Skip to content

Commit add14d8

Browse files
Merge pull request #224972 from lakmeedee/patch-588
Update trusted-launch.md
2 parents ad2a69e + e8e3841 commit add14d8

File tree

1 file changed

+11
-10
lines changed

1 file changed

+11
-10
lines changed

articles/virtual-machines/trusted-launch.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: dejv
66
ms.service: virtual-machines
77
ms.subservice: trusted-launch
88
ms.topic: conceptual
9-
ms.date: 09/22/2022
9+
ms.date: 01/25/2023
1010
ms.reviewer: mattmcinnes
1111
ms.custom: template-concept; references_regions
1212
---
@@ -44,7 +44,6 @@ Azure offers trusted launch as a seamless way to improve the security of [genera
4444
- Ev5-series, Esv5-series
4545
- Edv5-series, Edsv5-series
4646
- Easv5-series, Eadsv5-series
47-
- Ebsv5-series, Ebdsv5-series
4847
- Eav4-series, Easv4-series
4948
- Ev4-series, Esv4-series, Esv3-series
5049
- Edv4-series, Edsv4-series
@@ -54,7 +53,7 @@ Azure offers trusted launch as a seamless way to improve the security of [genera
5453
- NVadsA10 v5-series
5554

5655
**OS support**:
57-
- Redhat Enterprise Linux 8.3, 8.4, 8.5, 8.6, 9.0 LVM
56+
- Redhat Enterprise Linux 8.3, 8.4, 8.5, 8.6, 9.0, 9.1 LVM
5857
- SUSE Enterprise Linux 15 SP3
5958
- Ubuntu Server 22.04 LTS
6059
- Ubuntu Server 20.04 LTS
@@ -75,6 +74,7 @@ Azure offers trusted launch as a seamless way to improve the security of [genera
7574

7675
**Regions**:
7776
- All public regions
77+
- All Fairfax regions
7878

7979
**Pricing**:
8080
No additional cost to existing VM pricing.
@@ -85,6 +85,7 @@ No additional cost to existing VM pricing.
8585
- Ultra disk
8686
- Managed image
8787
- Nested Virtualization
88+
- Azure Automanage
8889

8990
## Secure boot
9091

@@ -107,12 +108,12 @@ With trusted launch and VBS you can enable Windows Defender Credential Guard. Th
107108

108109
## Microsoft Defender for Cloud integration
109110

110-
Trusted launch is integrated with Azure Defender for Cloud to ensure your VMs are properly configured. Azure Defender for Cloud will continually assess compatible VMs and issue relevant recommendations.
111+
Trusted launch is integrated with Microsoft Defender for Cloud to ensure your VMs are properly configured. Microsoft Defender for Cloud will continually assess compatible VMs and issue relevant recommendations.
111112

112-
- **Recommendation to enable Secure Boot** - This Recommendation only applies for VMs that support trusted launch. Azure Defender for Cloud will identify VMs that can enable Secure Boot, but have it disabled. It will issue a low severity recommendation to enable it.
113-
- **Recommendation to enable vTPM** - If your VM has vTPM enabled, Azure Defender for Cloud can use it to perform Guest Attestation and identify advanced threat patterns. If Azure Defender for Cloud identifies VMs that support trusted launch and have vTPM disabled, it will issue a low severity recommendation to enable it.
114-
- **Recommendation to install guest attestation extension** - If your VM has secure boot and vTPM enabled but it doesn't have the guest attestation extension installed, Azure Defender for Cloud will issue a low severity recommendation to install the guest attestation extension on it. This extension allows Azure Defender for Cloud to proactively attest and monitor the boot integrity of your VMs. Boot integrity is attested via remote attestation.
115-
- **Attestation health assessment or Boot Integrity Monitoring** - If your VM has Secure Boot and vTPM enabled and attestation extension installed, Azure Defender for Cloud can remotely validate that your VM booted in a healthy way. This is known as boot integrity monitoring. Azure Defender for Cloud issues an assessment, indicating the status of remote attestation. Currently boot integrity monitoring is supported for both Windows and Linux single virtual machines and uniform scale sets.
113+
- **Recommendation to enable Secure Boot** - This Recommendation only applies for VMs that support trusted launch. Mirosoft Defender for Cloud will identify VMs that can enable Secure Boot, but have it disabled. It will issue a low severity recommendation to enable it.
114+
- **Recommendation to enable vTPM** - If your VM has vTPM enabled, Microsoft Defender for Cloud can use it to perform Guest Attestation and identify advanced threat patterns. If Microsoft Defender for Cloud identifies VMs that support trusted launch and have vTPM disabled, it will issue a low severity recommendation to enable it.
115+
- **Recommendation to install guest attestation extension** - If your VM has secure boot and vTPM enabled but it doesn't have the guest attestation extension installed, Microsoft Defender for Cloud will issue a low severity recommendation to install the guest attestation extension on it. This extension allows Microsoft Defender for Cloud to proactively attest and monitor the boot integrity of your VMs. Boot integrity is attested via remote attestation.
116+
- **Attestation health assessment or Boot Integrity Monitoring** - If your VM has Secure Boot and vTPM enabled and attestation extension installed, Microsoft Defender for Cloud can remotely validate that your VM booted in a healthy way. This is known as boot integrity monitoring. Microsoft Defender for Cloud issues an assessment, indicating the status of remote attestation.
116117

117118
If your VMs are properly set up with trusted launch, Microsoft Defender for Cloud can detect and alert you of VM health problems.
118119

@@ -151,8 +152,8 @@ Trusted launch for Azure virtual machines is monitored for advanced threats. If
151152

152153
Defender for Cloud periodically performs attestation. If the attestation fails, a medium severity alert will be triggered. Trusted launch attestation can fail for the following reasons:
153154

154-
Trusted launch for Azure virtual machines is monitored for advanced threats. If such threats are detected, an alert will be triggered. Alerts are only available in the [Standard Tier](../security-center/security-center-pricing.md) of Azure Defender for Cloud.
155-
Azure Defender for Cloud periodically performs attestation. If the attestation fails, a medium severity alert will be triggered. Trusted launch attestation can fail for the following reasons:
155+
Trusted launch for Azure virtual machines is monitored for advanced threats. If such threats are detected, an alert will be triggered. Alerts are only available in the [Standard Tier](../security-center/security-center-pricing.md) of Microsoft Defender for Cloud.
156+
Microsoft Defender for Cloud periodically performs attestation. If the attestation fails, a medium severity alert will be triggered. Trusted launch attestation can fail for the following reasons:
156157
- The attested information, which includes a log of the Trusted Computing Base (TCB), deviates from a trusted baseline (like when Secure Boot is enabled). This can indicate that untrusted modules have been loaded and the OS may be compromised.
157158
- The attestation quote could not be verified to originate from the vTPM of the attested VM. This can indicate that malware is present and may be intercepting traffic to the TPM.
158159
- The attestation extension on the VM is not responding. This can indicate a denial-of-service attack by malware, or an OS admin.

0 commit comments

Comments
 (0)