Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
---
title: Use Microsoft Defender for Cloud with guest attestation for Azure confidential VMs
description: Learn how you can use Microsoft Defender for Cloud with your Azure confidential VMs with the guest attestation feature installed.
author: prasadmsft
ms.author: reprasa
ms.service: azure-confidential-computing
ms.topic: concept-article
ms.date: 09/29/2022
ms.custom: template-concept
# Customer intent: As a cloud security administrator, I want to integrate Microsoft Defender for Cloud with my Azure confidential VMs using guest attestation, so that I can ensure the integrity and security of my virtual machine deployments.
---
# Microsoft Defender for Cloud integration
Azure *confidential virtual machines (confidential VMs)* are integrated with [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction). Defender for Cloud continuously checks that your confidential VM is set up correctly and provides relevant recommendations and alerts.
To use Defender for Cloud with your confidential VM, you must have the [*guest attestation* feature](guest-attestation-confidential-vms.md) installed on the VM. For more information, see the [sample application for guest attestation](guest-attestation-example.md) to learn how to install the feature extension.
## Recommendations
If there's a configuration problem with your confidential VM, Defender for Cloud recommends changes.
### Enable secure boot
**Secure Boot should be enabled on supported Windows/Linux virtual machines**
This low-severity recommendation means that your confidential VM supports secure boot, but this feature is currently disabled.
This recommendation only applies to confidential VMs.
### Install guest attestation extension
**Guest attestation extension should be installed on supported Windows/Linux virtual machines**
This low-severity recommendation shows that your confidential VM doesn't have the guest attestation extension installed. However, secure boot and vTPM are already enabled. When you install this extension, Defender for Cloud can attest and monitor the *boot integrity* of your VMs proactively. Boot integrity is validated through remote attestation.
When you enable boot integrity monitoring, Defender for Cloud issues an assessment with the status of the remote attestation.
This feature is supported for Windows and Linux single VMs and uniform scale sets.
## Alerts
Defender for Cloud also detects and alerts you to VM health problems.
### VM attestation failure
**Attestation failed your virtual machine**
This medium-severity alert means that attestation failed for your VM. Defender for Cloud periodically performs attestation on your VMs, and after the VM boots.
> [!NOTE]
> This alert is only available for VMs with vTPM enabled and the guest attestation extension installed. Secure boot must also be enabled for the attestation to succeed. If you need to disable secure boot, you can choose to suppress this alert to avoid false positives.
Reasons for attestation failure include:
- The attested information, which includes the boot log, deviates from a trusted baseline. This problem might indicate that untrusted modules have loaded and the OS might be compromised.
- The attestation quote can't be verified to originate from the vTPM of the attested VM. This problem might indicate that malware is present, which might indicate that traffic to the vTPM is being intercepted.
## Next steps
- [Learn more about the guest attestation feature](guest-attestation-confidential-vms.md)
- [Learn to use a sample application with the guest attestation APIs](guest-attestation-example.md)
- [Learn about Azure confidential VMs](confidential-vm-overview.md)