You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Learn how to configure Virtual Machines - Virtual Trusted Platform Module (vTPM).
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 11/22/2024
6
+
ms.date: 11/25/2024
7
7
ms.custom: engagement-fy25
8
8
---
9
9
@@ -13,9 +13,9 @@ This article demonstrates how to enable the virtual Trusted Platform Module (vTP
13
13
14
14
A virtual Trusted Platform Module (vTPM) in VMware vSphere is a virtual counterpart of a physical TPM 2.0 chip, utilizing VM Encryption. It provides the same functionalities as a physical TPM but operates within VMs. Each VM can have its own unique and isolated vTPM, which helps secure sensitive information and maintain system integrity. This setting enables VMs to apply security features like BitLocker disk encryption and authenticate virtual hardware devices, creating a more secure virtual environment.
15
15
16
-
## Pre-requisites
16
+
## Prerequisites
17
17
18
-
Before configuring vTPM on a VM in Azure VMware Solution, ensure the following pre-requisites are met:
18
+
Before configuring vTPM on a VM in Azure VMware Solution, ensure the following prerequisites are met:
19
19
20
20
- The virtual machine must use EFI firmware.
21
21
- The virtual machine must be at hardware version 14 or later.
@@ -24,6 +24,31 @@ Before configuring vTPM on a VM in Azure VMware Solution, ensure the following p
24
24
>[!IMPORTANT]
25
25
>Customers do not need to configure a key provider to use vTPM with Azure VMware Solution. Azure VMware Solution already provides and manages key providers for each environment.
26
26
27
+
## Trusted Launch for Azure VMware Solution
28
+
29
+
Trusted Launch is a comprehensive security solution that encompasses three key components: Secure Boot, Virtual Trusted Platform Module (vTPM), and Virtualization-based security (VBS). Each of these components plays a vital role in fortifying the security posture of VMs.
30
+
31
+
## Benefits
32
+
33
+
• Securely deploy VMs with verified boot loaders, operating system (OS) kernels, and drivers.
34
+
35
+
• Securely protect keys, certificates, and secrets in the VMs.
36
+
• Gain insights and confidence of the entire boot chain's integrity.
37
+
38
+
• Ensure that workloads are trusted and verifiable.
39
+
40
+
### Secure Boot
41
+
42
+
Secure Boot is the first line of defense in Trusted Launch. It establishes a "root of trust" for VMs by ensuring that only signed operating systems and drivers are allowed to boot. This prevents the installation of malware-based rootkits and bootkits, which can compromise the security of the entire system. With Secure Boot enabled, every aspect of the boot process, from the boot loader to the kernel and kernel drivers, must be digitally signed by trusted publishers. This creates a robust shield against unauthorized modifications and ensures that the VM starts in a secure and trusted state.
43
+
44
+
## Virtual Trusted Platform Module (vTPM)
45
+
46
+
The vTPM is a virtualized version of a hardware Trusted Platform Module (TPM) 2.0 device. It serves as a dedicated secure vault for storing keys, certificates, and secrets. What sets vTPM apart is its ability to operate in a secure environment outside the reach of any VM, making it tamper-resistant and highly secure. One of the key functions of vTPM is attestation. It measures the entire boot chain of a VM, including UEFI, OS, system components, and drivers, to certify that the VM booted securely. This attestation mechanism is invaluable for verifying the integrity of VMs and ensuring that they haven't been compromised.
47
+
48
+
## Virtualization-based Security (VBS)
49
+
50
+
VBS is the final piece of the Trusted Launch puzzle. It leverages the hypervisor to create isolated, secure memory regions within the VM. VBS uses virtualization to enhance system security by creating an isolated, hypervisor-restricted, specialized subsystem. It provides protection against unauthorized access of credential, prevents malware from running on windows system and ensures only trusted code runs from bootloader onwards.
51
+
27
52
## How to Configure vTPM
28
53
29
54
To configure vTPM on a VM in Azure VMware Solution, follow these steps:
@@ -43,7 +68,7 @@ To configure vTPM on a VM in Azure VMware Solution, follow these steps:
43
68
44
69
## Unsupported scenarios
45
70
46
-
Migration of VMs with vTPM may not be supported by some tools. Check the documentation of the migration tool. If it is not supported, you can follow VMware documentation to safely disable vTPM and re-enable it post-migration.
71
+
Migration of VMs with vTPM might not be supported by some tools. Check the documentation of the migration tool. If it isn't supported, you can follow VMware documentation to safely disable vTPM and re-enable it post-migration.
47
72
48
73
## More information
49
74
[Securing Virtual Machines with Virtual Trusted Platform Module](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.vm_admin.doc/GUID-A43B6914-E5F9-4CB1-9277-448AC9C467FB.html)
Copy file name to clipboardExpand all lines: articles/event-grid/mqtt-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,7 +102,7 @@ Event Grid allows you to route your MQTT messages to Azure services or webhooks
102
102
:::image type="content" source="media/mqtt-overview/routing-high-res.png" alt-text="Diagram of the MQTT message routing." border="false":::
103
103
104
104
### Edge MQTT broker integration
105
-
Event Grid integrates with [Azure IoT MQ](https://aka.ms/iot-mq) to bridge its MQTT broker capability on the edge with Azure Event Grid’s MQTT broker feature in the cloud. Azure IoT MQ is a new distributed MQTT broker for edge computing, running on Arc enabled Kubernetes clusters. It can connect to Event Grid MQTT broker with Microsoft Entra ID (formerly Azure Active Directory) authentication using system-assigned managed identity, which simplifies credential management. Azure IoT MQ provides high availability, scalability, and security for your IoT devices and applications. It's now available in [public preview](https://aka.ms/iot-mq-preview) as part of Azure IoT Operations. [Learn more about connecting Azure IoT MQ to Azure Event Grid's MQTT broker](https://aka.ms/iot-mq-eg-bridge).
105
+
Event Grid integrates with [Azure IoT Operations](https://aka.ms/iot-mq) to bridge its MQTT broker capability on the edge with Azure Event Grid’s MQTT broker feature in the cloud. Azure IoT Operations provides a new distributed MQTT broker for edge computing, running on Arc enabled Kubernetes clusters. It can connect to Event Grid MQTT broker with Microsoft Entra ID (formerly Azure Active Directory) authentication using system-assigned managed identity, which simplifies credential management. MQTT Broker provides high availability, scalability, and security for your IoT devices and applications. It's now available in [public preview](https://aka.ms/iot-mq-preview) as part of Azure IoT Operations. [Learn more about connecting Azure IoT Operations MQTT Broker to Azure Event Grid's MQTT broker](https://aka.ms/iot-mq-eg-bridge).
Copy file name to clipboardExpand all lines: articles/event-hubs/schema-registry-concepts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Schema group is a logical group of similar schemas based on your business criter
22
22
The security boundary imposed by the grouping mechanism help ensures that trade secrets don't inadvertently leak through metadata in situations where the namespace is shared among multiple partners. It also allows for application owners to manage schemas independent of other applications that share the same namespace.
23
23
24
24
### Schemas
25
-
Schemas define the contract between producers and consumers. A schema defined in an Event Hubs schema registry helps manage the contract outside of event data, thus removing the payload overhead. A schema has a name, type (example: record, array, and so on.), compatibility mode (none, forward, backward, full), and serialization type (only Avro for now). You can create multiple versions of a schema and retrieve and use a specific version of a schema.
25
+
Schemas define the contract between producers and consumers. A schema defined in an Event Hubs schema registry helps manage the contract outside of event data, thus removing the payload overhead. A schema has a name, type (example: record, array, and so on.), compatibility mode (none, forward, backward, full), and serialization type (both Avro and JSON). You can create multiple versions of a schema and retrieve and use a specific version of a schema.
26
26
27
27
### Schema formats
28
28
Schema formats are used to determine the manner in which a schema is structured and defined, with each format outlining specific guidelines and syntax for defining the structure of the events that will be used for event streaming.
Copy file name to clipboardExpand all lines: articles/healthcare-apis/azure-api-for-fhir/release-notes.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,17 @@ ms.author: kavitagaddam
17
17
18
18
Azure API for FHIR® provides a fully managed deployment of the Microsoft FHIR Server for Azure. The server is an implementation of the [FHIR](https://hl7.org/fhir) standard. This document provides details about the features and enhancements made to Azure API for FHIR.
19
19
20
+
## **November 2024**
21
+
22
+
### FHIR service
23
+
24
+
**Bug fixes**
25
+
26
+
- Export Validation Improvement: An issue was found where exports proceeded despite invalid search parameters. A new change is implemented to prevent exports under these conditions. This is the default behavior. Customers can override it using the lenient flag. This change was communicated to customers last month.
27
+
- Bundle Performance Enhancement: The profile refresh process during bundle execution has been simplified. If a bundle contains changes to `ValueSet`, `StructureDefinition`, and/or `CodeSystem`, no profile refreshes will occur until the bundle is fully completed. This change improves the performance of bundles by reducing delays caused by multiple refreshes when handling changes to these resource types.
28
+
- Content Type Header Parsing: An issue related to parsing the `application/x-www-form-urlencoded` content type header has been addressed and resolved.
29
+
- Reindexing Enhancements The reindex operation has been improved by removing an artificial limitation that previously restricted handling of large historical datasets, or cases where customers requested a limited query size. Additionally, reindex process would incorrectly report as "completed" when handling many sequential historical or deleted resources with the default query size. This issue has been addressed to ensure that the reindexing process completes correctly and reports the appropriate status.
Copy file name to clipboardExpand all lines: articles/healthcare-apis/release-notes-2024.md
-8Lines changed: 0 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,14 +28,6 @@ This article describes features, enhancements, and bug fixes released in 2024 fo
28
28
- Content Type Header Parsing: An issue related to parsing the `application/x-www-form-urlencoded` content type header has been addressed and resolved.
29
29
- Reindexing Enhancements: The reindex operation is improved by removing an artificial limitation which previously restricted handling of large historical datasets, or cases where customers requested a limited query size. Additionally, reindex process would incorrectly report as "completed" when handling many sequential historical or deleted resources with the default query size. This issue has been addressed to ensure that the reindexing process completes correctly and reports the appropriate status.
30
30
31
-
### Azure API for FHIR
32
-
33
-
- Export Validation Improvement: An issue was found where exports proceeded despite invalid search parameters. A new change is implemented to prevent exports under these conditions. This is the default behavior. Customers can override it using the lenient flag. This change was communicated to customers last month.
34
-
- Bundle Performance Enhancement: The profile refresh process during bundle execution has been simplified. If a bundle contains changes to `ValueSet`, `StructureDefinition`, and/or `CodeSystem`, no profile refreshes will occur until the bundle is fully completed. This change improves the performance of bundles by reducing delays caused by multiple refreshes when handling changes to these resource types.
35
-
- Content Type Header Parsing: An issue related to parsing the `application/x-www-form-urlencoded` content type header has been addressed and resolved.
36
-
- Reindexing Enhancements The reindex operation has been improved by removing an artificial limitation that previously restricted handling of large historical datasets, or cases where customers requested a limited query size. Additionally, reindex process would incorrectly report as "completed" when handling many sequential historical or deleted resources with the default query size. This issue has been addressed to ensure that the reindexing process completes correctly and reports the appropriate status.
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/message-transfers-locks-settlement.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,7 +109,7 @@ If a receiving client fails to process a message and knows that redelivering the
109
109
> [!NOTE]
110
110
> A dead-letter subqueue exists for a queue or a topic subscription only when you have the [dead-letter feature](service-bus-dead-letter-queues.md) enabled for the queue or subscription.
111
111
112
-
A special case of settlement is deferral, which is discussed in a [separate article](message-deferral.md).
112
+
A special case of settlement is deferral. See the [Message deferral](message-deferral.md) for details.
113
113
114
114
The `Complete`, `DeadLetter`, or `RenewLock` operations might fail due to network issues, if the held lock has expired, or there are other service-side conditions that prevent settlement. In one of the latter cases, the service sends a negative acknowledgment that surfaces as an exception in the API clients. If the reason is a broken network connection, the lock is dropped since Service Bus doesn't support recovery of existing AMQP links on a different connection.
115
115
@@ -122,6 +122,7 @@ The typical mechanism for identifying duplicate message deliveries is by checkin
122
122
> * Service Update
123
123
> * OS update
124
124
> * Changing properties on the entity (Queue, Topic, Subscription) while holding the lock.
125
+
> * If the Service Bus Client application loses its connection to the Service Bus for any reason.
125
126
>
126
127
> When the lock is lost, Azure Service Bus will generate a MessageLockLostException or SessionLockLostException, which will surface in the client application. In this case, the client's default retry logic should automatically kick in and retry the operation.
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-common-questions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Common questions about Azure virtual machine disaster recovery with Azure
3
3
description: This article answers common questions about Azure virtual machine disaster recovery when you use Azure Site Recovery.
4
4
ms.author: ankitadutta
5
5
author: ankitaduttaMSFT
6
-
ms.date: 09/16/2024
6
+
ms.date: 11/25/2024
7
7
ms.topic: faq
8
8
ms.service: azure-site-recovery
9
9
@@ -237,7 +237,7 @@ Multi-VM consistency is CPU intensive, and enabling it can affect workload perfo
237
237
238
238
### Can I add a replicating virtual machine to a replication group?
239
239
240
-
When you enable replication for a virtual machine, you can add it to a new replication group, or to an existing group. You can't add a virtual machine that's already replicating to a group.
240
+
You cannot add a protected VM to an existing replication group.
241
241
242
242
### What conditions must be met to create a recovery plan for multi-VM consistency?
0 commit comments