Skip to content

Commit 651a259

Browse files
Merge pull request #280850 from Howie425/patch-18
Update trusted-launch-faq.md
2 parents 15ccc4a + d9ce37c commit 651a259

File tree

1 file changed

+30
-6
lines changed

1 file changed

+30
-6
lines changed

articles/virtual-machines/trusted-launch-faq.md

Lines changed: 30 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,20 +23,27 @@ Frequently asked questions (FAQs) about Azure Trusted Launch feature use cases,
2323
This section answers questions about use cases for Trusted Launch.
2424

2525
### Why should I use Trusted Launch? What does Trusted Launch guard against?
26-
2726
Trusted Launch guards against boot kits, rootkits, and kernel-level malware. These sophisticated types of malware run in kernel mode and remain hidden from users. For example:
2827

2928
- **Firmware rootkits**: These kits overwrite the firmware of the virtual machine (VM) BIOS, so the rootkit can start before the operating system (OS).
3029
- **Boot kits**: These kits replace the OS's bootloader so that the VM loads the boot kit before the OS.
3130
- **Kernel rootkits**: These kits replace a portion of the OS kernel, so the rootkit can start automatically when the OS loads.
3231
- **Driver rootkits**: These kits pretend to be one of the trusted drivers that the OS uses to communicate with the VM's components.
3332

33+
### What are the differences between Secure Boot and measured boot?
34+
35+
In a Secure Boot chain, each step in the boot process checks a cryptographic signature of the subsequent steps. For example, the BIOS checks a signature on the loader, and the loader checks signatures on all the kernel objects that it loads, and so on. If any of the objects are compromised, the signature doesn't match and the VM doesn't boot. For more information, see [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot).
36+
3437
### How does Trusted Launch compare to Hyper-V Shielded VM?
3538

3639
Hyper-V Shielded VM is currently available on Hyper-V only. [Hyper-V Shielded VM](/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-and-shielded-vms) is typically deployed with Guarded Fabric. A Guarded Fabric consists of a Host Guardian Service (HGS), one or more guarded hosts, and a set of Shielded VMs. Hyper-V Shielded VMs are used in fabrics where the data and state of the VM must be protected from various actors. These actors are both fabric administrators and untrusted software that might be running on the Hyper-V hosts.
3740

3841
Trusted Launch, on the other hand, can be deployed as a standalone VM or as virtual machine scale sets on Azure without other deployment and management of HGS. All of the Trusted Launch features can be enabled with a simple change in deployment code or a checkbox on the Azure portal.
3942

43+
### What is VM Guest State (VMGS)?
44+
45+
VM Guest State (VMGS) is specific to Trusted Launch VMs. It's a blob managed by Azure and contains the unified extensible firmware interface (UEFI) Secure Boot signature databases and other security information. The lifecycle of the VMGS blob is tied to that of the OS disk.
46+
4047
### Can I disable Trusted Launch for a new VM deployment?
4148

4249
Trusted Launch VMs provide you with foundational compute security. We recommend that you don't disable them for new VM or virtual machine scale set deployments except if your deployments have dependency on:
@@ -378,17 +385,34 @@ Architecture : x64
378385

379386
Adding COM ports requires that you disable Secure Boot. COM ports are disabled by default in Trusted Launch VMs.
380387

381-
## Troubleshooting boot issues
388+
## Troubleshooting issues
382389

383390
This section answers questions about specific states, boot types, and common boot issues.
384391

385-
### What is VM Guest State (VMGS)?
392+
### What should I do when my Trusted Launch VM has deployment failures ?
393+
This section provides additional details on Trusted Launch deployment failures for you to take proper action to prevent them.
386394

387-
VM Guest State (VMGS) is specific to Trusted Launch VMs. It's a blob managed by Azure and contains the unified extensible firmware interface (UEFI) Secure Boot signature databases and other security information. The lifecycle of the VMGS blob is tied to that of the OS disk.
395+
```
396+
Virtual machine <vm name> failed to create from the selected snapshot because the virtual Trusted Platform Module (vTPM) state is locked.
397+
To proceed with the VM creation, please select a different snapshot without a locked vTPM state.
398+
For more assistance, please refer to “Troubleshooting locked vTPM state” in FAQ page at https://aka.ms/TrustedLaunch-FAQ.
399+
```
400+
This deployment error happens when the snapshot or restore point provided is inaccessible or unusable for the following reasons:
401+
1. Corrupt virtual machine guest state (VMGS)
402+
2. vTPM in a locked state
403+
3. One or more critical vTPM indices are in an invalid state.
388404

389-
### What are the differences between Secure Boot and measured boot?
405+
The above can happen if a user or workload running on the virtual machine sets the lock on vTPM or modifies critical vTPM indices that leaves the vTPM in an invalid state.
390406

391-
In a Secure Boot chain, each step in the boot process checks a cryptographic signature of the subsequent steps. For example, the BIOS checks a signature on the loader, and the loader checks signatures on all the kernel objects that it loads, and so on. If any of the objects are compromised, the signature doesn't match and the VM doesn't boot. For more information, see [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot).
407+
Retrying with the same snapshot/restore point will result in the same failure.
408+
409+
To resolve this:
410+
411+
1. On the source Trusted Launch VM where the snapshot or restore point was generated, the vTPM errors must be rectified.
412+
1. If the vTPM state was modified by a workload on the virtual machine, you need to use the same to check the error states and bring the vTPM to a non-error state.
413+
1. If TPM tools were used to modify the vTPM state, then you should use the same tools to check the error states and bring the vTPM to a non-error state.
414+
415+
Once the snapshot or restore point is free from these errors, you can use this to create a new Trusted Launch VM.
392416

393417
### Why is the Trusted Launch VM not booting correctly?
394418

0 commit comments

Comments
 (0)