Skip to content

Commit fd5390e

Browse files
committed
edit pass: how-to-verify-encryption-status
1 parent 2864b6f commit fd5390e

File tree

1 file changed

+15
-16
lines changed

1 file changed

+15
-16
lines changed

articles/virtual-machines/linux/how-to-verify-encryption-status.md

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Verify encryption status for Linux - Azure Disk Encryption
3-
description: This article provides instructions on verifying the encryption status from the platform and OS level.
3+
description: This article provides instructions on verifying the encryption status from the platform and OS levels.
44
author: kailashmsft
55
ms.service: security
66
ms.topic: article
@@ -15,7 +15,7 @@ ms.custom: seodec18
1515

1616
# Verify encryption status for Linux
1717

18-
The scope of this article is to validate the encryption status of a virtual machine by using different methods: the Azure portal, PowerShell, the Azure CLI, or the OS of the virtual machine (VM).
18+
The scope of this article is to validate the encryption status of a virtual machine by using different methods: the Azure portal, PowerShell, the Azure CLI, or the operating system of the virtual machine (VM).
1919

2020
You can validate the encryption status during or after the encryption, by either:
2121

@@ -29,13 +29,11 @@ This scenario applies for Azure Disk Encryption dual-pass and single-pass extens
2929
3030
## Portal
3131

32-
Validate the encryption status by checking the extensions section on the Azure portal.
33-
3432
In the Azure portal, inside the **Extensions** section, select the Azure Disk Encryption extension in the list. The information for **Status message** indicates the current encryption status:
3533

3634
![Portal check with status, version, and status message highlighted](./media/disk-encryption/verify-encryption-linux/portal-check-001.png)
3735

38-
In the list of extensions, you'll see the corresponding Azure Disk Encryption extension version. Version 0.x corresponds to Azure Disk Encryption dual-pass, and version 1.x corresponds to Azure Disk Encryption single-pass.
36+
In the list of extensions, you'll see the corresponding Azure Disk Encryption extension version. Version 0.x corresponds to Azure Disk Encryption dual pass, and version 1.x corresponds to Azure Disk Encryption single pass.
3937

4038
You can get more details by selecting the extension and then selecting **View detailed status**. The detailed status of the encryption process appears in JSON format.
4139

@@ -48,11 +46,11 @@ Another way to validate the encryption status is by looking at the **Disk settin
4846
![Encryption status for OS disk and data disks](./media/disk-encryption/verify-encryption-linux/portal-check-004.png)
4947

5048
>[!NOTE]
51-
> This status means the disks have encryption settings stamped but not that they were actually encrypted at the OS level.
49+
> This status means the disks have encryption settings stamped, not that they were actually encrypted at the OS level.
5250
>
5351
> By design, the disks are stamped first and encrypted later. If the encryption process fails, the disks may end up stamped but not encrypted.
5452
>
55-
> To confirm if the disks are truly encrypted, you can double check the encryption of each disk at OS level.
53+
> To confirm if the disks are truly encrypted, you can double check the encryption of each disk at the OS level.
5654
5755
## PowerShell
5856

@@ -68,7 +66,7 @@ You can validate the *general* encryption status of an encrypted VM by using the
6866
You can capture the encryption settings from each disk by using the following PowerShell commands.
6967

7068
### Single pass
71-
In a single pass, the encryption settings are stamped on each of the disks (OS and data). You can capture the encryption settings for an OS disk in a single pass, as follows:
69+
In a single pass, the encryption settings are stamped on each of the disks (OS and data). You can capture the encryption settings for an OS disk in a single pass as follows:
7270

7371
``` powershell
7472
$RGNAME = "RGNAME"
@@ -137,7 +135,7 @@ Write-Host "Secret URL:" $Sourcedisk.EncryptionSettingsCollection.EncryptionSett
137135
Write-Host "Key URL:" $Sourcedisk.EncryptionSettingsCollection.EncryptionSettings.KeyEncryptionKey.KeyUrl
138136
Write-Host "============================================================================================================================================================="
139137
```
140-
![Encyption settings in a dual pass](./media/disk-encryption/verify-encryption-linux/verify-dual-ps-001.png)
138+
![Encryption settings in a dual pass](./media/disk-encryption/verify-encryption-linux/verify-dual-ps-001.png)
141139

142140
### Unattached disks
143141

@@ -168,7 +166,7 @@ az vm encryption show --name ${VMNAME} --resource-group ${RGNAME} --query "subst
168166
![General encryption status from the Azure CLI ](./media/disk-encryption/verify-encryption-linux/verify-gen-cli.png)
169167

170168
### Single pass
171-
You can validate the encryption settings from each individual disk by using the following Azure CLI commands:
169+
You can validate the encryption settings for each disk by using the following Azure CLI commands:
172170

173171
```bash
174172
az vm encryption show -g ${RGNAME} -n ${VMNAME} --query "disks[*].[name, statuses[*].displayStatus]" -o table
@@ -177,7 +175,7 @@ az vm encryption show -g ${RGNAME} -n ${VMNAME} --query "disks[*].[name, statuse
177175
![Data encryption settings](./media/disk-encryption/verify-encryption-linux/data-encryption-settings-2.png)
178176

179177
>[!IMPORTANT]
180-
> If the disk doesn't have encryption settings stamped, you'll see the message "Disk is not encrypted."
178+
> If the disk doesn't have encryption settings stamped, you'll see the text **Disk is not encrypted**.
181179
182180
Use the following commands to get detailed status and encryption settings.
183181

@@ -228,7 +226,8 @@ az vm encryption show --name ${VMNAME} --resource-group ${RGNAME} -o table
228226
```
229227

230228
![General encryption settings for dual pass via the Azure CLI](./media/disk-encryption/verify-encryption-linux/verify-gen-dual-cli.png)
231-
You can also check the Encryption settings on the VM Model Storage profile of the OS disk:
229+
230+
You can also check the encryption settings on the VM Model Storage profile of the OS disk:
232231

233232
```bash
234233
disk=`az vm show -g ${RGNAME} -n ${VMNAME} --query storageProfile.osDisk.name -o tsv`
@@ -266,7 +265,7 @@ echo "==========================================================================
266265

267266
Unmanaged disks are VHD files that are stored as page blobs in Azure storage accounts.
268267

269-
To get the details of a specific disk, you need to provide:
268+
To get the details for a specific disk, you need to provide:
270269

271270
- The ID of the storage account that contains the disk.
272271
- A connection string for that particular storage account.
@@ -308,7 +307,7 @@ Use this command to list all the blobs on a particular container:
308307
```bash
309308
az storage blob list -c ${ContainerName} --connection-string $ConnectionString --query [].[name] -o tsv
310309
```
311-
Choose the disk you want to query and store its name on a variable:
310+
Choose the disk that you want to query and store its name on a variable:
312311
```bash
313312
DiskName="diskname.vhd"
314313
```
@@ -328,14 +327,14 @@ lsblk
328327

329328
![OS crypt layer for a partition](./media/disk-encryption/verify-encryption-linux/verify-os-crypt-layer.png)
330329

331-
You can get more details using the following **lsblk** variant.
330+
You can get more details by using the following **lsblk** variant.
332331

333332
You'll see a **crypt** type layer that is mounted by the extension. The following example shows logical volumes and normal disks having **crypto\_LUKS FSTYPE**.
334333

335334
```bash
336335
lsblk -o NAME,TYPE,FSTYPE,LABEL,SIZE,RO,MOUNTPOINT
337336
```
338-
![OS crypt layer for logial volumes and normal disks](./media/disk-encryption/verify-encryption-linux/verify-os-crypt-layer-2.png)
337+
![OS crypt layer for logical volumes and normal disks](./media/disk-encryption/verify-encryption-linux/verify-os-crypt-layer-2.png)
339338

340339
As an extra step, you can validate if the data disk has any keys loaded:
341340

0 commit comments

Comments
 (0)