You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/boot-integrity-monitoring-overview.md
+63-47Lines changed: 63 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Boot integrity monitoring overview
3
-
description: How to use the guest attestation extension to secure boot your VM. How to handle traffic blocking.
3
+
description: Learn how to use the Guest Attestation extension to secure boot your virtual machine and how to handle traffic blocking.
4
4
author: Howie425
5
5
ms.author: howieasmerom
6
6
ms.reviewer: jushiman
@@ -13,34 +13,38 @@ ms.custom: template-concept
13
13
14
14
# Boot integrity monitoring overview
15
15
16
-
To help Trusted Launch better prevent malicious rootkit attacks on virtual machines, guest attestation through Microsoft Azure Attestation (MAA) endpoint is used to monitor the boot sequence integrity. This attestation is critical to provide validity of a platform’s states. If your [Azure Trusted Virtual Machines](trusted-launch.md) has Secure Boot and vTPM enabled and attestation extensions installed, Microsoft Defender for Cloud verifies that the status and boot integrity of your VM is set up correctly. To learn more about MDC integration, see the [trusted launch integration with Microsoft Defender for Cloud](trusted-launch.md#microsoft-defender-for-cloud-integration).
16
+
To help Azure Trusted Launch better prevent malicious rootkit attacks on virtual machines (VMs), guest attestation through an Azure Attestation endpoint is used to monitor the boot sequence integrity. This attestation is critical to provide the validity of a platform's states.
17
+
18
+
Your [Trusted Launch VM](trusted-launch.md) needs Secure Boot and virtual Trusted Platform Module (vTPM) to be enabled so that the attestation extensions can be installed. Microsoft Defender for Cloud offers reports based on Guest Attestation verifying status and that the boot integrity of your VM is set up correctly. To learn more about Microsoft Defender for Cloud integration, see [Trusted Launch integration with Microsoft Defender for Cloud](trusted-launch.md#microsoft-defender-for-cloud-integration).
17
19
18
20
> [!IMPORTANT]
19
-
> Automatic Extension Upgrade is now available for Boot Integrity Monitoring - Guest Attestation extension. Learn more about [Automatic extension upgrade](automatic-extension-upgrade.md).
21
+
> Automatic Extension Upgrade is now available for the Boot Integrity Monitoring - Guest Attestation extension. For more information, see [Automatic Extension Upgrade](automatic-extension-upgrade.md).
20
22
21
23
## Prerequisites
22
24
23
-
An Active Azure Subscription + Trusted Launch Virtual Machine
25
+
You need an active Azure subscription and a Trusted Launch VM.
24
26
25
27
## Enable integrity monitoring
26
28
29
+
To enable integrity monitoring, follow the steps in this section.
30
+
27
31
### [Azure portal](#tab/portal)
28
32
29
33
1. Sign in to the Azure [portal](https://portal.azure.com).
30
34
1. Select the resource (**Virtual Machines**).
31
-
1. Under **Settings**, select **configuration**. In the security type panel, select **integrity monitoring**.
35
+
1. Under **Settings**, select **Configuration**. On the **Security type** pane, select **Integrity monitoring**.
:::image type="content" source="media/trusted-launch/verify-integrity-boot-on.png" alt-text="Screenshot that shows Integrity monitoring selected.":::
34
38
35
39
1. Save the changes.
36
40
37
-
Now, under the virtual machines overview page, security type for integrity monitoring should state enabled.
41
+
On the VM **Overview**page, the security type for integrity monitoring should appear as **Enabled**.
38
42
39
-
This installs the guest attestation extension, which can be referred through settings within the extensions + applications tab.
43
+
This action installs the Guest Attestation extension, which you can refer to via the settings on the **Extensions + Applications** tab.
40
44
41
45
### [Template](#tab/template)
42
46
43
-
You can deploy the guest attestation extension for trusted launch VMs using a quickstart template:
47
+
You can deploy the Guest Attestation extension for Trusted Launch VMs by using a quickstart template.
44
48
45
49
#### Windows
46
50
@@ -76,6 +80,7 @@ You can deploy the guest attestation extension for trusted launch VMs using a qu
76
80
]
77
81
}
78
82
```
83
+
79
84
#### Linux
80
85
81
86
```json
@@ -114,70 +119,81 @@ You can deploy the guest attestation extension for trusted launch VMs using a qu
114
119
115
120
### [CLI](#tab/cli)
116
121
117
-
118
-
1. Create a virtual machine with Trusted Launch that has Secure Boot + vTPM capabilities through initial deployment of trusted launch virtual machine. To deploy guest attestation extension use (`--enable-integrity-monitoring`). Configuration of virtual machines are customizable by virtual machine owner (`az vm create`).
119
-
1. For existing VMs, you can enable boot integrity monitoring settings by updating to make sure enable integrity monitoring is turned on (`--enable-integrity-monitoring`).
122
+
1. Create a VM with Trusted Launch that has Secure Boot and vTPM capabilities through initial deployment of a Trusted Launch VM. To deploy the Guest Attestation extension, use `--enable-integrity-monitoring`. As the VM owner, you can customize VM configuration by using `az vm create`.
123
+
1. For existing VMs, you can enable boot integrity monitoring settings by updating to make sure that integrity monitoring is turned on. You can use `--enable-integrity-monitoring`.
120
124
121
125
> [!NOTE]
122
-
> The Guest Attestation Extension needs to be configured explicitly.
126
+
> The Guest Attestation extension must be configured explicitly.
123
127
124
128
### [PowerShell](#tab/powershell)
125
129
126
-
If Secure Boot and vTPM are ON, boot integrity will be ON.
130
+
If Secure Boot and vTPM are set to **ON**, then boot integrity is also set to **ON**.
127
131
128
-
1. Create a virtual machine with Trusted Launch that has Secure Boot + vTPM capabilities through initial deployment of the trusted launch virtual machine. Configuration of virtual machines is customizable by virtual machine owner.
129
-
1. For existing VMs, you can enable boot integrity monitoring settings by updating to make sure both SecureBoot and vTPM are on.
132
+
1. Create a VM with Trusted Launch that has Secure Boot and vTPM capabilities through initial deployment of a Trusted Launch VM. As the VM owner, you can customize VM configuration.
133
+
1. For existing VMs, you can enable boot integrity monitoring settings by updating. Make sure that both Secure Boot and vTPM are set to **ON**.
130
134
131
-
For more information on creation or updating a virtual machine to include the boot integrity monitoring through the guest attestation extension, see [Deploy a VM with trusted launch enabled (PowerShell)](trusted-launch-portal.md#deploy-a-trusted-launch-vm).
135
+
For more information on creating or updating a VM to include boot integrity monitoring through the Guest Attestation extension, see [Deploy a VM with Trusted Launch enabled (PowerShell)](trusted-launch-portal.md#deploy-a-trusted-launch-vm).
132
136
133
137
---
134
138
135
-
## Troubleshooting guide for guest attestation extension installation
139
+
## Troubleshooting guide for Guest Attestation extension installation
140
+
141
+
This section addresses attestation errors and solutions.
136
142
137
143
### Symptoms
138
144
139
-
The Microsoft Azure Attestation extensions won't properly work when customers set up a network security group or proxy. An error that looks similar to (Microsoft.Azure.Security.WindowsAttestation.GuestAttestation provisioning failed.)
145
+
The Azure Attestation extension won't work properly when you set up a network security group (NSG) or a proxy. An error appears that looks similar to "`Microsoft.Azure.Security.WindowsAttestation.GuestAttestation` provisioning failed."
140
146
141
-
:::image type="content" source="media/trusted-launch/guest-attestation-failing.png" lightbox="./media/trusted-launch/guest-attestation-failing.png" alt-text="Screenshot of an error screen that results from a failed GA Extension.":::
147
+
:::image type="content" source="media/trusted-launch/guest-attestation-failing.png" lightbox="./media/trusted-launch/guest-attestation-failing.png" alt-text="Screenshot that shows an error that results from a failed Guest Attestation extension.":::
142
148
143
149
### Solutions
144
150
145
-
In Azure, Network Security Groups (NSG) are used to help filter network traffic between Azure resources. NSGs contains security rules that either allow or deny inbound network traffic, or outbound network traffic from several types of Azure resources. For the Microsoft Azure Attestation endpoint, it should be able to communicate with the guest attestation extension. Without this endpoint, Trusted Launch can’t access guest attestation, which allows Microsoft Defender for Cloud to monitor the integrity of the boot sequence of your virtual machines.
151
+
In Azure, NSGs are used to help filter network traffic between Azure resources. NSGs contain security rules that either allow or deny inbound network traffic, or outbound network traffic from several types of Azure resources. The Azure Attestation endpointshould be able to communicate with the Guest Attestation extension. Without this endpoint, Trusted Launch can't access guest attestation, which allows Microsoft Defender for Cloud to monitor the integrity of the boot sequence of your VMs.
146
152
147
-
Unblocking Microsoft Azure Attestation traffic in **Network Security Groups**using service tags.
153
+
To unblock Azure Attestation traffic in NSGs by using service tags:
148
154
149
-
1. Navigate to the **virtual machine** that you want to allow outbound traffic.
150
-
1. Under "Networking" in the left-hand sidebar, select the **networking settings** tab.
151
-
1. Then select **create port rule**, and **Add outbound port rule**.
152
-
:::image type="content" source="./media/trusted-launch/tvm-portrule.png" lightbox="./media/trusted-launch/tvm-portrule.png" alt-text="Screenshot of the add outbound port rule selection.":::
153
-
1. To allow Microsoft Azure Attestation, make the destination a **service tag**. This allows for the range of IP addresses to update and automatically set allow rules for Microsoft Azure Attestation. The destination service tag is **AzureAttestation** and action is set to **Allow**.
154
-
:::image type="content" source="media/trusted-launch/unblocking-NSG.png" alt-text="Screenshot showing how to make the destination a service tag.":::
155
+
1. Go to the VM that you want to allow outbound traffic.
156
+
1. On the leftmost pane, under **Networking**, select **Networking settings**.
157
+
1. Then select **Create port rule** > **Outbound port rule**.
155
158
156
-
Firewalls protect a virtual network, which contains multiple Trusted Launch virtual machines. To unblock Microsoft Azure Attestation traffic in **Firewall** using application rule collection.
159
+
:::image type="content" source="./media/trusted-launch/tvm-portrule.png" lightbox="./media/trusted-launch/tvm-portrule.png" alt-text="Screenshot that shows adding the Outbound port rule.":::
157
160
158
-
1. Navigate to the Azure Firewall, that has traffic blocked from the Trusted Launch virtual machine resource.
159
-
2. Under settings, select Rules (classic) to begin unblocking guest attestation behind the Firewall.
160
-
3. Select a **network rule collection** and add network rule.
161
-
:::image type="content" source="./media/trusted-launch/firewall-network-rule-collection.png" lightbox="./media/trusted-launch/firewall-network-rule-collection.png" alt-text="Screenshot of the adding application rule":::
162
-
5. The user can configure their name, priority, source type, destination ports based on their needs. The name of the service tag is as follows: **AzureAttestation**, and action needs to be set as **allow**.
161
+
1. To allow Azure Attestation, you make the destination a service tag. This setting allows for the range of IP addresses to update and automatically set rules that allow Azure Attestation. Set **Destination service tag** to **AzureAttestation** and set **Action** to **Allow**.
163
162
164
-
To unblock Microsoft Azure Attestation traffic in **Firewall** using application rule collection.
163
+
:::image type="content" source="media/trusted-launch/unblocking-NSG.png" alt-text="Screenshot that shows how to make the destination a service tag.":::
165
164
166
-
1. Navigate to the Azure Firewall, that has traffic blocked from the Trusted Launch virtual machine resource.
167
-
:::image type="content" source="./media/trusted-launch/firewall-rule.png" lightbox="./media/trusted-launch/firewall-rule.png" alt-text="Screenshot of the adding traffic for application rule route."::: The rules collection must contain at least one rule, navigate to Target FQDNs (fully qualified domain names).
168
-
2. Select Application Rule collection and add an application rule.
169
-
3. Select a name, a numeric priority for your application rules. The action for rule collection is set to ALLOW. To learn more about the application processing and values, read here.
170
-
:::image type="content" source="./media/trusted-launch/firewall-application-rule.png" lightbox="./media/trusted-launch/firewall-application-rule.png" alt-text="Screenshot of the adding application rule route.":::
171
-
4. Name, source, protocol, are all configurable by the user. Source type for single IP address, select IP group to allow multiple IP address through the firewall.
165
+
Firewalls protect a virtual network, which contains multiple Trusted Launch VMs. To unblock Azure Attestation traffic in a firewall by using an application rule collection:
172
166
173
-
### Regional Shared Providers
167
+
1. Go to the Azure Firewall instance that has traffic blocked from the Trusted Launch VM resource.
168
+
1. Under **Settings**, select **Rules (classic)** to begin unblocking guest attestation behind the firewall.
169
+
1. Under **Network rule collection**, select **Add network rule collection**.
174
170
175
-
Azure Attestation provides a [regional shared provider](https://maainfo.azurewebsites.net/) in each available region. Customers can choose to use the regional shared provider for attestation or create their own providers with custom policies. Shared providers can be accessed by any Azure AD user, and the policy associated with it cannot be changed.
171
+
:::image type="content" source="./media/trusted-launch/firewall-network-rule-collection.png" lightbox="./media/trusted-launch/firewall-network-rule-collection.png" alt-text="Screenshot that shows adding an application rule.":::
176
172
177
-
> [!NOTE]
178
-
> Users can configure their source type, service, destination port ranges, protocol, priority, and name.
173
+
1. Configure the name, priority, source type, and destination ports based on your needs. Set **Service tag name** to **AzureAttestation** and set **Action** to **Allow**.
174
+
175
+
To unblock Azure Attestation traffic in a firewall by using an application rule collection:
176
+
177
+
1. Go to the Azure Firewall instance that has traffic blocked from the Trusted Launch VM resource.
179
178
179
+
:::image type="content" source="./media/trusted-launch/firewall-rule.png" lightbox="./media/trusted-launch/firewall-rule.png" alt-text="Screenshot that shows adding traffic for the application rule route.":::
180
+
181
+
The rules collection must contain at least one rule that targets fully qualified domain names (FQDNs).
182
+
183
+
1. Select the application rule collection and add an application rule.
184
+
1. Select a name and a numeric priority for your application rules. Set **Action** for the rule collection to **Allow**.
185
+
186
+
:::image type="content" source="./media/trusted-launch/firewall-application-rule.png" lightbox="./media/trusted-launch/firewall-application-rule.png" alt-text="Screenshot that shows adding the application rule route.":::
187
+
188
+
1. Configure the name, source, and protocol. The source type is for a single IP address. Select the IP group to allow multiple IP addresses through the firewall.
189
+
190
+
### Regional shared providers
191
+
192
+
Azure Attestation provides a [regional shared provider](https://maainfo.azurewebsites.net/) in each available region. You can choose to use the regional shared provider for attestation or create your own providers with custom policies. Any Microsoft Entra user can access shared providers. The policy associated with it can't be changed.
193
+
194
+
> [!NOTE]
195
+
> You can configure the source type, service, destination port ranges, protocol, priority, and name.
180
196
181
-
## Next steps
197
+
## Related content
182
198
183
-
Learn more about [trusted launch](trusted-launch.md) and [deploying a trusted virtual machine](trusted-launch-portal.md).
199
+
Learn more about [Trusted Launch](trusted-launch.md) and [deploying a Trusted Launch VM](trusted-launch-portal.md).
0 commit comments