You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**Applies to:**:heavy_check_mark: Linux VM :heavy_check_mark: Windows VM :heavy_check_mark: Generation 2 VM
17
17
18
-
Azure Virtual Machines supports enabling Trusted Launch on existing [Azure Generation 2](generation-2.md) VMs by upgrading to [Trusted launch](trusted-launch.md) security type.
18
+
Azure Virtual Machines supports enabling Trusted launch on existing [Azure Generation 2](generation-2.md) VMs by upgrading to [Trusted launch](trusted-launch.md) security type.
19
19
20
20
[Trusted launch](trusted-launch.md) is a way to enable foundational compute security on [Azure Generation 2 VMs](generation-2.md). Trusted launch protects your Virtual Machines against advanced and persistent attack techniques like boot kits and rootkits by combining infrastructure technologies like Secure Boot, vTPM and Boot Integrity Monitoring on your VM.
21
21
22
22
> [!IMPORTANT]
23
-
> Enabling Trusted Launch on existing virtual machines (VMs) is currently not supported for following scenarios:
23
+
> Enabling Trusted launch on existing virtual machines (VMs) is currently not supported for following scenarios:
24
24
>
25
25
> - Azure Generation 1 VMs is currently not supported.
26
-
> - Azure Virtual Machine Scale Sets (VMSS) Uniform & Flex is currently not supported.
26
+
> - Azure Virtual Machine Scale Sets (VMSS) Uniform & Flex are currently not supported.
-[Trusted Launch supported OS Image](trusted-launch.md#operating-systems-supported). For custom OS image or disks, the base image should be **Trusted Launch capable**.
33
-
- Azure Generation 2 VM(s) is not using [features currently not supported with Trusted Launch](trusted-launch.md#unsupported-features).
34
-
- Azure Generation 2 VM(s) should be **stopped and deallocated** before enabling Trusted Launch security type.
35
-
- Azure Backup if enabled for Generation 2 VM(s) should be configured with [Enhanced Backup Policy](../backup/backup-azure-vms-enhanced-policy.md). Trusted Launch security type cannot be enabled for Generation 2 VM(s) configured with *Standard Policy* backup protection.
-[Trusted launch supported OS Image](trusted-launch.md#operating-systems-supported). For custom OS image or disks, the base image should be **Trusted launch capable**.
33
+
- Azure Generation 2 VM(s) is not using [features currently not supported with Trusted launch](trusted-launch.md#unsupported-features).
34
+
- Azure Generation 2 VM(s) should be **stopped and deallocated** before enabling Trusted launch security type.
35
+
- Azure Backup if enabled for Generation 2 VM(s) should be configured with [Enhanced Backup Policy](../backup/backup-azure-vms-enhanced-policy.md). Trusted launch security type cannot be enabled for Generation 2 VM(s) configured with *Standard Policy* backup protection.
36
36
37
37
## Best practices
38
38
39
-
-[Create restore point](create-restore-points.md) for Azure Generation 2 VM(s) before enabling Trusted Launch security type. You can use the Restore Point to re-create the disks and Generation 2 VM with the previous well-known state.
40
-
-Enable Trusted launch on a test Generation 2 VM and ensure if any changes are required to meet the prerequisites before enabling Trusted Launch on Generation 2 VMs running production workloads.
39
+
-Enable Trusted launch on a test Generation 2 VM and ensure if any changes are required to meet the prerequisites before enabling Trusted launch on Generation 2 VMs associated with production workloads.
40
+
-[Create restore point](create-restore-points.md) for Azure Generation 2 VM(s) associated with production workloads before enabling Trusted launch security type. You can use the Restore Point to re-create the disks and Generation 2 VM with the previous well-known state.
41
41
42
-
## Enable Trusted Launch on existing VM
42
+
## Enable Trusted launch on existing VM
43
+
44
+
> [!NOTE]
45
+
>
46
+
> - After enabling Trusted launch, currently virtual machines cannot be rolled back to security type **Standard** (Non-Trusted launch configuration).
47
+
> -**vTPM** is enabled by default.
48
+
> -**Secure Boot** is recommended to be enabled (not enabled by default) if you are not using custom unsigned kernel or drivers. Secure Boot preserves boot integrity and enables foundational security for VM.
49
+
50
+
### [Portal](#tab/portal)
51
+
52
+
This section steps through using the Azure portal to enable Trusted launch on existing Azure Generation 2 VM.
53
+
54
+
1. Log in to [Azure portal](https://portal.azure.com)
55
+
2. Validate virtual machine generation is **V2** and **Stop** VM.
56
+
57
+
:::image type="content" source="./media/trusted-launch/02-generation-2-to-trusted-launch-stop-vm.png" alt-text="Screenshot of the Gen2 VM to be de-allocated.":::
58
+
59
+
3. On **Overview** page in VM **Properties**, Select **Standard** under **Security type**. This navigates to **Configuration** page for VM.
60
+
61
+
:::image type="content" source="./media/trusted-launch/03-generation-2-to-trusted-launch-click-standard.png" alt-text="Screenshot of the Security type Standard.":::
62
+
63
+
4. Select drop-down **Security type** under **Security type** section of **Configuration** page.
64
+
65
+
:::image type="content" source="./media/trusted-launch/04-generation-2-to-trusted-launch-select-dropdown.png" alt-text="Screenshot of the Security type drop-down.":::
66
+
67
+
5. Select **Trusted launch** under drop-down and select check-boxes to enable **Secure Boot** and **vTPM**. Click **Save** after making required changes.
68
+
69
+
> [!NOTE]
70
+
>
71
+
> - Generation 2 VMs created using [Azure Compute Gallery (ACG)](azure-compute-gallery.md), [Managed Image](capture-image-resource.md), [OS Disk](./scripts/create-vm-from-managed-os-disks.md) cannot be upgraded to Trusted launch using Portal. Please ensure [OS Version is supported for Trusted launch](trusted-launch.md#operating-systems-supported) and use PowerShell, CLI or ARM template to execute upgrade.
72
+
73
+
:::image type="content" source="./media/trusted-launch/05-generation-2-to-trusted-launch-select-uefi-settings.png" alt-text="Screenshot of the Secure boot and vTPM settings.":::
74
+
75
+
6. Close the **Configuration** page once the update is successfully complete and validate **Security type** under VM properties on **Overview** page.
76
+
77
+
:::image type="content" source="./media/trusted-launch/06-generation-2-to-trusted-launch-validate-uefi.png" alt-text="Screenshot of the Trusted launch upgraded VM.":::
78
+
79
+
7. Start the upgraded Trusted launch VM and ensure that it has started successfully and verify that you are able to log in to the VM using either RDP (for Windows VM) or SSH (for Linux VM).
43
80
44
81
### [CLI](#tab/cli)
45
82
46
-
This section steps through using the Azure CLI to enable Trusted Launch on existing Azure Generation 2 VM.
83
+
This section steps through using the Azure CLI to enable Trusted launch on existing Azure Generation 2 VM.
47
84
48
85
Make sure that you've installed the latest [Azure CLI](/cli/azure/install-az-cli2) and are logged in to an Azure account with [az login](/cli/azure/reference-index).
49
86
@@ -62,13 +99,7 @@ az vm deallocate \
62
99
--resource-group myResourceGroup --name myVm
63
100
```
64
101
65
-
3. Enable Trusted Launch by setting `--security-type` to `TrustedLaunch`.
66
-
67
-
> [!NOTE]
68
-
>
69
-
> - After enabling Trusted Launch, currently virtual machine cannot be rolled back to security type **Standard** (Non-Trusted Launch configuration).
70
-
> -**vTPM** is enabled by default.
71
-
> -**Secure Boot** is recommended to be enabled (not enabled by default) if you are not using custom unsigned kernel or drivers. Secure Boot preserves boot integrity and enables foundational security for VM.
102
+
3. Enable Trusted launch by setting `--security-type` to `TrustedLaunch`.
72
103
73
104
```azurecli-interactive
74
105
az vm update \
@@ -98,11 +129,11 @@ az vm start \
98
129
--resource-group myResourceGroup --name myVm
99
130
```
100
131
101
-
6. Start the upgraded Trusted Launch VM and ensure that it has started successfully and verify that you are able to log in to the VM using either RDP (for Windows VM) or SSH (for Linux VM).
132
+
6. Start the upgraded Trusted launch VM and ensure that it has started successfully and verify that you are able to log in to the VM using either RDP (for Windows VM) or SSH (for Linux VM).
102
133
103
134
### [PowerShell](#tab/powershell)
104
135
105
-
This section steps through using the Azure PowerShell to enable Trusted Launch on existing Azure Generation 2 VM.
136
+
This section steps through using the Azure PowerShell to enable Trusted launch on existing Azure Generation 2 VM.
106
137
107
138
Make sure that you've installed the latest [Azure PowerShell](/powershell/azure/install-azps-windows) and are logged in to an Azure account with [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount).
3. Enable Trusted Launch by setting `--security-type` to `TrustedLaunch`.
122
-
123
-
> [!NOTE]
124
-
>
125
-
> - After enabling Trusted Launch, currently virtual machine cannot be rolled back to security type **Standard** (Non-Trusted Launch configuration).
126
-
> -**vTPM** is enabled by default.
127
-
> -**Secure Boot** is recommended to be enabled (not enabled by default) if you are not using custom unsigned kernel or drivers. Secure Boot preserves boot integrity and enables foundational security for VM.
152
+
3. Enable Trusted launch by setting `--security-type` to `TrustedLaunch`.
6. Start the upgraded Trusted Launch VM and ensure that it has started successfully and verify that you are able to log in to the VM using either RDP (for Windows VM) or SSH (for Linux VM).
182
+
6. Start the upgraded Trusted launch VM and ensure that it has started successfully and verify that you are able to log in to the VM using either RDP (for Windows VM) or SSH (for Linux VM).
158
183
159
184
### [Template](#tab/template)
160
185
161
-
This section steps through using an ARM template to enable Trusted Launch on existing Azure Generation 2 VM.
186
+
This section steps through using an ARM template to enable Trusted launch on existing Azure Generation 2 VM.
@@ -240,13 +265,7 @@ Property | Description of Property | Example template value
240
265
-|-|-
241
266
vmName | Name of Azure Generation 2 VM | "myVm"
242
267
location | Location of Azure Generation 2 VM | "westus3"
243
-
secureBootEnabled | Enable secure boot with Trusted Launch security type | true
244
-
245
-
> [!NOTE]
246
-
>
247
-
> - After enabling Trusted Launch, currently virtual machine cannot be rolled back to security type **Standard** (Non-Trusted Launch configuration).
248
-
> -**vTPM** is enabled by default.
249
-
> -**Secure Boot** is recommended to be enabled (not enabled by default) if you are not using custom unsigned kernel or drivers. Secure Boot preserves boot integrity and enables foundational security for VM.
268
+
secureBootEnabled | Enable secure boot with Trusted launch security type | true
250
269
251
270
3.**Deallocate** all Azure Generation 2 VM(s) to be updated.
5. Verify that the deployment is successful. Check for the security type and UEFI settings of the VM using Azure portal. Check the Security type section in the Overview page.
270
289
271
-
:::image type="content" source="./media/trusted-launch/generation-2-trusted-launch-settings.png" alt-text="Screenshot of the Trusted Launch properties of the VM.":::
290
+
:::image type="content" source="./media/trusted-launch/generation-2-trusted-launch-settings.png" alt-text="Screenshot of the Trusted launch properties of the VM.":::
272
291
273
-
6. Start the upgraded Trusted Launch VM and ensure that it has started successfully and verify that you are able to log in to the VM using either RDP (for Windows VM) or SSH (for Linux VM).
292
+
6. Start the upgraded Trusted launch VM and ensure that it has started successfully and verify that you are able to log in to the VM using either RDP (for Windows VM) or SSH (for Linux VM).
274
293
275
294
---
276
295
277
296
## Next steps
278
297
279
-
**(Recommended)** Post-Upgrades enable [Boot Integrity Monitoring](trusted-launch.md#microsoft-defender-for-cloud-integration) to monitor the health of the VM using Microsoft Defender for Cloud.
298
+
**(Recommended)** Post-Upgrades enable [Boot integrity monitoring](trusted-launch.md#microsoft-defender-for-cloud-integration) to monitor the health of the VM using Microsoft Defender for Cloud.
280
299
281
-
Learn more about [trusted launch](trusted-launch.md) and review [frequently asked questions](trusted-launch-faq.md)
300
+
Learn more about [Trusted launch](trusted-launch.md) and review [frequently asked questions](trusted-launch-faq.md)
0 commit comments