Skip to content

Commit 785258c

Browse files
authored
Apply suggestions from PR review
1 parent b25838d commit 785258c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/virtual-machines/trusted-launch-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ ms.custom: template-how-to, devx-track-azurecli, devx-track-azurepowershell
2626

2727
- Configure machines to automatically install the Azure Monitor and Azure Security agents on virtual machines
2828
- Make sure that the firewall policies are allowing access to *.attest.azure.net
29-
- > [!NOTE]
30-
> If you are using a Linux image and anticipate the VM may have kernel drivers either unsigned or not signed by the Linux distro vendor, then you may want to consider turning off secure boot. In Portal, in the ‘Create a virtual machine’ page for ‘Security type’ parameter with ‘Trusted Launch Virtual Machines’ selected, click on ‘Configure security features’ and uncheck the ‘Enable secure boot’ checkbox. In CLI, PowerShell, or SDK, set secure boot parameter to false.
29+
> [!NOTE]
30+
> If you are using a Linux image and anticipate the VM may have kernel drivers either unsigned or not signed by the Linux distro vendor, then you may want to consider turning off secure boot. In Portal, in the ‘Create a virtual machine’ page for ‘Security type’ parameter with ‘Trusted Launch Virtual Machines’ selected, click on ‘Configure security features’ and uncheck the ‘Enable secure boot’ checkbox. In CLI, PowerShell, or SDK, set secure boot parameter to false.
3131
3232

3333
## Deploy a trusted launch VM

0 commit comments

Comments
 (0)