File tree Expand file tree Collapse file tree 2 files changed +10
-7
lines changed
articles/virtual-machines/linux Expand file tree Collapse file tree 2 files changed +10
-7
lines changed Original file line number Diff line number Diff line change @@ -54,19 +54,20 @@ You can also get further details clicking on the extension and then on *View det
54
54
55
55
## Using PowerShell:
56
56
57
- You can validate the **general** encryption status of an encrypted VM using the following PowerShell commands:
58
- ```azurepowershell
59
- $VMNAME="VMNAME"
60
- $RGNAME="RGNAME"
61
- Get-AzVmDiskEncryptionStatus -ResourceGroupName ${RGNAME} -VMName ${VMNAME}
62
- ```
57
+ You can validate the ** general** encryption status of an encrypted VM using the following PowerShell commands:
58
+
59
+ ``` azurepowershell
60
+ $VMNAME="VMNAME"
61
+ $RGNAME="RGNAME"
62
+ Get-AzVmDiskEncryptionStatus -ResourceGroupName ${RGNAME} -VMName ${VMNAME}
63
+ ```
63
64
64
65
> [ !NOTE]
65
66
> Replace the "VMNAME" and "RGNAME" variables accordingly
66
67
67
68
![ verify status PowerShell 1] ( ./media/disk-encryption/verify-encryption-linux/verify-status-ps-01.png )
68
69
69
- You can capture the encryption settings from each individual disk using the following PowerShell commands:
70
+ You can capture the encryption settings from each individual disk using the following PowerShell commands:
70
71
71
72
** Single-Pass:**
72
73
In the case of single-pass the encryption settings are stamped in each of the disks (OS and Data).
Original file line number Diff line number Diff line change 310
310
href : disk-encryption-portal-quickstart.md
311
311
- name : Key vault for Azure Disk Encryption
312
312
href : disk-encryption-key-vault.md
313
+ - name : How to verify encryption status
314
+ href : how-to-verify-encryption-status.md
313
315
- name : Disk encryption sample scripts
314
316
href : disk-encryption-sample-scripts.md
315
317
- name : Disk encryption on an isolated network
You can’t perform that action at this time.
0 commit comments