Proposed Pull Request Change

title description author ms.author ms.service ms.topic ms.date ms.custom
Use Microsoft Defender for Cloud with guest attestation for Azure confidential VMs Learn how you can use Microsoft Defender for Cloud with your Azure confidential VMs with the guest attestation feature installed. prasadmsft reprasa azure-confidential-computing concept-article 09/29/2022 template-concept
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Content Truncation Detected
The generated rewrite appears to be incomplete.
Original lines: -
Output lines: -
Ratio: -
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: Use Microsoft Defender for Cloud with guest attestation for Azure confidential VMs description: Learn how you can use Microsoft Defender for Cloud with your Azure confidential VMs with the guest attestation feature installed. author: prasadmsft ms.author: reprasa ms.service: azure-confidential-computing ms.topic: concept-article ms.date: 09/29/2022 ms.custom: template-concept # Customer intent: As a cloud security administrator, I want to integrate Microsoft Defender for Cloud with my Azure confidential VMs using guest attestation, so that I can ensure the integrity and security of my virtual machine deployments. --- # Microsoft Defender for Cloud integration Azure *confidential virtual machines (confidential VMs)* are integrated with [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction). Defender for Cloud continuously checks that your confidential VM is set up correctly and provides relevant recommendations and alerts. To use Defender for Cloud with your confidential VM, you must have the [*guest attestation* feature](guest-attestation-confidential-vms.md) installed on the VM. For more information, see the [sample application for guest attestation](guest-attestation-example.md) to learn how to install the feature extension. ## Recommendations If there's a configuration problem with your confidential VM, Defender for Cloud recommends changes. ### Enable secure boot **Secure Boot should be enabled on supported Windows/Linux virtual machines** This low-severity recommendation means that your confidential VM supports secure boot, but this feature is currently disabled. This recommendation only applies to confidential VMs. ### Install guest attestation extension **Guest attestation extension should be installed on supported Windows/Linux virtual machines** This low-severity recommendation shows that your confidential VM doesn't have the guest attestation extension installed. However, secure boot and vTPM are already enabled. When you install this extension, Defender for Cloud can attest and monitor the *boot integrity* of your VMs proactively. Boot integrity is validated through remote attestation. When you enable boot integrity monitoring, Defender for Cloud issues an assessment with the status of the remote attestation. This feature is supported for Windows and Linux single VMs and uniform scale sets. ## Alerts Defender for Cloud also detects and alerts you to VM health problems. ### VM attestation failure **Attestation failed your virtual machine** This medium-severity alert means that attestation failed for your VM. Defender for Cloud periodically performs attestation on your VMs, and after the VM boots. > [!NOTE] > This alert is only available for VMs with vTPM enabled and the guest attestation extension installed. Secure boot must also be enabled for the attestation to succeed. If you need to disable secure boot, you can choose to suppress this alert to avoid false positives. Reasons for attestation failure include: - The attested information, which includes the boot log, deviates from a trusted baseline. This problem might indicate that untrusted modules have loaded and the OS might be compromised. - The attestation quote can't be verified to originate from the vTPM of the attested VM. This problem might indicate that malware is present, which might indicate that traffic to the vTPM is being intercepted. ## Next steps - [Learn more about the guest attestation feature](guest-attestation-confidential-vms.md) - [Learn to use a sample application with the guest attestation APIs](guest-attestation-example.md) - [Learn about Azure confidential VMs](confidential-vm-overview.md)
Success! Branch created successfully. Create Pull Request on GitHub
Error: