Skip to content

Commit f78e05f

Browse files
authored
fixing list formatting
1 parent fd61d1e commit f78e05f

File tree

1 file changed

+28
-28
lines changed

1 file changed

+28
-28
lines changed

articles/cloud-services/mitigate-se.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -84,24 +84,24 @@ Your target operating system must be up-to-date to enable these extra security f
8484

8585
#### Option 1
8686

87-
**Step 1:** Follow the instructions in [KB4072698](https://support.microsoft.com/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution) to verify protections are enabled using the [SpeculationControl](https://aka.ms/SpeculationControlPS) PowerShell module.
87+
1. Follow the instructions in [KB4072698](https://support.microsoft.com/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution) to verify protections are enabled using the [SpeculationControl](https://aka.ms/SpeculationControlPS) PowerShell module.
8888

89-
> [!NOTE]
90-
> If you previously downloaded this module, you need to install the newest version.
91-
>
89+
> [!NOTE]
90+
> If you previously downloaded this module, you need to install the newest version.
9291
9392

94-
To validate enabled protections against these vulnerabilities, see [Understanding Get-SpeculationControlSettings PowerShell script output](https://support.microsoft.com/topic/understanding-get-speculationcontrolsettings-powershell-script-output-fd70a80a-a63f-e539-cda5-5be4c9e67c04).
9593

96-
If protections aren't enabled, please [contact Azure Support](https://aka.ms/microcodeenablementrequest-supporttechnical) to enable additional controls on your Azure VM.
94+
To validate enabled protections against these vulnerabilities, see [Understanding Get-SpeculationControlSettings PowerShell script output](https://support.microsoft.com/topic/understanding-get-speculationcontrolsettings-powershell-script-output-fd70a80a-a63f-e539-cda5-5be4c9e67c04).
9795

98-
**Step 2:** To enable Kernel Virtual Address Shadowing (KVAS) and Branch Target Injection (BTI) OS support, follow the instructions in [KB4072698](https://support.microsoft.com/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution) to enable protections using the `Session Manager` registry keys. A reboot is required.
96+
If protections aren't enabled, please [contact Azure Support](https://aka.ms/microcodeenablementrequest-supporttechnical) to enable additional controls on your Azure VM.
9997

98+
1. To enable Kernel Virtual Address Shadowing (KVAS) and Branch Target Injection (BTI) OS support, follow the instructions in [KB4072698](https://support.microsoft.com/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution) to enable protections using the `Session Manager` registry keys. A reboot is required.
10099

101-
**Step 3:** For deployments that are using [nested virtualization](/virtualization/hyper-v-on-windows/user-guide/nested-virtualization) (D3 and E3 only): These instructions apply inside the VM you're using as a Hyper-V host.
102100

103-
1. Follow the instructions in [KB4072698](https://support.microsoft.com/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution) to enable protections using the `MinVmVersionForCpuBasedMitigations` registry keys.
104-
2. Set the hypervisor scheduler type to `Core` by following the instructions [here](/windows-server/virtualization/hyper-v/manage/manage-hyper-v-scheduler-types).
101+
1. For deployments that are using [nested virtualization](/virtualization/hyper-v-on-windows/user-guide/nested-virtualization) (D3 and E3 only): These instructions apply inside the VM you're using as a Hyper-V host.
102+
103+
a. Follow the instructions in [KB4072698](https://support.microsoft.com/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution) to enable protections using the `MinVmVersionForCpuBasedMitigations` registry keys.
104+
b. Set the hypervisor scheduler type to `Core` by following the instructions [here](/windows-server/virtualization/hyper-v/manage/manage-hyper-v-scheduler-types).
105105

106106
#### Option 2
107107

@@ -123,36 +123,36 @@ For [CVE-2022-23816](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2
123123

124124
### Linux
125125

126-
Enabling the set of extra security features inside requires that the target operating system be fully up-to-date. Some mitigations will be enabled by default. The following section describes the features which are off by default and/or reliant on hardware support (microcode). Enabling these features may cause a performance impact. Reference your operating system provider's documentation for further instructions
126+
Enabling the set of extra security features inside requires that the target operating system be fully up-to-date. Some mitigations will be enabled by default. The following section describes the features which are off by default and/or reliant on hardware support (microcode). Enabling these features may cause a performance impact. Reference your operating system provider's documentation for further instructions.
127127

128128

129-
**Step 1: Disable hyper-threading on the VM** - Customers running untrusted code on a hyper-threaded VM will need to disable hyper-threading or move to a non-hyper-threaded VM. Reference [this doc](/azure/virtual-machines/acu) for a list of hyper-threaded VM sizes (where ratio of vCPU to Core is 2:1). To check if you're running a hyper-threaded VM, run the `lscpu` command in the Linux VM.
129+
1. Disable hyper-threading on the VM** - Customers running untrusted code on a hyper-threaded VM will need to disable hyper-threading or move to a non-hyper-threaded VM. Reference [this doc](/azure/virtual-machines/acu) for a list of hyper-threaded VM sizes (where ratio of vCPU to Core is 2:1). To check if you're running a hyper-threaded VM, run the `lscpu` command in the Linux VM.
130130

131-
If `Thread(s) per core = 2`, then hyper-threading has been enabled.
131+
If `Thread(s) per core = 2`, then hyper-threading has been enabled.
132132

133-
If `Thread(s) per core = 1`, then hyper-threading has been disabled.
133+
If `Thread(s) per core = 1`, then hyper-threading has been disabled.
134134

135135

136-
Sample output for a VM with hyper-threading enabled:
136+
Sample output for a VM with hyper-threading enabled:
137137

138-
```console
139-
CPU Architecture: x86_64
140-
CPU op-mode(s): 32-bit, 64-bit
141-
Byte Order: Little Endian
142-
CPU(s): 8
143-
On-line CPU(s) list: 0-7
144-
Thread(s) per core: 2
145-
Core(s) per socket: 4
146-
Socket(s): 1
147-
NUMA node(s): 1
138+
```console
139+
CPU Architecture: x86_64
140+
CPU op-mode(s): 32-bit, 64-bit
141+
Byte Order: Little Endian
142+
CPU(s): 8
143+
On-line CPU(s) list: 0-7
144+
Thread(s) per core: 2
145+
Core(s) per socket: 4
146+
Socket(s): 1
147+
NUMA node(s): 1
148148

149-
```
149+
```
150150

151-
If you're running a hyper-threaded VM, [contact Azure Support](https://aka.ms/MicrocodeEnablementRequest-SupportTechnical) to get hyper-threading disabled. Once hyper-threading is disabled, **support will require a full VM reboot**. Refer to [Core count](#core-count) to understand why your VM core count decreased.
151+
If you're running a hyper-threaded VM, [contact Azure Support](https://aka.ms/MicrocodeEnablementRequest-SupportTechnical) to get hyper-threading disabled. Once hyper-threading is disabled, **support will require a full VM reboot**. Refer to [Core count](#core-count) to understand why your VM core count decreased.
152152

153153

154154

155-
**Step 2:** To mitigate against any of the below CPU based memory vulnerabilities, refer to your operating system provider's documentation:
155+
1. To mitigate against any of the below CPU based memory vulnerabilities, refer to your operating system provider's documentation:
156156

157157
- [Redhat](https://access.redhat.com/security/vulnerabilities)
158158
- [SUSE](https://www.suse.com/support/kb/?doctype%5B%5D=DT_SUSESDB_PSDB_1_1&startIndex=1&maxIndex=0)

0 commit comments

Comments
 (0)