Skip to content

Commit 246e130

Browse files
Merge pull request #256191 from msmbaldwin/ade-misc
update
2 parents 42e1bb7 + ba28bbc commit 246e130

8 files changed

+82
-79
lines changed

articles/defender-for-cloud/support-matrix-defender-for-servers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ The following table shows feature support for Windows machines in Azure, Azure A
7272
| Missing OS patches assessment ||| Azure: No<br><br>Azure Arc-enabled: Yes |
7373
| Security misconfigurations assessment ||| Azure: No<br><br>Azure Arc-enabled: Yes |
7474
| [Endpoint protection assessment](supported-machines-endpoint-solutions-clouds-servers.md#supported-endpoint-protection-solutions) ||| Azure: No<br><br>Azure Arc-enabled: Yes |
75-
| Disk encryption assessment | ✔</br>(for [supported scenarios](../virtual-machines/windows/disk-encryption-windows.md#unsupported-scenarios)) | - | No |
75+
| Disk encryption assessment | ✔</br>(for [supported scenarios](../virtual-machines/windows/disk-encryption-windows.md)) | - | No |
7676
| Third-party vulnerability assessment (BYOL) || - | No |
7777
| [Network security assessment](protect-network-resources.md) || - | No |
7878

@@ -97,7 +97,7 @@ The following table shows feature support for Linux machines in Azure, Azure Arc
9797
| Missing OS patches assessment ||| Azure: No<br><br>Azure Arc-enabled: Yes |
9898
| Security misconfigurations assessment ||| Azure: No<br><br>Azure Arc-enabled: Yes |
9999
| [Endpoint protection assessment](supported-machines-endpoint-solutions-clouds-servers.md#supported-endpoint-protection-solutions) | - | - | No |
100-
| Disk encryption assessment | ✔</br>(for [supported scenarios](../virtual-machines/windows/disk-encryption-windows.md#unsupported-scenarios)) | - | No |
100+
| Disk encryption assessment | ✔</br>(for [supported scenarios](../virtual-machines/windows/disk-encryption-windows.md)) | - | No |
101101
| Third-party vulnerability assessment (BYOL) || - | No |
102102
| [Network security assessment](protect-network-resources.md) || - | No |
103103

@@ -122,7 +122,7 @@ The following table shows feature support for AWS and GCP machines.
122122
| Missing OS patches assessment |||
123123
| Security misconfigurations assessment |||
124124
| [Endpoint protection assessment](supported-machines-endpoint-solutions-clouds-servers.md#supported-endpoint-protection-solutions) |||
125-
| Disk encryption assessment | ✔</br>(for [supported scenarios](../virtual-machines/windows/disk-encryption-windows.md#unsupported-scenarios)) | ✔</br>(for [supported scenarios](../virtual-machines/windows/disk-encryption-windows.md#unsupported-scenarios)) |
125+
| Disk encryption assessment | ✔</br>(for [supported scenarios](../virtual-machines/windows/disk-encryption-windows.md)) | ✔</br>(for [supported scenarios](../virtual-machines/windows/disk-encryption-windows.md)) |
126126
| Third-party vulnerability assessment | - | - |
127127
| [Network security assessment](protect-network-resources.md) | - | - |
128128
| [Cloud security explorer](how-to-manage-cloud-security-explorer.md) || - |

articles/virtual-machines/linux/disk-encryption-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ sections:
7373
Azure Disk Encryption provides end-to-end encryption for the OS disk, data disks, and the temporary disk, using a customer-managed key.
7474
- If your requirements include encrypting all of the above and end-to-end encryption, use Azure Disk Encryption.
7575
- If your requirements include encrypting only data at rest with customer-managed key, then use [Server-side encryption with customer-managed keys](../disk-encryption.md). You cannot encrypt a disk with both Azure Disk Encryption and Storage server-side encryption with customer-managed keys.
76-
- If your Linux distro is not listed under [supported operating systems for Azure Disk Encryption](disk-encryption-overview.md#supported-operating-systems) or you are using a scenario called out in the [unsupported scenarios for Windows](disk-encryption-linux.md#unsupported-scenarios), consider [Server-side encryption with customer-managed keys](../disk-encryption.md).
76+
- If your Linux distro is not listed under [supported operating systems for Azure Disk Encryption](disk-encryption-overview.md#supported-operating-systems) or you are using a scenario called out in the [restrictions](disk-encryption-linux.md#restrictions), consider [Server-side encryption with customer-managed keys](../disk-encryption.md).
7777
- If your organization's policy allows you to encrypt content at rest with an Azure-managed key, then no action is needed - the content is encrypted by default. For managed disks, the content inside storage is encrypted by default with Server-side encryption with platform-managed key. The key is managed by the Azure Storage service.
7878
7979

articles/virtual-machines/linux/disk-encryption-linux.md

Lines changed: 38 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -19,19 +19,51 @@ Azure Disk Encryption for Linux virtual machines (VMs) uses the DM-Crypt feature
1919

2020
Azure Disk Encryption is [integrated with Azure Key Vault](disk-encryption-key-vault.md) to help you control and manage the disk encryption keys and secrets. For an overview of the service, see [Azure Disk Encryption for Linux VMs](disk-encryption-overview.md).
2121

22+
## Prerequisites
23+
2224
You can only apply disk encryption to virtual machines of [supported VM sizes and operating systems](disk-encryption-overview.md#supported-vms-and-operating-systems). You must also meet the following prerequisites:
2325

2426
- [Additional requirements for VMs](disk-encryption-overview.md#supported-vms-and-operating-systems)
2527
- [Networking requirements](disk-encryption-overview.md#networking-requirements)
2628
- [Encryption key storage requirements](disk-encryption-overview.md#encryption-key-storage-requirements)
2729

28-
In all cases, you should [take a snapshot](snapshot-copy-managed-disk.md) and/or create a backup before disks are encrypted. Backups ensure that a recovery option is possible if an unexpected failure occurs during encryption. VMs with managed disks require a backup before encryption occurs. Once a backup is made, you can use the [Set-AzVMDiskEncryptionExtension cmdlet](/powershell/module/az.compute/set-azvmdiskencryptionextension) to encrypt managed disks by specifying the -skipVmBackup parameter. For more information about how to back up and restore encrypted VMs, see the [Azure Backup](../../backup/backup-azure-vms-encryption.md) article.
30+
In all cases, you should [take a snapshot](snapshot-copy-managed-disk.md) and/or create a backup before disks are encrypted. Backups ensure that a recovery option is possible if an unexpected failure occurs during encryption. VMs with managed disks require a backup before encryption occurs. Once a backup is made, you can use the [Set-AzVMDiskEncryptionExtension cmdlet](/powershell/module/az.compute/set-azvmdiskencryptionextension) to encrypt managed disks by specifying the -skipVmBackup parameter. For more information about how to back up and restore encrypted VMs, see the [Azure Backup](../../backup/backup-azure-vms-encryption.md) article.
2931

30-
>[!WARNING]
31-
> - If you have previously used Azure Disk Encryption with Microsoft Entra ID to encrypt a VM, you must continue use this option to encrypt your VM. See [Azure Disk Encryption with Microsoft Entra ID (previous release)](disk-encryption-overview-aad.md) for details.
32-
>
33-
> - When encrypting Linux OS volumes, the VM should be considered unavailable. We strongly recommend to avoid SSH logins while the encryption is in progress to avoid issues blocking any open files that will need to be accessed during the encryption process. To check progress, use the [Get-AzVMDiskEncryptionStatus](/powershell/module/az.compute/get-azvmdiskencryptionstatus) PowerShell cmdlet or the [vm encryption show](/cli/azure/vm/encryption#az-vm-encryption-show) CLI command. This process can be expected to take a few hours for a 30GB OS volume, plus additional time for encrypting data volumes. Data volume encryption time will be proportional to the size and quantity of the data volumes unless the encrypt format all option is used.
34-
> - Disabling encryption on Linux VMs is only supported for data volumes. It is not supported on data or OS volumes if the OS volume has been encrypted.
32+
## Restrictions
33+
34+
If you have previously used Azure Disk Encryption with Microsoft Entra ID to encrypt a VM, you must continue use this option to encrypt your VM. See [Azure Disk Encryption with Microsoft Entra ID (previous release)](disk-encryption-overview-aad.md) for details.
35+
36+
When encrypting Linux OS volumes, the VM should be considered unavailable. We strongly recommend to avoid SSH logins while the encryption is in progress to avoid issues blocking any open files that will need to be accessed during the encryption process. To check progress, use the [Get-AzVMDiskEncryptionStatus](/powershell/module/az.compute/get-azvmdiskencryptionstatus) PowerShell cmdlet or the [vm encryption show](/cli/azure/vm/encryption#az-vm-encryption-show) CLI command. This process can be expected to take a few hours for a 30GB OS volume, plus additional time for encrypting data volumes. Data volume encryption time will be proportional to the size and quantity of the data volumes unless the encrypt format all option is used.
37+
38+
Disabling encryption on Linux VMs is only supported for data volumes. It is not supported on data or OS volumes if the OS volume has been encrypted.
39+
40+
Azure Disk Encryption does not work for the following Linux scenarios, features, and technology:
41+
42+
- Encrypting basic tier VM or VMs created through the classic VM creation method.
43+
- Disabling encryption on an OS drive or data drive of a Linux VM when the OS drive is encrypted.
44+
- Encrypting the OS drive for Linux Virtual Machine Scale Sets.
45+
- Encrypting custom images on Linux VMs.
46+
- Integration with an on-premises key management system.
47+
- Azure Files (shared file system).
48+
- Network File System (NFS).
49+
- Dynamic volumes.
50+
- Ephemeral OS disks.
51+
- Encryption of shared/distributed file systems like (but not limited to): DFS, GFS, DRDB, and CephFS.
52+
- Moving an encrypted VM to another subscription or region.
53+
- Creating an image or snapshot of an encrypted VM and using it to deploy additional VMs.
54+
- Kernel Crash Dump (kdump).
55+
- Oracle ACFS (ASM Cluster File System).
56+
- NVMe disks such as those on [High performance computing VM sizes](../sizes-hpc.md) or [Storage optimized VM sizes](../sizes-storage.md).
57+
- A VM with "nested mount points"; that is, multiple mount points in a single path (such as "/1stmountpoint/data/2stmountpoint").
58+
- A VM with a data drive mounted on top of an OS folder.
59+
- A VM on which a root (OS disk) logical volume has been extended using a data disk.
60+
- M-series VMs with Write Accelerator disks.
61+
- Applying ADE to a VM that has disks encrypted with [Encryption at Host](../disk-encryption.md#encryption-at-host---end-to-end-encryption-for-your-vm-data) or [server-side encryption with customer-managed keys](../disk-encryption.md) (SSE + CMK). Applying SSE + CMK to a data disk or adding a data disk with SSE + CMK configured to a VM encrypted with ADE is an unsupported scenario as well.
62+
- Migrating a VM that is encrypted with ADE, or has **ever** been encrypted with ADE, to [Encryption at Host](../disk-encryption.md#encryption-at-host---end-to-end-encryption-for-your-vm-data) or [server-side encryption with customer-managed keys](../disk-encryption.md).
63+
- Encrypting VMs in failover clusters.
64+
- Encryption of [Azure ultra disks](../disks-enable-ultra-ssd.md).
65+
- Encryption of [Premium SSD v2 disks](../disks-types.md#premium-ssd-v2-limitations).
66+
- Encryption of VMs in subscriptions that have the [Secrets should have the specified maximum validity period](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F342e8053-e12e-4c44-be01-c3c2f318400f) policy enabled with the [DENY effect](../../governance/policy/concepts/effects.md).
3567

3668
## Install tools and connect to Azure
3769

@@ -408,36 +440,6 @@ You can remove the encryption extension using Azure PowerShell or the Azure CLI.
408440
az vm extension delete -g "MyVirtualMachineResourceGroup" --vm-name "MySecureVM" -n "AzureDiskEncryptionForLinux"
409441
```
410442
411-
## Unsupported scenarios
412-
413-
Azure Disk Encryption does not work for the following Linux scenarios, features, and technology:
414-
415-
- Encrypting basic tier VM or VMs created through the classic VM creation method.
416-
- Disabling encryption on an OS drive or data drive of a Linux VM when the OS drive is encrypted.
417-
- Encrypting the OS drive for Linux Virtual Machine Scale Sets.
418-
- Encrypting custom images on Linux VMs.
419-
- Integration with an on-premises key management system.
420-
- Azure Files (shared file system).
421-
- Network File System (NFS).
422-
- Dynamic volumes.
423-
- Ephemeral OS disks.
424-
- Encryption of shared/distributed file systems like (but not limited to): DFS, GFS, DRDB, and CephFS.
425-
- Moving an encrypted VM to another subscription or region.
426-
- Creating an image or snapshot of an encrypted VM and using it to deploy additional VMs.
427-
- Kernel Crash Dump (kdump).
428-
- Oracle ACFS (ASM Cluster File System).
429-
- NVMe disks such as those on [High performance computing VM sizes](../sizes-hpc.md) or [Storage optimized VM sizes](../sizes-storage.md).
430-
- A VM with "nested mount points"; that is, multiple mount points in a single path (such as "/1stmountpoint/data/2stmountpoint").
431-
- A VM with a data drive mounted on top of an OS folder.
432-
- A VM on which a root (OS disk) logical volume has been extended using a data disk.
433-
- M-series VMs with Write Accelerator disks.
434-
- Applying ADE to a VM that has disks encrypted with [Encryption at Host](../disk-encryption.md#encryption-at-host---end-to-end-encryption-for-your-vm-data) or [server-side encryption with customer-managed keys](../disk-encryption.md) (SSE + CMK). Applying SSE + CMK to a data disk or adding a data disk with SSE + CMK configured to a VM encrypted with ADE is an unsupported scenario as well.
435-
- Migrating a VM that is encrypted with ADE, or has **ever** been encrypted with ADE, to [Encryption at Host](../disk-encryption.md#encryption-at-host---end-to-end-encryption-for-your-vm-data) or [server-side encryption with customer-managed keys](../disk-encryption.md).
436-
- Encrypting VMs in failover clusters.
437-
- Encryption of [Azure ultra disks](../disks-enable-ultra-ssd.md).
438-
- Encryption of [Premium SSD v2 disks](../disks-types.md#premium-ssd-v2-limitations).
439-
- Encryption of VMs in subscriptions that have the [Secrets should have the specified maximum validity period](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F342e8053-e12e-4c44-be01-c3c2f318400f) policy enabled with the [DENY effect](../../governance/policy/concepts/effects.md).
440-
441443
## Next steps
442444
443445
- [Azure Disk Encryption overview](disk-encryption-overview.md)

0 commit comments

Comments
 (0)