Skip to content

Commit ee75b12

Browse files
Merge pull request #273127 from Howie425/boot-integrity
boot-integrity update
2 parents fe1a205 + 71ccc9e commit ee75b12

10 files changed

+24
-4
lines changed

articles/virtual-machines/boot-integrity-monitoring-overview.md

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: jushiman
77
ms.service: virtual-machines
88
ms.subservice: trusted-launch
99
ms.topic: conceptual
10-
ms.date: 11/06/2023
10+
ms.date: 04/10/2024
1111
ms.custom: template-concept
1212
---
1313

@@ -125,7 +125,7 @@ You can deploy the guest attestation extension for trusted launch VMs using a qu
125125

126126
If Secure Boot and vTPM are ON, boot integrity will be ON.
127127

128-
1. Create a virtual machine with Trusted Launch that has Secure Boot + vTPM capabilities through initial deployment of the trusted launch virtual machine. Configuration of virtual machines are customizable by virtual machine owner.
128+
1. Create a virtual machine with Trusted Launch that has Secure Boot + vTPM capabilities through initial deployment of the trusted launch virtual machine. Configuration of virtual machines is customizable by virtual machine owner.
129129
1. For existing VMs, you can enable boot integrity monitoring settings by updating to make sure both SecureBoot and vTPM are on.
130130

131131
For more information on creation or updating a virtual machine to include the boot integrity monitoring through the guest attestation extension, see [Deploy a VM with trusted launch enabled (PowerShell)](trusted-launch-portal.md#deploy-a-trusted-launch-vm).
@@ -144,7 +144,7 @@ The Microsoft Azure Attestation extensions won't properly work when customers se
144144

145145
In Azure, Network Security Groups (NSG) are used to help filter network traffic between Azure resources. NSGs contains security rules that either allow or deny inbound network traffic, or outbound network traffic from several types of Azure resources. For the Microsoft Azure Attestation endpoint, it should be able to communicate with the guest attestation extension. Without this endpoint, Trusted Launch can’t access guest attestation, which allows Microsoft Defender for Cloud to monitor the integrity of the boot sequence of your virtual machines.
146146

147-
To unblock traffic using an NSG with service tags, set allow rules for Microsoft Azure Attestation.
147+
Unblocking Microsoft Azure Attestation traffic in **Network Security Groups** using service tags.
148148

149149
1. Navigate to the **virtual machine** that you want to allow outbound traffic.
150150
1. Under "Networking" in the left-hand sidebar, select the **networking settings** tab.
@@ -153,10 +153,30 @@ To unblock traffic using an NSG with service tags, set allow rules for Microsoft
153153
1. To allow Microsoft Azure Attestation, make the destination a **service tag**. This allows for the range of IP addresses to update and automatically set allow rules for Microsoft Azure Attestation. The destination service tag is **AzureAttestation** and action is set to **Allow**.
154154
:::image type="content" source="media/trusted-launch/unblocking-NSG.png" alt-text="Screenshot showing how to make the destination a service tag.":::
155155

156+
Firewalls protect a virtual network, which contains multiple Trusted Launch virtual machines. To unblock Microsoft Azure Attestation traffic in **Firewall** using application rule collection.
157+
158+
1. Navigate to the Azure Firewall, that has traffic blocked from the Trusted Launch virtual machine resource.
159+
2. Under settings, select Rules (classic) to begin unblocking guest attestation behind the Firewall.
160+
3. Select a **network rule collection** and add network rule.
161+
:::image type="content" source="./media/trusted-launch/firewall-network-rule-collection.png" lightbox="./media/trusted-launch/firewall-network-rule-collection.png" alt-text="Screenshot of the adding application rule":::
162+
5. The user can configure their name, priority, source type, destination ports based on their needs. The name of the service tag is as follows: **AzureAttestation**, and action needs to be set as **allow**.
163+
164+
To unblock Microsoft Azure Attestation traffic in **Firewall** using application rule collection.
165+
166+
1. Navigate to the Azure Firewall, that has traffic blocked from the Trusted Launch virtual machine resource.
167+
:::image type="content" source="./media/trusted-launch/firewall-rule.png" lightbox="./media/trusted-launch/firewall-rule.png" alt-text="Screenshot of the adding traffic for application rule route."::: The rules collection must contain at least one rule, navigate to Target FQDNs (fully qualified domain names).
168+
2. Select Application Rule collection and add an application rule.
169+
3. Select a name, a numeric priority for your application rules. The action for rule collection is set to ALLOW. To learn more about the application processing and values, read here.
170+
:::image type="content" source="./media/trusted-launch/firewall-application-rule.png" lightbox="./media/trusted-launch/firewall-application-rule.png" alt-text="Screenshot of the adding application rule route.":::
171+
4. Name, source, protocol, are all configurable by the user. Source type for single IP address, select IP group to allow multiple IP address through the firewall.
172+
173+
### Regional Shared Providers
174+
175+
Azure Attestation provides a [regional shared provider](https://maainfo.azurewebsites.net/) in each available region. Customers can choose to use the regional shared provider for attestation or create their own providers with custom policies. Shared providers can be accessed by any Azure AD user, and the policy associated with it cannot be changed.
176+
156177
> [!NOTE]
157178
> Users can configure their source type, service, destination port ranges, protocol, priority, and name.
158179
159-
This service tag is a global endpoint that unblocks Microsoft Azure Attestation traffic in any region.
160180

161181
## Next steps
162182

119 KB
Loading
84.2 KB
Loading
131 KB
Loading
91.9 KB
Loading
132 KB
Loading
137 KB
Loading
107 KB
Loading
179 KB
Loading
307 KB
Loading

0 commit comments

Comments
 (0)