Skip to content

Commit a716391

Browse files
committed
Review pass.
1 parent 17759e3 commit a716391

6 files changed

+19
-20
lines changed

articles/virtual-machines/disks-enable-customer-managed-keys-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,13 @@ ms.subservice: disks
1414

1515
**Applies to:** :heavy_check_mark: Linux VMs :heavy_check_mark: Windows VMs :heavy_check_mark:
1616

17-
Azure Disk Storage allows you to manage your own keys when using server-side encryption (SSE) for managed disks, if you choose. For conceptual information on SSE with customer managed keys, as well as other managed disk encryption types, see the **Customer-managed keys** section of our disk encryption article: [Customer-managed keys](disk-encryption.md#customer-managed-keys)
17+
Azure Disk Storage allows you to manage your own keys when using server-side encryption (SSE) for managed disks, if you choose. For conceptual information on SSE with customer managed keys, and other managed disk encryption types, see the **Customer-managed keys** section of our disk encryption article: [Customer-managed keys](disk-encryption.md#customer-managed-keys)
1818

1919
## Restrictions
2020

2121
For now, customer-managed keys have the following restrictions:
2222

23-
- If this feature is enabled for your disk, you cannot disable it.
23+
- If this feature is enabled for your disk, you can't disable it.
2424
If you need to work around this, you must copy all the data to an entirely different managed disk that isn't using customer-managed keys:
2525

2626
- For Linux: [Copy a managed disk](./linux/disks-upload-vhd-to-managed-disk-cli.md#copy-a-managed-disk)
@@ -52,14 +52,14 @@ The VM deployment process is similar to the standard deployment process, the onl
5252
## Enable on an existing disk
5353

5454
> [!CAUTION]
55-
> Enabling disk encryption on any disks attached to a VM will require that you stop the VM.
55+
> Enabling disk encryption on any disks attached to a VM requires you to stop the VM.
5656
5757
1. Navigate to a VM that is in the same region as one of your disk encryption sets.
5858
1. Open the VM and select **Stop**.
5959

6060
:::image type="content" source="media/virtual-machines-disk-encryption-portal/server-side-encryption-stop-vm-to-encrypt-disk-fix.png" alt-text="Screenshot of the main overlay for your example VM, with the Stop button highlighted." lightbox="media/virtual-machines-disk-encryption-portal/server-side-encryption-stop-vm-to-encrypt-disk-fix.png":::
6161

62-
1. After the VM has finished stopping, select **Disks** and then select the disk you want to encrypt.
62+
1. After the VM has finished stopping, select **Disks**, and then select the disk you want to encrypt.
6363

6464
:::image type="content" source="media/virtual-machines-disk-encryption-portal/server-side-encryption-existing-disk-select.png" alt-text="Screenshot of your example VM, with the Disks pane open, the OS disk is highlighted, as an example disk for you to select." lightbox="media/virtual-machines-disk-encryption-portal/server-side-encryption-existing-disk-select.png":::
6565

articles/virtual-machines/disks-enable-double-encryption-at-rest-portal.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: references_regions
1515

1616
**Applies to:** :heavy_check_mark: Linux VMs :heavy_check_mark: Windows VMs :heavy_check_mark:
1717

18-
Azure Disk Storage supports double encryption at rest for managed disks. For conceptual information on double encryption at rest, as well as other managed disk encryption types, see the [Double encryption at rest](disk-encryption.md#double-encryption-at-rest) section of our disk encryption article.
18+
Azure Disk Storage supports double encryption at rest for managed disks. For conceptual information on double encryption at rest, and other managed disk encryption types, see the [Double encryption at rest](disk-encryption.md#double-encryption-at-rest) section of our disk encryption article.
1919

2020
## Getting started
2121

@@ -61,7 +61,6 @@ Azure Disk Storage supports double encryption at rest for managed disks. For con
6161

6262
You have now enabled double encryption at rest on your managed disk.
6363

64-
6564
## Next steps
6665

6766
- [Azure PowerShell - Enable customer-managed keys with server-side encryption - managed disks](./windows/disks-enable-customer-managed-keys-powershell.md)

articles/virtual-machines/disks-enable-host-based-encryption-portal.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,11 @@ Temporary disks and ephemeral OS disks are encrypted at rest with platform-manag
2525

2626
### Supported VM sizes
2727

28-
Legacy VM Sizes are not supported. You can find the list of supported VM sizes by either using the [Azure PowerShell module](windows/disks-enable-host-based-encryption-powershell.md#finding-supported-vm-sizes) or [Azure CLI](linux/disks-enable-host-based-encryption-cli.md#finding-supported-vm-sizes).
28+
Legacy VM Sizes aren't supported. You can find the list of supported VM sizes by either using the [Azure PowerShell module](windows/disks-enable-host-based-encryption-powershell.md#finding-supported-vm-sizes) or [Azure CLI](linux/disks-enable-host-based-encryption-cli.md#finding-supported-vm-sizes).
2929

3030
## Prerequisites
3131

32-
You must enable the feature for your subscription before you use the EncryptionAtHost property for your VM/VMSS. Use the following steps to enable the feature for your subscription:
32+
You must enable the feature for your subscription before you can use encryption at host for either your VM or virtual machine scale set. Use the following steps to enable the feature for your subscription:
3333

3434
1. **Azure portal**: Select the Cloud Shell icon on the [Azure portal](https://portal.azure.com):
3535

@@ -51,7 +51,7 @@ You must enable the feature for your subscription before you use the EncryptionA
5151

5252
---
5353

54-
1. Confirm that the registration state is **Registered** (takes a few minutes) using the command below before trying out the feature.
54+
1. Confirm that the registration state is **Registered** (registration may take a few minutes) using the following command before trying out the feature.
5555

5656
### [Azure PowerShell](#tab/azure-powershell)
5757

@@ -69,9 +69,9 @@ You must enable the feature for your subscription before you use the EncryptionA
6969
## Deploy a VM with platform-managed keys
7070

7171
1. Sign in to the [Azure portal](https://portal.azure.com).
72-
1. Search for **Virtual Machines** and select **+ Add** to create a VM.
73-
1. Create a new virtual machine, select an appropriate region and a supported VM size.
74-
1. Fill in the other values on the **Basic** pane as you like, then proceed to the **Disks** pane.
72+
1. Search for **Virtual Machines** and select **+ Create** to create a VM.
73+
1. Select an appropriate region and a supported VM size.
74+
1. Fill in the other values on the **Basic** pane as you like, and then proceed to the **Disks** pane.
7575

7676
:::image type="content" source="media/virtual-machines-disks-encryption-at-host-portal/disks-encryption-at-host-basic-blade.png" alt-text="Screenshot of the virtual machine creation basics pane, region and VM size are highlighted." lightbox="media/virtual-machines-disks-encryption-at-host-portal/disks-encryption-at-host-basic-blade.png":::
7777

@@ -82,7 +82,7 @@ You must enable the feature for your subscription before you use the EncryptionA
8282

8383
1. For the rest of the VM deployment process, make selections that fit your environment, and complete the deployment.
8484

85-
You have now deployed a VM with encryption at host enabled, and the cache for the disk is encrypted using platform-managed keys.
85+
You've now deployed a VM with encryption at host enabled, and the cache for the disk is encrypted using platform-managed keys.
8686

8787
## Deploy a VM with customer-managed keys
8888

@@ -113,7 +113,7 @@ Now that you've setup an Azure Key Vault and disk encryption set, you can deploy
113113

114114
1. For the rest of the VM deployment process, make selections that fit your environment, and complete the deployment.
115115

116-
You have now deployed a VM with encryption at host enabled using customer-managed keys.
116+
You've now deployed a VM with encryption at host enabled using customer-managed keys.
117117

118118
## Disable host based encryption
119119

Loading

includes/virtual-machines-disks-encryption-at-host-restrictions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@
55
author: roygara
66
ms.service: virtual-machines
77
ms.topic: include
8-
ms.date: 09/10/2022
8+
ms.date: 01/19/2023
99
ms.author: rogarana
1010
ms.custom: include file
1111
---
1212
- Doesn't support ultra disks or premium SSD v2 managed disks.
13-
- Cannot be enabled if Azure Disk Encryption (guest-VM encryption using bitlocker/DM-Crypt) is enabled on your VMs/virtual machine scale sets.
13+
- Cannot be enabled if Azure Disk Encryption (guest-VM encryption using bitlocker/DM-Crypt) is enabled on your virtual machines (VMs) or virtual machine scale sets.
1414
- Azure Disk Encryption cannot be enabled on disks that have encryption at host enabled.
15-
- The encryption can be enabled on existing virtual machine scale set. However, only new VMs created after enabling the encryption are automatically encrypted.
15+
- The encryption can be enabled on existing virtual machine scale sets. However, only new VMs created after enabling the encryption are automatically encrypted.
1616
- Existing VMs must be deallocated and reallocated in order to be encrypted.
1717
- Supports ephemeral OS disks but only with platform-managed keys.

includes/virtual-machines-disks-encryption-create-key-vault-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
ms.author: rogarana
1010
ms.custom: include file
1111
---
12-
Setting up customer-managed keys for your disks will require you to create resources in a particular order, if you're doing it for the first time. First, you will need to create and set up an Azure Key Vault.
12+
Setting up customer-managed keys for your disks requires you to create resources in a particular order, if you're doing it for the first time. First, you'll need to create and set up an Azure Key Vault.
1313

1414
## Set up your Azure Key Vault
1515

@@ -53,7 +53,7 @@ Now that you've created the Azure key vault and a key, you must add an Azure RBA
5353
## Set up your disk encryption set
5454

5555
1. Search for **Disk Encryption Sets** and select it.
56-
1. On the **Disk Encryption Sets** pane select **+Create**.
56+
1. On the **Disk Encryption Sets** pane, select **+Create**.
5757
1. Select your resource group, name your encryption set, and select the same region as your key vault.
5858
1. For **Encryption type**, select **Encryption at-rest with a customer-managed key**.
5959

@@ -67,7 +67,7 @@ Now that you've created the Azure key vault and a key, you must add an Azure RBA
6767

6868
:::image type="content" source="media/virtual-machines-disk-encryption-portal/server-side-encryption-disk-set-blade.png" alt-text="Screenshot of the disk encryption creation pane. Showing the subscription, resource group, disk encryption set name, region, and key vault + key selector." lightbox="media/virtual-machines-disk-encryption-portal/server-side-encryption-disk-set-blade.png":::
6969

70-
1. Navigate to the disk encryption set once it is deployed, and select the displayed alert.
70+
1. Navigate to the disk encryption set once it's deployed, and select the displayed alert.
7171

7272
:::image type="content" source="media/virtual-machines-disk-encryption-portal/disk-encryption-set-perm-alert.png" alt-text="Screenshot of user selecting the 'To associate a disk, image, or snapshot with this disk encryption set, you must grant permissions to the key vault' alert." lightbox="media/virtual-machines-disk-encryption-portal/disk-encryption-set-perm-alert.png":::
7373

0 commit comments

Comments
 (0)