Skip to content

Commit feed001

Browse files
committed
Last round of updates before publish
1 parent 76f8e57 commit feed001

File tree

4 files changed

+37
-33
lines changed

4 files changed

+37
-33
lines changed

articles/databox/data-box-disk-deploy-set-up.md

Lines changed: 34 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Before you begin, make sure that:
7373
## Connect disks
7474

7575
> [!IMPORTANT]
76-
> Azure Data Box disk with hardware encryption is only supported and tested for Linux-based operating systems. To access disks using a Windows OS-based device, download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolswin) and run the **Data Box Disk Unlock tool**.
76+
> Azure Data Box disk with hardware encryption is only supported and tested for Linux-based operating systems. To access disks using a Windows OS-based device, download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolswin) and run the **Data Box Disk SED Unlock tool**.
7777
7878
### [Software encryption](#tab/bitlocker)
7979

@@ -83,7 +83,7 @@ Use the included USB cable to connect the disk to a Windows or Linux machine run
8383

8484
### [Hardware encryption](#tab/sed)
8585

86-
Only use the included SATA 3 cable to connect the disk to a Linux machine running a supported version. For more information on supported OS versions, go to [Azure Data Box Disk system requirements](data-box-disk-system-requirements.md).
86+
Connect the disks to an available SATA port on a Linux-based host running a supported version. For more information on supported OS versions, go to [Azure Data Box Disk system requirements](data-box-disk-system-requirements.md).
8787

8888
:::image type="content" source="media/data-box-disk-deploy-set-up/data-box-disk-connect-unlock-sata.png" alt-text="Screenshot showing the data box disk connector for hardware encrypted drives.":::
8989

@@ -172,7 +172,7 @@ If you run into any issues while unlocking the disks, see how to [troubleshoot u
172172
173173
Perform the following steps to connect and unlock hardware encrypted Data Box disks on a Linux-based machine.
174174
175-
1. The Trusted Platofrm Module (TPM) must be enabled on Linux systems for SATA-based drives. To enable TPM, set `libata.allow_tpm` to `1` by editing the GRUB config as shown in the following distro-specific examples. More details can be found on the Drive-Trust-Alliance public Wiki located at [https://github.com/Drive-Trust-Alliance/sedutil/wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
175+
1. The Trusted Platform Module (TPM) must be enabled on Linux systems for SATA-based drives. To enable TPM, set `libata.allow_tpm` to `1` by editing the GRUB config as shown in the following distro-specific examples. More details can be found on the Drive-Trust-Alliance public Wiki located at [https://github.com/Drive-Trust-Alliance/sedutil/wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
176176
177177
> [!WARNING]
178178
> Enabling the TPM on a device might require a reboot.
@@ -181,41 +181,44 @@ Perform the following steps to connect and unlock hardware encrypted Data Box di
181181
182182
### [CentOS](#tab/centos)
183183
184-
Use the following sample script to enable the TPM for CentOS.
184+
Use the following commands to enable the TPM for CentOS.
185185
186-
```bash
187-
sudo nano /etc/default/grub
186+
`sudo nano /etc/default/grub`
188187
189-
#Manually add "libata.allow_tpm=1" to the grub command line argument
190-
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash libata.allow_tpm=1"
188+
Next. manually add "libata.allow_tpm=1" to the grub command line argument.
191189
192-
#BIOS based systems:
193-
grub2-mkconfig -o /boot/grub2/grub.cfg
190+
`GRUB_CMDLINE_LINUX_DEFAULT="quiet splash libata.allow_tpm=1"`
194191
195-
#UEFI based systems:
196-
grub2-mkconfig -o /boot/efi/EFI/centos/grub.cfg
192+
For BIOS-based systems:
193+
`grub2-mkconfig -o /boot/grub2/grub.cfg`
197194
198-
reboot
195+
For UEFI-based systems:
196+
`grub2-mkconfig -o /boot/efi/EFI/centos/grub.cfg`
199197
200-
#Validate that the TPM setting is set properly by checking the boot image
201-
cat /proc/cmdline
202-
```
198+
`reboot`
199+
200+
Finally, validate that the TPM setting is set properly by checking the boot image.
201+
`cat /proc/cmdline`
203202
204203
### [Ubuntu/Debian](#tab/debian)
205204
206-
Use the following sample script to enable the TPM for Ubuntu/Debian.
205+
Use the following commands to enable the TPM for Ubuntu/Debian.
207206
208-
```bash
209-
sudo nano /etc/default/grub
207+
`sudo nano /etc/default/grub`
208+
209+
Next, manually add "libata.allow_tpm=1" to the grub command line argument.
210+
211+
`GRUB_CMDLINE_LINUX_DEFAULT="quiet splash libata.allow_tpm=1"`
212+
213+
Update GRUB and reboot.
214+
215+
`sudo update-grub`
216+
`reboot`
210217
211-
#Manually add "libata.allow_tpm=1" to the grub command line argument
212-
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash libata.allow_tpm=1"
218+
Finally, validate that the TPM setting is properly configured by checking the boot image.
213219
214-
sudo update-grub
215-
reboot
220+
`cat /proc/cmdline`
216221
217-
#Validate that the TPM setting is properly configured by checking the boot image
218-
cat /proc/cmdline
219222
```
220223
221224
---
@@ -226,7 +229,7 @@ Perform the following steps to connect and unlock hardware encrypted Data Box di
226229
> [!IMPORTANT]
227230
> SEDUtil is an external utility for Self-Encrypting Drives. This is not managed by Microsoft. More information, including license information for this utility, can be found at [https://sedutil.com/](https://sedutil.com/).
228231
229-
1. Extract `SEDUtil` to a local path on the machine and add the extracted tool path to the `PATH` environment variable using the distro-agnotic example. This is required in a later step when the utility utilizes `SEDUtil` to unlock the disk.
232+
1. Extract `SEDUtil` to a local path on the machine and create a symbolic link to the utility path using the following example. Alternatively, you can add the utility paht to the `PATH` environment variable.
230233
231234
```bash
232235
chmod +x /path/to/sedutil-cli
@@ -285,7 +288,8 @@ Perform the following steps to connect and unlock hardware encrypted Data Box di
285288
1. After you've finished copying your data to the disk, make sure to unmount and remove the disk safely using the following command.
286289
287290
```bash
288-
sudo ./DataBoxDiskUnlock /Unmount /SED
291+
sudo ./DataBoxDiskUnlock /SerialNumbers:<'serialNumber1,serialNumber2'>
292+
/Unmount /SED
289293
```
290294
291295
The following example output confirms that the volume unmounted successfully.
@@ -296,7 +300,7 @@ Perform the following steps to connect and unlock hardware encrypted Data Box di
296300
297301
Perform the following steps to unlock self-encrypting disks using Windows-based machines.
298302
299-
- Download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolswin) for Windows clients. This toolset contains four tools: the Data Box Disk Unlock tool, the Data Box SED Unlock tool, the Data Box Disk Validation tool, and the Data Box Disk Split Copy tool. Extract the toolset on the same computer that you will use to validate your data.
303+
- Download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolswin) for Windows clients and extract it to the same computer. Although the toolset contains four tools, only the **Data Box SED Unlock tool** is used for hardware-encrypted disks.
300304
- Connect your Data Box Disk to an available SATA 3 connection on your Windows-based machine.
301305
- Using a command prompt or PowerShell, run the following command to unlock self-encrypting disks.
302306
@@ -392,7 +396,7 @@ Perform the following steps to connect and unlock software encrypted Data Box di
392396
OpenSSL is already installed.
393397
```
394398
395-
1. Run the Data Box Disk Unlock tool, supplying the passkey retrieved from the Azure portal. Optionally, specify a list of BitLocker encrypted volumes to unlock. The passkey and volume list should be contained within single quotes as shown.
399+
1. Run the Data Box Disk Unlock tool, supplying the passkey retrieved from the Azure portal. Optionally, specify a list of BitLocker encrypted serial numbers to unlock. The passkey and serial numbers should be contained within single quotes as shown.
396400
397401
```bash
398402
sudo ./DataBoxDiskUnlock /PassKey:'<Passkey from Azure portal>'
@@ -405,7 +409,7 @@ Perform the following steps to connect and unlock software encrypted Data Box di
405409
406410
1. Repeat the unlock steps for any future disk reinserts. Use the `help` command for additional assistance with the Data Box Disk unlock tool.
407411
408-
`sudo //ataBoxDiskUnlock /Help`
412+
`sudo //DataBoxDiskUnlock /Help`
409413
410414
Sample output is shown below.
411415

articles/databox/data-box-disk-quickstart-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ This step takes roughly 5 minutes.
159159

160160
1. In the Azure portal, go to **General > Device Details** and get the passkey.
161161
2. Download and extract operating system-specific Data Box Disk unlock tool on the computer used to copy the data to disks.
162-
3. Run the Data Box Disk Unlock tool and supply the passkey. For any disk reinserts, run the unlock tool again and provide the passkey. **Do not use the BitLocker dialog or the BitLocker key to unlock the disk when using Windows-based hosts.** For more information on how to unlock disks, go to [Unlock disks on Windows client](data-box-disk-deploy-set-up.md#unlock-disks-on-windows-client) or [Unlock disks on Linux client](data-box-disk-deploy-set-up.md#unlock-disks-on-linux-client).
162+
3. Run the Data Box Disk Unlock tool and supply the passkey. For any disk reinserts, run the unlock tool again and provide the passkey. **Do not use the BitLocker dialog or the BitLocker key to unlock the disk when using Windows-based hosts.** For more information on how to unlock disks, go to [Unlock disks](data-box-disk-deploy-set-up.md#unlock-disks).
163163
4. The drive letter assigned to the disk is displayed by the tool. Make a note of the disk drive letter. This is used in the subsequent steps.
164164

165165
## Copy data and validate

articles/databox/data-box-disk-troubleshoot-data-copy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ The issues seen when using a Split Copy tool to split the data over multiple dis
8989
|Error message/Warnings |Recommendations |
9090
|---------|---------|
9191
|[Info] Retrieving BitLocker password for volume: m <br>[Error] Exception caught while retrieving BitLocker key for volume m:<br> Sequence contains no elements.|This error is thrown if the destination Data Box Disk are offline. <br> Use `diskmgmt.msc` tool to online disks.|
92-
|[Error] Exception thrown: WMI operation failed:<br> Method=UnlockWithNumericalPassword, ReturnValue=2150694965, <br>Win32Message=The format of the recovery password provided is invalid. <br>BitLocker recovery passwords are 48 digits. <br>Verify that the recovery password is in the correct format and then try again.|Use Data Box Disk Unlock tool to first unlock the disks and retry the command. For more information, go to <li> [Unlock Data Box Disk for Windows clients](data-box-disk-deploy-set-up.md#unlock-disks-on-windows-client). </li><li> [Unlock disks](data-box-disk-deploy-set-up.md#unlock-disks) </li>|
92+
|[Error] Exception thrown: WMI operation failed:<br> Method=UnlockWithNumericalPassword, ReturnValue=2150694965, <br>Win32Message=The format of the recovery password provided is invalid. <br>BitLocker recovery passwords are 48 digits. <br>Verify that the recovery password is in the correct format and then try again.|Use Data Box Disk Unlock tool to first unlock the disks and retry the command. For more information, go to <li> [Unlock Data Box Disk](data-box-disk-deploy-set-up.md#unlock-disks). </li><li> [Unlock disks](data-box-disk-deploy-set-up.md#unlock-disks) </li>|
9393
|[Error] Exception thrown: A DriveManifest.xml file exists on the target drive. <br> This indicates the target drive may have been prepared with a different journal file. <br>To add more data to the same drive, use the previous journal file. To delete existing data and reuse target drive for a new import job, delete the *DriveManifest.xml* on the drive. Rerun this command with a new journal file.| This error is received when you attempt to use the same set of drives for multiple import session. <br> Use one set of drives only for one split and copy session only.|
9494
|[Error] Exception thrown: CopySessionId importdata-sept-test-1 refers to a previous copy session and cannot be reused for a new copy session.|This error is reported when trying to use the same job name for a new job as a previous successfully completed job.<br> Assign a unique name for your new job.|
9595
|[Info] Destination file or directory name exceeds the NTFS length limit. |This message is reported when the destination file was renamed because of long file path.<br> Modify the disposition option in `config.json` file to control this behavior.|

articles/databox/data-box-disk-troubleshoot-unlock.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ You have used the password in the BitLocker dialog and trying to unlock the disk
4848

4949
**Resolution**
5050

51-
To unlock the Data Box Disks, you need to use the Data Box Disk Unlock tool and provide the password from the Azure portal. For more information, go to [Tutorial: Unpack, connect, and unlock Azure Data Box Disk](data-box-disk-deploy-set-up.md#connect-to-disks-and-get-the-passkey).
51+
To unlock the Data Box Disks, you need to use the Data Box Disk Unlock tool and provide the password from the Azure portal. For more information, go to [Tutorial: Unpack, connect, and unlock Azure Data Box Disk](data-box-disk-deploy-set-up.md#retrieve-your-passkey).
5252

5353
### Issue: Could not unlock or verify some volumes. Contact Microsoft Support.
5454

0 commit comments

Comments
 (0)