Skip to content

Commit b25838d

Browse files
authored
Update trusted-launch-portal.md
To inform customer some Linux distribution might have unsigned drivers which makes SB difficult to use since the system will not boot, since it is looking for signed drivers to start up.
1 parent 117d76f commit b25838d

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/virtual-machines/trusted-launch-portal.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,10 @@ ms.custom: template-how-to, devx-track-azurecli, devx-track-azurepowershell
2626

2727
- Configure machines to automatically install the Azure Monitor and Azure Security agents on virtual machines
2828
- Make sure that the firewall policies are allowing access to *.attest.azure.net
29+
- > [!NOTE]
30+
> If you are using a Linux image and anticipate the VM may have kernel drivers either unsigned or not signed by the Linux distro vendor, then you may want to consider turning off secure boot. In Portal, in the ‘Create a virtual machine’ page for ‘Security type’ parameter with ‘Trusted Launch Virtual Machines’ selected, click on ‘Configure security features’ and uncheck the ‘Enable secure boot’ checkbox. In CLI, PowerShell, or SDK, set secure boot parameter to false.
31+
2932

30-
3133
## Deploy a trusted launch VM
3234
Create a virtual machine with trusted launch enabled. Choose an option below:
3335

0 commit comments

Comments
 (0)