You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/trusted-launch-faq.md
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,20 +23,27 @@ Frequently asked questions (FAQs) about Azure Trusted Launch feature use cases,
23
23
This section answers questions about use cases for Trusted Launch.
24
24
25
25
### Why should I use Trusted Launch? What does Trusted Launch guard against?
26
-
27
26
Trusted Launch guards against boot kits, rootkits, and kernel-level malware. These sophisticated types of malware run in kernel mode and remain hidden from users. For example:
28
27
29
28
-**Firmware rootkits**: These kits overwrite the firmware of the virtual machine (VM) BIOS, so the rootkit can start before the operating system (OS).
30
29
-**Boot kits**: These kits replace the OS's bootloader so that the VM loads the boot kit before the OS.
31
30
-**Kernel rootkits**: These kits replace a portion of the OS kernel, so the rootkit can start automatically when the OS loads.
32
31
-**Driver rootkits**: These kits pretend to be one of the trusted drivers that the OS uses to communicate with the VM's components.
33
32
33
+
### What are the differences between Secure Boot and measured boot?
34
+
35
+
In a Secure Boot chain, each step in the boot process checks a cryptographic signature of the subsequent steps. For example, the BIOS checks a signature on the loader, and the loader checks signatures on all the kernel objects that it loads, and so on. If any of the objects are compromised, the signature doesn't match and the VM doesn't boot. For more information, see [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot).
36
+
34
37
### How does Trusted Launch compare to Hyper-V Shielded VM?
35
38
36
39
Hyper-V Shielded VM is currently available on Hyper-V only. [Hyper-V Shielded VM](/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-and-shielded-vms) is typically deployed with Guarded Fabric. A Guarded Fabric consists of a Host Guardian Service (HGS), one or more guarded hosts, and a set of Shielded VMs. Hyper-V Shielded VMs are used in fabrics where the data and state of the VM must be protected from various actors. These actors are both fabric administrators and untrusted software that might be running on the Hyper-V hosts.
37
40
38
41
Trusted Launch, on the other hand, can be deployed as a standalone VM or as virtual machine scale sets on Azure without other deployment and management of HGS. All of the Trusted Launch features can be enabled with a simple change in deployment code or a checkbox on the Azure portal.
39
42
43
+
### What is VM Guest State (VMGS)?
44
+
45
+
VM Guest State (VMGS) is specific to Trusted Launch VMs. It's a blob managed by Azure and contains the unified extensible firmware interface (UEFI) Secure Boot signature databases and other security information. The lifecycle of the VMGS blob is tied to that of the OS disk.
46
+
40
47
### Can I disable Trusted Launch for a new VM deployment?
41
48
42
49
Trusted Launch VMs provide you with foundational compute security. We recommend that you don't disable them for new VM or virtual machine scale set deployments except if your deployments have dependency on:
@@ -378,18 +385,10 @@ Architecture : x64
378
385
379
386
Adding COM ports requires that you disable Secure Boot. COM ports are disabled by default in Trusted Launch VMs.
380
387
381
-
## Troubleshooting boot issues
388
+
## Troubleshooting issues
382
389
383
390
This section answers questions about specific states, boot types, and common boot issues.
384
391
385
-
### What is VM Guest State (VMGS)?
386
-
387
-
VM Guest State (VMGS) is specific to Trusted Launch VMs. It's a blob managed by Azure and contains the unified extensible firmware interface (UEFI) Secure Boot signature databases and other security information. The lifecycle of the VMGS blob is tied to that of the OS disk.
388
-
389
-
### What are the differences between Secure Boot and measured boot?
390
-
391
-
In a Secure Boot chain, each step in the boot process checks a cryptographic signature of the subsequent steps. For example, the BIOS checks a signature on the loader, and the loader checks signatures on all the kernel objects that it loads, and so on. If any of the objects are compromised, the signature doesn't match and the VM doesn't boot. For more information, see [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot).
392
-
393
392
### What should I do when my Trusted Launch VM has deployment failures ?
394
393
This section provides additional details on Trusted Launch deployment failures for you to take proper action to prevent them.
395
394
@@ -407,9 +406,9 @@ Retrying with the same snapshot/restore point will result in the same failure.
407
406
408
407
To resolve this:
409
408
410
-
1. On the source Trusted Launch VM where the snapshot or restore point was generated, the vTPM errors must be rectified.
411
-
a. If the vTPM state was modified by a workload on the virtual machine, you need to use the same to check the error states and bring the vTPM to a non-error state.
412
-
b. If TPM tools were used to modify the vTPM state, then you should use the same tools to check the error states and bring the vTPM to a non-error state.
409
+
1. On the source Trusted Launch VM where the snapshot or restore point was generated, the vTPM errors must be rectified.
410
+
a. If the vTPM state was modified by a workload on the virtual machine, you need to use the same to check the error states and bring the vTPM to a non-error state.
411
+
b. If TPM tools were used to modify the vTPM state, then you should use the same tools to check the error states and bring the vTPM to a non-error state.
413
412
414
413
Once the snapshot or restore point is free from these errors, you can use this to create a new Trusted Launch VM.
0 commit comments