Skip to content

Commit 42e8699

Browse files
committed
Addressed PR feedback
1 parent 6df64da commit 42e8699

File tree

2 files changed

+6
-8
lines changed

2 files changed

+6
-8
lines changed

articles/security/azure-security-disk-encryption-overview.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Azure Disk Encryption does not work for the following scenarios, features, and t
6161

6262
* Encrypting basic tier VM or VMs created through the classic VM creation method.
6363
* Disabling encryption on an OS drive or data drive of a Linux VM when the OS drive is encrypted.
64-
* Encrypting OS drive for Linux virtual machine scale sets.
64+
* Encrypting OS drive for Linux virtual machine scale sets.
6565
* Encrypting Windows VMs configured with software-based RAID systems.
6666
* Encrypting custom images on Linux VMs.
6767
* Integration with an on-premises key management system.
@@ -74,7 +74,7 @@ Azure Disk Encryption does not work for the following scenarios, features, and t
7474
When you enable and deploy Azure Disk Encryption for Azure VMs, you can configure the following capabilities to be enabled:
7575

7676
* Encrypting the OS volume to protect the boot volume at rest in your storage.
77-
* Encryptng data volumes to protect the data volumes at rest in your storage.
77+
* Encrypting data volumes to protect the data volumes at rest in your storage.
7878
* Disabling encryption on the OS and data drives for Windows VMs.
7979
* Disabling encryption on the data drives for Linux VMs (only when the OS drive isn't encrypted).
8080
* Safeguarding the encryption keys and secrets in your Azure Key Vault subscription.
@@ -86,7 +86,7 @@ Azure Disk Encryption for VMs for Windows and Linux includes:
8686

8787
* [The disk encryption extension for Windows](../virtual-machines/extensions/azure-disk-enc-windows.md).
8888
* [The disk encryption extension for Linux](../virtual-machines/extensions/azure-disk-enc-linux.md).
89-
* T[he PowerShell disk encryption cmdlets](/powershell/module/az.compute/set-azvmdiskencryptionextension?view=azps-2.2.0).
89+
* [The PowerShell disk encryption cmdlets](/powershell/module/az.compute/set-azvmdiskencryptionextension?view=azps-2.2.0).
9090
* [The Azure CLI disk encryption cmdlets](/cli/azure/vm/encryption?view=azure-cli-latest).
9191
* [The Azure Resource Manager disk encryption templates](azure-security-disk-encryption-appendix.md#resource-manager-templates).
9292

@@ -163,5 +163,3 @@ The following table defines some of the common terms used in Azure disk encrypti
163163

164164
To get started, see the [Azure Disk Encryption prerequisites](azure-security-disk-encryption-prerequisites.md).
165165

166-
> [!div class="nextstepaction"]
167-
> [Azure Disk Encryption prerequisites](azure-security-disk-encryption-prerequisites.md)

articles/security/azure-security-disk-encryption-prerequisites.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ An example of commands that can be used to mount the data disks and create the n
5757
**Group Policy:**
5858
- The Azure Disk Encryption solution uses the BitLocker external key protector for Windows IaaS VMs. For domain joined VMs, don't push any group policies that enforce TPM protectors. For information about the group policy for “Allow BitLocker without a compatible TPM,” see [BitLocker Group Policy Reference](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#a-href-idbkmk-unlockpol1arequire-additional-authentication-at-startup).
5959

60-
- BitLocker policy on domain joined virtual machines with custom group policy must include the following setting: [Configure user storage of bitlocker recovery information -> Allow 256-bit recovery key](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings). Azure Disk Encryption will fail when custom group policy settings for BitLocker are incompatible. On machines that didn't have the correct policy setting, apply the new policy, force the new policy to update (gpupdate.exe /force), and then restarting may be required.
60+
- BitLocker policy on domain joined virtual machines with custom group policy must include the following setting: [Configure user storage of BitLocker recovery information -> Allow 256-bit recovery key](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings). Azure Disk Encryption will fail when custom group policy settings for BitLocker are incompatible. On machines that didn't have the correct policy setting, apply the new policy, force the new policy to update (gpupdate.exe /force), and then restarting may be required.
6161

62-
- Azure Disk Encryption will fail if domain level group policy blocks the AES-CBC algorithm, which is used by Bitlocker.
62+
- Azure Disk Encryption will fail if domain level group policy blocks the AES-CBC algorithm, which is used by BitLocker.
6363

6464

6565
## <a name="bkmk_PSH"></a> Azure PowerShell
@@ -239,7 +239,7 @@ Use [az keyvault update](/cli/azure/keyvault#az-keyvault-update) to enable disk
239239
3. Select **Enable access to Azure Virtual Machines for deployment** and/or **Enable Access to Azure Resource Manager for template deployment**, if needed.
240240
4. Click **Save**.
241241
242-
![Azure key vault advanced access policies](./media/azure-security-disk-encryption/keyvault-portal-fig4.png)
242+
![Azure key vault advanced access policies](./media/azure-security-disk-encryption/keyvault-portal-fig4.png)
243243
244244
245245
## <a name="bkmk_KEK"></a> Set up a key encryption key (optional)

0 commit comments

Comments
 (0)