You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: This article provides instructions on verifying the encryption status from platform and OS level.
2
+
title: Verify encryption status for Linux - Azure Disk Encryption
3
+
description: This article provides instructions on verifying the encryption status from the platform and OS levels.
4
4
author: kailashmsft
5
5
ms.service: security
6
6
ms.topic: article
@@ -13,79 +13,60 @@ ms.custom: seodec18
13
13
14
14
15
15
16
-
# How to verify encryption status for Linux
16
+
# Verify encryption status for Linux
17
17
18
-
**This scenario applies for ADE dual-pass and single-pass extensions.**
19
-
This Document scope is to validate the encryption status of a virtual machine using different methods.
18
+
The scope of this article is to validate the encryption status of a virtual machine by using different methods: the Azure portal, PowerShell, the Azure CLI, or the operating system of the virtual machine (VM).
20
19
21
-
### Environment
20
+
You can validate the encryption status during or after the encryption, by either:
22
21
23
-
- Linux distributions
22
+
- Checking the disks attached to a particular VM.
23
+
- Querying the encryption settings on each disk, whether the disk is attached or unattached.
24
24
25
-
### Procedure
26
-
27
-
A virtual machine has been encrypted using dual-pass or single-pass.
28
-
29
-
The encryption status can be validated during or after the encryption using different methods.
25
+
This scenario applies for Azure Disk Encryption dual-pass and single-pass extensions. Linux distributions are the only environment for this scenario.
30
26
31
27
>[!NOTE]
32
-
>We're using variables throughout the document, replace the values accordingly.
33
-
34
-
### Verification
35
-
36
-
The verification can be done from the Portal, PowerShell, AZ CLI and, or from the VM OS side.
37
-
38
-
This verification can be done by checking the disks attached to a particular VM.
39
-
40
-
Or by querying the encryption settings on each individual disk whether the disk is attached or unattached.
41
-
42
-
Below the different validations methods:
28
+
>We're using variables throughout the article. Replace the values accordingly.
43
29
44
-
## Using the Portal
30
+
## Portal
45
31
46
-
Validate the encryption status by checking the extensions section on the Azure portal.
32
+
In the Azure portal, inside the **Extensions** section, select the Azure Disk Encryption extension in the list. The information for **Status message** indicates the current encryption status:
47
33
48
-
Inside the **Extensions** section, you'll see the ADE extension listed.
34
+

49
35
50
-
Click it and take a look at the **status message**, it will indicate the current encryption status:
36
+
In the list of extensions, you'll see the corresponding Azure Disk Encryption extension version. Version 0.x corresponds to Azure Disk Encryption dual pass, and version 1.x corresponds to Azure Disk Encryption single pass.
51
37
52
-

38
+
You can get more details by selecting the extension and then selecting **View detailed status**. The detailed status of the encryption process appears in JSON format.
53
39
54
-
In the list of extensions, you'll see the corresponding ADE extension version. Version 0.x corresponds to ADE Dual-Pass and version 1.x corresponds to ADE Single-pass.
40
+

55
41
56
-
You can get further details clicking on the extension and then on *View detailed status*.
42
+

57
43
58
-
You'll see a more detailed status of the encryption process in json format:
44
+
Another way to validate the encryption status is by looking at the **Disk settings** section.
59
45
60
-

61
-
62
-

63
-
64
-
Another way of validating the encryption status is by taking a look at the **Disks** section.
65
-
66
-

46
+

67
47
68
48
>[!NOTE]
69
-
> This status means the disks have encryption settings stamped but not that they were actually encrypted at OS level.
70
-
> By design, the disks get stamped first and encrypted later.
71
-
> If the encryption process fails, the disks may end up stamped but not encrypted.
72
-
> To confirm if the disks are truly encrypted, you can double check the encryption of each disk at OS level.
49
+
> This status means the disks have encryption settings stamped, not that they were actually encrypted at the OS level.
50
+
>
51
+
> By design, the disks are stamped first and encrypted later. If the encryption process fails, the disks may end up stamped but not encrypted.
52
+
>
53
+
> To confirm if the disks are truly encrypted, you can double check the encryption of each disk at the OS level.
73
54
74
-
## Using PowerShell
55
+
## PowerShell
75
56
76
-
You can validate the **general** encryption status of an encrypted VM using the following PowerShell commands:
57
+
You can validate the *general* encryption status of an encrypted VM by using the following PowerShell commands:

84
65
85
-
You can capture the encryption settings from each individual disk using the following PowerShell commands:
66
+
You can capture the encryption settings from each disk by using the following PowerShell commands.
86
67
87
-
### Single-Pass
88
-
If single-pass, the encryption settings are stamp on each of the disks (OS and Data), you can capture the OS disk encryption settings in single pass as follows:
68
+
### Single pass
69
+
In a singlepass, the encryption settings are stamped on each of the disks (OS and data). You can capture the encryption settings for an OS disk in a single pass as follows:
You can get further details using the following "lsblk" variant.
328
+

355
329
356
-
You'll see a **crypt** type layer that is mounted by the extension.
330
+
You can get more details by using the following **lsblk** variant.
357
331
358
-
The following example shows Logical Volumes and normal disks having a "**crypto\_LUKS FSTYPE**".
332
+
You'll see a **crypt** type layer that is mounted by the extension. The following example shows logical volumes and normal disks having **crypto\_LUKS FSTYPE**.
0 commit comments