You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This topic describes required data collected to keep Azure Stack HCI secure, up to date, and working as expected.
17
+
This article describes required data collected to keep Azure Stack HCI secure, up to date, and working as expected.
18
18
19
-
Customer data, including the names, metadata, configuration, and contents of your on-premises virtual machines (VMs) is never sent to the cloud unless you turn on additional services like Azure Backup or Azure Site Recovery, or unless you enroll those VMs individually into cloud management services like Azure Arc.
19
+
Customer data, including the names, metadata, configuration, and contents of your on-premises virtual machines (VMs) is never sent to the cloud unless you turn on other services like Azure Backup or Azure Site Recovery, or unless you enroll those VMs individually into cloud management services like Azure Arc.
20
20
21
-
We do collect diagnostic data. The data described below is required for Microsoft to provide Azure Stack HCI. This data is collected once a day, and data collection events can be viewed in the event logs. Azure Stack HCI collects the minimum data required to keep your clusters up to date, secure, and operating properly.
21
+
We do collect diagnostic data. The data described in the following section is required for Microsoft to provide Azure Stack HCI. This data is collected once a day, and data collection events can be viewed in the event logs. Azure Stack HCI collects the minimum data required to keep your clusters up to date, secure, and operating properly.
22
22
23
23
> [!IMPORTANT]
24
-
> The data described below that Azure Stack HCI collects is independent from Windows diagnostic data, which can be configured for various levels of collection. In Azure Stack HCI, the default setting for Windows diagnostic data collection is Security (off), meaning that no Windows diagnostic data is sent unless the administrator changes the diagnostic data settings. For more information, see [Configure Windows diagnostic data in your organization](/windows/privacy/configure-windows-diagnostic-data-in-your-organization). Microsoft is an independent controller of any Windows diagnostic data collected in connection with Azure Stack HCI. Microsoft will handle the Windows diagnostic data in accordance with the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
24
+
> The data described below that Azure Stack HCI collects is independent from Windows diagnostic data, which can be configured for various levels of collection. In Azure Stack HCI, the default setting for Windows diagnostic data collection is Security (off), meaning that no Windows diagnostic data is sent unless the administrator changes the diagnostic data settings. For more information, see [Configure Windows diagnostic data in your organization](/windows/privacy/configure-windows-diagnostic-data-in-your-organization). Microsoft is an independent controller of any Windows diagnostic data collected in connection with Azure Stack HCI. Microsoft handles the Windows diagnostic data in accordance with the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
25
25
26
26
## Data collection and residency
27
27
28
28
This Azure Stack HCI data:
29
29
30
-
-is not sent to Microsoft until the product is registered with Azure. When Azure Stack HCI is unregistered, this data collection stops.
30
+
-isn't sent to Microsoft until the product is registered with Azure. When Azure Stack HCI is unregistered, this data collection stops.
31
31
- is logged to the Microsoft-AzureStack-HCI/Analytic event channel.
32
32
- is in JSON format, so that system administrators can examine and analyze the data being sent.
33
33
@@ -43,14 +43,14 @@ To learn about how Microsoft stores diagnostic data in Azure, see [Data residenc
43
43
44
44
## Data retention
45
45
46
-
After Azure Stack HCI collects this data, it is retained for 90 days. Aggregated, de-identified data may be kept longer.
46
+
After Azure Stack HCI collects this data, it's retained for 90 days. Aggregated, de-identified data may be kept longer.
47
47
48
48
## What data is collected?
49
49
50
50
Azure Stack HCI collects:
51
51
52
52
- Information about servers such as operating system version, processor model, number of processor cores, memory size, cluster identifier, and hash of hardware ID
53
-
- List of installed Azure Stack HCI server features (e.g. BitLocker)
53
+
- List of installed Azure Stack HCI server features (for example, BitLocker)
54
54
- Information necessary to compute the reliability of the Azure Stack HCI operating system
55
55
- Information necessary to compute the reliability of the health collection data
56
56
- Information gathered from the event log for specific errors, such as update download failed
Copy file name to clipboardExpand all lines: azure-local/concepts/nested-virtualization.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: jasongerend
5
5
ms.author: jgerend
6
6
ms.topic: conceptual
7
7
ms.service: azure-local
8
-
ms.date: 04/17/2023
8
+
ms.date: 02/27/2025
9
9
---
10
10
11
11
# Nested virtualization in Azure Stack HCI
@@ -17,7 +17,7 @@ ms.date: 04/17/2023
17
17
Nested virtualization is a feature that lets you run Hyper-V inside a Hyper-V virtual machine (VM). This allows you to maximize your hardware investments and gain flexibility in evaluation and testing scenarios.
18
18
19
19
> [!IMPORTANT]
20
-
> Because Azure Stack HCI is intended as a virtualization host where you run all of your workloads in VMs, nested virtualization is not supported in production environments. For production use, Azure Stack HCI should be deployed on validated physical hardware.
20
+
> Because Azure Stack HCI is intended as a virtualization host where you run all of your workloads in VMs, nested virtualization isn't supported in production environments. For production use, Azure Stack HCI should be deployed on validated physical hardware.
21
21
22
22
Some scenarios in which nested virtualization can be useful are:
23
23
@@ -42,7 +42,7 @@ To configure nested virtualization on a VM using PowerShell, see [Run Hyper-V in
42
42
## Nested virtualization processor support
43
43
44
44
Azure Stack HCI, version 21H2 adds support for nested virtualization on AMD processors. Now you can run nested virtualization on first generation EPYC processors or newer generations (Naples, Rome, Milan).
Copy file name to clipboardExpand all lines: azure-local/deploy/deployment-prep-active-directory.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Prepare Active Directory for Azure Local, version 23H2 deployment
3
3
description: Learn how to prepare Active Directory before you deploy Azure Local, version 23H2.
4
4
author: alkohli
5
5
ms.topic: how-to
6
-
ms.date: 02/20/2025
6
+
ms.date: 03/03/2025
7
7
ms.author: alkohli
8
8
ms.reviewer: alkohli
9
9
ms.service: azure-local
@@ -88,7 +88,7 @@ To create a dedicated OU, follow these steps:
88
88
89
89
1. Verify that the OU is created. If using a Windows Server client, go to **Server Manager > Tools > Active Directory Users and Computers**.
90
90
91
-
1. An OU with the specified name is created. This OU contains the new LCM deployment user account.
91
+
1. An OU with the specified name is created. This OU contains the new Lifecycle Manager (LCM) deployment user account.
92
92
93
93
:::image type="content" source="media/deployment-prep-active-directory/active-directory-11.png" alt-text="Screenshot of Active Directory Computers and Users window." lightbox="media/deployment-prep-active-directory/active-directory-11.png":::
94
94
@@ -97,18 +97,19 @@ To create a dedicated OU, follow these steps:
97
97
98
98
## Considerations for large scale deployments
99
99
100
-
The Lifecycle Manager (LCM) user account is utilized during Azure Local instance deployments that use Active Directory (AD), or for any add-node/repair operations for existing instances. The LCM user account is responsible for performing domain join actions, which necessitates the LCM user identity having delegated permissions to add computer accounts to the target Organizational Unit (OU) in the on-premises domain. During the deployment of Azure Local, the LCM user account is added to the local administrators' group of the physical machines.
100
+
The LCM user account is used during servicing operations, such as applying updates via PowerShell. This account is also used when performing domain join actions against your AD, such as [repairing a node](../manage/repair-server.md) or [adding a node](../manage/add-server.md). This requires the LCM user identity having delegated permissions to add computer accounts to the target OU in the on-premises domain.
101
101
102
-
To mitigate the risk of a compromised LCM user account credential, we advise that for each Azure Local instance, you have a dedicated LCM user account with a unique password.
102
+
During the cloud deployment of Azure Local, the LCM user account is added to the local administrators group of the physical nodes. To mitigate the risk of a compromised LCM user account, **we recommend having a dedicated LCM user account with a unique password for each Azure Local instance.** This recommendation limits the scope and impact of a compromised LCM account to a single instance.
103
103
104
-
We recommend that you follow these best practices for OU creation:
104
+
We recommend that you follow these best practices for OU creation. These recommendations are automated when you use the `New-HciAdObjectsPreCreation` cmdlet to [Prepare Active Directory](#active-directory-preparation-module).
105
105
106
106
- For each Azure Local instance, create an individual OU within Active Directory. This approach helps manage computer account, CNO, LCM user account, and physical machine computer accounts within the scope of a single OU for each instance.
107
107
- When deploying multiple instances at-scale, for easier management:
108
108
- Create an OU under a single parent OU for each instance.
109
-
- Disable GPO inheritance at the parent OU level.
109
+
- Enable the **Block Inheritance** option at both the parent OU and sub OU levels.
110
+
- To apply a GPO to all Azure Local instances, such as for nesting a domain group in the local administrators group, link the GPO to the parent OU and enable the **Enforced** option. By doing this, you apply the configuration to all sub OUs, even with **Block Inheritance** enabled.
110
111
111
-
The preceding recommendationsare automated, when you use the `New-HciAdObjectsPreCreation` cmdlet to [Prepare Active Directory](#active-directory-preparation-module).
112
+
If your organization's processes and procedures require deviations from these recommendations, they are allowed. However, it's important to consider the security and manageability implications of your design taking these factors into consideration.
Windows PowerShell can be used to manage resources and configure features on your Azure Stack HCI and Windows Server clusters.
17
+
This article describes how to manage Azure Stack HCI and Windows Server clusters using PowerShell.
18
+
19
+
You can use Windows PowerShell to manage resources and configure features on your Azure Stack HCI and Windows Server clusters.
18
20
19
21
You manage clusters from a remote computer, rather than on a host server in a cluster. This remote computer is called the management computer.
20
22
21
23
> [!NOTE]
22
-
> When running PowerShell commands from a management computer, include the `-Name` or `-Cluster` parameter with the name of the cluster you are managing. In addition, you will need to specify the fully qualified domain name (FQDN) when using the `-ComputerName` parameter for a server node.
24
+
> When running PowerShell commands from a management computer, include the `-Name` or `-Cluster` parameter with the name of the cluster you're managing. In addition, you need to specify the fully qualified domain name (FQDN) when using the `-ComputerName` parameter for a server node.
23
25
24
26
For the complete reference documentation for managing clusters using PowerShell, see the [FailoverCluster reference](/powershell/module/failoverclusters).
25
27
@@ -30,7 +32,7 @@ Windows PowerShell is used to perform all the tasks in this article. It's recomm
30
32
If the following cmdlets aren't available in your PowerShell session, you may need to add the `Failover Cluster` Module for Windows PowerShell Feature, using the following PowerShell cmd: `Add-WindowsFeature RSAT-Clustering-PowerShell`.
31
33
32
34
> [!NOTE]
33
-
> Starting with Windows 10 October 2018 Update, RSAT is included as a set of "Features on Demand" right from Windows 10. For versions older than Windows 10 22H2, simply go to **Settings > Apps > Apps & features > Optional features > Add a feature > RSAT: Failover Clustering Tools**, and select **Install**. For Windows 10 22H2 and Windows 11, go to **Settings > System > Optional features > Add a feature > RSAT: Failover Clustering Tools**, and select **Add**. To see operation progress, click the Back button to view status on the "Manage optional features" page. The added feature will persist across Windows 10 version upgrades.
35
+
> Starting with Windows 10 October 2018 Update, RSAT is included as a set of "Features on Demand" right from Windows 10. For versions older than Windows 10 22H2, go to **Settings > Apps > Apps & features > Optional features > Add a feature > RSAT: Failover Clustering Tools**, and select **Install**. For Windows 10 22H2 and Windows 11, go to **Settings > System > Optional features > Add a feature > RSAT: Failover Clustering Tools**, and select **Add**. To see operation progress, click the Back button to view status on the "Manage optional features" page. The added feature persists across Windows 10 version upgrades.
34
36
## View cluster settings and resources
35
37
36
38
Gets information about a cluster named Cluster1:
@@ -84,7 +86,7 @@ Starts the Cluster service on all server nodes of the cluster on which it isn't
84
86
Start-Cluster -Name Cluster1
85
87
```
86
88
87
-
This example stops the Cluster service on all nodes in the cluster named Cluster1, which will stop all services and applications configured in the cluster:
89
+
This example stops the Cluster service on all nodes in the cluster named Cluster1, which stops all services and applications configured in the cluster:
> If the node has been added to a single server, see these [manual steps](../deploy/single-server.md#change-a-single-node-to-a-multi-node-cluster-optional) to reconfigure Storage Spaces Direct.
112
+
> If the node is added to a single server, see these [manual steps](../deploy/single-server.md#change-a-single-node-to-a-multi-node-cluster-optional) to reconfigure Storage Spaces Direct.
111
113
112
114
## Set up the cluster witness
113
115
@@ -164,7 +166,7 @@ Before you remove (destroy) a cluster, you must unregister it from Azure first.
164
166
Use the `Remove-ClusterResource` cmdlet to remove one or all resources on a cluster. For more examples and usage information, see the [Remove-ClusterResource](/powershell/module/failoverclusters/remove-clusterresource) reference documentation.
165
167
166
168
> [!NOTE]
167
-
> You will need to temporarily enable Credential Security Service Provider (CredSSP) authentication to remove a cluster. For more information, see [Enable-WSManCredSSP](/powershell/module/microsoft.wsman.management/enable-wsmancredssp).
169
+
> You need to temporarily enable Credential Security Service Provider (CredSSP) authentication to remove a cluster. For more information, see [Enable-WSManCredSSP](/powershell/module/microsoft.wsman.management/enable-wsmancredssp).
168
170
169
171
The following example removes cluster resources by name on cluster Cluster1:
0 commit comments