresponding ADE extension version. Version 0.x corresponds to ADE Dual-Pass and version 1.x corresponds to ADE Single-pass.
36
+

55
37
56
-
You can get further details clicking on the extension and then on *View detailed status*.
38
+
In the list of extensions, you'll see the corresponding Azure Disk Encryption extension version. Version 0.x corresponds to Azure Disk Encryption dual-pass, and version 1.x corresponds to Azure Disk Encryption single-pass.
57
39
58
-
You'll see a more detailed statusof the encryption process in json format:
40
+
You can get more details by selecting the extension and then selecting **View detailed status**. The detailed status of the encryption process appears in JSON format.
59
41
60
-

42
+

61
43
62
-

44
+

63
45
64
-
Another way of validating the encryption status is by taking a look at the **Disks** section.
46
+
Another way to validate the encryption status is by looking at the **Disk settings** section.
65
47
66
-

48
+

67
49
68
50
>[!NOTE]
69
-
> This status means the disks have encryption settings stamped but not that they were actually encrypted at OS level.
70
-
> By design, the disks get stamped first and encrypted later.
71
-
> If the encryption process fails, the disks may end up stamped but not encrypted.
51
+
> This status means the disks have encryption settings stamped but not that they were actually encrypted at the OS level.
52
+
>
53
+
> By design, the disks are stamped first and encrypted later. If the encryption process fails, the disks may end up stamped but not encrypted.
54
+
>
72
55
> To confirm if the disks are truly encrypted, you can double check the encryption of each disk at OS level.
73
56
74
-
## Using PowerShell
57
+
## PowerShell
75
58
76
-
You can validate the **general** encryption status of an encrypted VM using the following PowerShell commands:
59
+
You can validate the *general* encryption status of an encrypted VM by using the following PowerShell commands:

84
67
85
-
You can capture the encryption settings from each individual disk using the following PowerShell commands:
68
+
You can capture the encryption settings from each disk by using the following PowerShell commands.
86
69
87
-
### Single-Pass
88
-
If single-pass, the encryption settings are stamp on each of the disks (OS and Data), you can capture the OS disk encryption settings in single pass as follows:
70
+
### Single pass
71
+
In a singlepass, the encryption settings are stamped on each of the disks (OS and data). You can capture the encryption settings for an OS disk in a single pass, as follows:
You can get further details using the following "lsblk" variant.
329
+

355
330
356
-
You'll see a **crypt** type layer that is mounted by the extension.
331
+
You can get more details using the following **lsblk** variant.
357
332
358
-
The following example shows Logical Volumes and normal disks having a "**crypto\_LUKS FSTYPE**".
333
+
You'll see a **crypt** type layer that is mounted by the extension. The following example shows logical volumes and normal disks having **crypto\_LUKS FSTYPE**.
0 commit comments