Skip to content

Commit 71ccc9e

Browse files
Update boot-integrity-monitoring-overview.md - Acrolinx, grammar fixes
1 parent 047af87 commit 71ccc9e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/virtual-machines/boot-integrity-monitoring-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ You can deploy the guest attestation extension for trusted launch VMs using a qu
125125

126126
If Secure Boot and vTPM are ON, boot integrity will be ON.
127127

128-
1. Create a virtual machine with Trusted Launch that has Secure Boot + vTPM capabilities through initial deployment of the trusted launch virtual machine. Configuration of virtual machines are customizable by virtual machine owner.
128+
1. Create a virtual machine with Trusted Launch that has Secure Boot + vTPM capabilities through initial deployment of the trusted launch virtual machine. Configuration of virtual machines is customizable by virtual machine owner.
129129
1. For existing VMs, you can enable boot integrity monitoring settings by updating to make sure both SecureBoot and vTPM are on.
130130

131131
For more information on creation or updating a virtual machine to include the boot integrity monitoring through the guest attestation extension, see [Deploy a VM with trusted launch enabled (PowerShell)](trusted-launch-portal.md#deploy-a-trusted-launch-vm).
@@ -153,7 +153,7 @@ Unblocking Microsoft Azure Attestation traffic in **Network Security Groups** us
153153
1. To allow Microsoft Azure Attestation, make the destination a **service tag**. This allows for the range of IP addresses to update and automatically set allow rules for Microsoft Azure Attestation. The destination service tag is **AzureAttestation** and action is set to **Allow**.
154154
:::image type="content" source="media/trusted-launch/unblocking-NSG.png" alt-text="Screenshot showing how to make the destination a service tag.":::
155155

156-
Firewalls protects a virtual network, which contains multiple Trusted Launch virtual machines. To unblock Microsoft Azure Attestation traffic in **Firewall** using application rule collection.
156+
Firewalls protect a virtual network, which contains multiple Trusted Launch virtual machines. To unblock Microsoft Azure Attestation traffic in **Firewall** using application rule collection.
157157

158158
1. Navigate to the Azure Firewall, that has traffic blocked from the Trusted Launch virtual machine resource.
159159
2. Under settings, select Rules (classic) to begin unblocking guest attestation behind the Firewall.
@@ -180,4 +180,4 @@ Azure Attestation provides a [regional shared provider](https://maainfo.azureweb
180180

181181
## Next steps
182182

183-
Learn more about [trusted launch](trusted-launch.md) and [deploying a trusted virtual machine](trusted-launch-portal.md).
183+
Learn more about [trusted launch](trusted-launch.md) and [deploying a trusted virtual machine](trusted-launch-portal.md).

0 commit comments

Comments
 (0)