You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/azure-security-disk-encryption-appendix.md
+30-1Lines changed: 30 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: security
6
6
ms.subservice: Azure Disk Encryption
7
7
ms.topic: article
8
8
ms.author: mstewart
9
-
ms.date: 09/10/2018
9
+
ms.date: 11/06/2018
10
10
---
11
11
12
12
@@ -546,6 +546,35 @@ When encrypting using an Azure AD app (previous release), the disk-encryption se
546
546
### <aname="bkmk_SecretnoKEK"></a> Disk encryption secret not encrypted with a KEK
547
547
To set up the secret in your key vault, use [Set-AzureKeyVaultSecret](/powershell/module/azurerm.keyvault/set-azurekeyvaultsecret). If you have a Windows virtual machine, the bek file is encoded as a base64 string and then uploaded to your key vault using the `Set-AzureKeyVaultSecret` cmdlet. For Linux, the passphrase is encoded as a base64 string and then uploaded to the key vault. In addition, make sure that the following tags are set when you create the secret in the key vault.
548
548
549
+
#### Windows BEK file
550
+
```powershell
551
+
# Change the VM Name, key vault name, and specify the path to the BEK file.
0 commit comments