You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Trusted Launch overview and Learn how to configure Virtual Trusted Platform Module (vTPM) on Virtual Machines.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 12/11/2024
6
+
ms.date: 4/02/2026
7
7
ms.custom: engagement-fy25
8
8
# Customer intent: As an IT admin managing virtual machines in a cloud-based environment, I want to configure Virtual Trusted Platform Module (vTPM) on my VMs, so that I can enhance their security and ensure a trusted boot process.
9
9
---
10
10
11
11
# Trusted Launch for Azure VMware Solution
12
12
13
-
In this article, you will learn about Trusted Launch and how to configure Virtual Trusted Platform Module (vTPM) on Virtual Machines in Azure VMware Solution. Trusted Launch is a comprehensive security solution that encompasses three key components: Secure Boot, Virtual Trusted Platform Module (vTPM), and Virtualization-based security (VBS). Each of these components plays a vital role in fortifying the security posture of VMs.
13
+
In this article, learn about Trusted Launch and how to configure Virtual Trusted Platform Module (vTPM) on Virtual Machines in Azure VMware Solution. Trusted Launch is a comprehensive security solution that encompasses three key components: Secure Boot, Virtual Trusted Platform Module (vTPM), and Virtualization-based security (VBS). Each of these components plays a vital role in fortifying the security posture of VMs.
14
14
15
15
:::image type="content" source="./media/trusted-launch.png" alt-text="Diagram showing the three pillars of trusted launch, Secure Boot, Virtual Trusted Platform Module, and Virtualization-based Security." border="false" lightbox="./media/trusted-launch.png":::
16
16
@@ -22,26 +22,25 @@ In this article, you will learn about Trusted Launch and how to configure Virtua
22
22
23
23
• Gain insights and confidence of the entire boot chain's integrity.
24
24
25
-
• Ensure that workloads are trusted and verifiable.
25
+
• Ensure that workloads are trusted and verifiable.
26
26
27
27
## Secure Boot
28
28
29
-
Secure Boot is the first line of defense in Trusted Launch. It establishes a "root of trust" for VMs by ensuring that only signed operating systems and drivers are allowed to boot. This prevents the installation of malware-based rootkits and bootkits, which can compromise the security of the entire system. With Secure Boot enabled, every aspect of the boot process, from the boot loader to the kernel and kernel drivers, must be digitally signed by trusted publishers. This creates a robust shield against unauthorized modifications and ensures that the VM starts in a secure and trusted state.
29
+
Secure Boot is the frontline of defense in Trusted Launch. It establishes a "root of trust" for VMs by ensuring that only signed operating systems and drivers are allowed to boot. Secure Boot prevents the installation of malware-based rootkits and bootkits, which can compromise the security of the entire system. With Secure Boot enabled, ensure every aspect of the boot process (from the boot loader to the kernel and kernel drivers) gets digitally signed by trusted publishers. The digital signatures create a robust shield against unauthorized modifications and ensure the VMs starts in a secure and trusted state.
30
30
31
31
## Virtual Trusted Platform Module (vTPM)
32
32
33
-
The vTPM is a virtualized version of a hardware Trusted Platform Module (TPM) 2.0 device. It serves as a dedicated secure vault for storing keys, certificates, and secrets. What sets vTPM apart is its ability to operate in a secure environment outside the reach of any VM, making it tamper-resistant and highly secure. One of the key functions of vTPM is attestation. It measures the entire boot chain of a VM, including UEFI, OS, system components, and drivers, to certify that the VM booted securely. This attestation mechanism is invaluable for verifying the integrity of VMs and ensuring that they haven't been compromised.
33
+
The vTPM is a virtualized version of a hardware Trusted Platform Module (TPM) 2.0 device. It serves as a dedicated secure vault for storing keys, certificates, and secrets. What sets vTPM apart is its ability to operate in a secure environment outside the reach of any VM, making it tamper-resistant and highly secure. One of the key functions of vTPM is attestation. It measures the entire boot chain of a VM, including Unified Extensible Firmware Interface (UEFI), OS, system components, and drivers to certify that the VM booted securely. The attestation mechanism is invaluable for verifying the integrity of VMs and ensuring that they aren't compromised.
34
34
35
35
## Virtualization-based Security (VBS)
36
36
37
-
Virtualization-based Security (VBS) is the final piece of the Trusted Launch puzzle. It leverages the hypervisor to create isolated, secure memory regions within the VM. VBS uses virtualization to enhance system security by creating an isolated, hypervisor-restricted, specialized subsystem. It provides protection against unauthorized access of credential, prevents malware from running on windows system and ensures only trusted code runs from bootloader onwards.
38
-
37
+
Virtualization-based Security (VBS) is the final piece of the Trusted Launch puzzle. It uses the hypervisor to create isolated, secure memory regions within the VM. VBS uses virtualization to enhance system security by creating an isolated, hypervisor-restricted, specialized subsystem. It provides protection against unauthorized access of credential, prevents malware from running on windows system, and ensures only trusted code runs from bootloader onwards.
39
38
40
39
## Configure Virtual Trusted Platform Module (vTPM) on Virtual Machines with Azure VMware Solution
41
40
42
-
This section demonstrates how to enable the virtual Trusted Platform Module (vTPM) in a VMware vSphere virtual machine (VM) running in the Azure VMware Solution.
41
+
This section demonstrates how to enable the virtual Trusted Platform Module (vTPM) in a VMware vSphere virtual machine (VM) running in Azure VMware Solution.
43
42
44
-
A virtual Trusted Platform Module (vTPM) in VMware vSphere is a virtual counterpart of a physical TPM 2.0 chip, utilizing VM Encryption. It provides the same functionalities as a physical TPM but operates within VMs. Each VM can have its own unique and isolated vTPM, which helps secure sensitive information and maintain system integrity. This setting enables VMs to apply security features like BitLocker disk encryption and authenticate virtual hardware devices, creating a more secure virtual environment.
43
+
A virtual Trusted Platform Module (vTPM) in VMware vSphere is a virtual counterpart of a physical TPM 2.0 chip, utilizing VM Encryption. It provides the same functionalities as a physical TPM but operates within VMs. Each VM can have its own unique and isolated vTPM, which helps secure sensitive information and maintain system integrity. This setting enables VMs to apply security features like BitLocker disk encryption and authenticate virtual hardware devices, to create a more secure virtual environment.
45
44
46
45
### Prerequisites
47
46
@@ -52,28 +51,28 @@ Before configuring vTPM on a VM in Azure VMware Solution, ensure the following p
52
51
- Guest OS support: Linux, Windows Server 2008 and later, Windows 7 and later.
53
52
54
53
>[!IMPORTANT]
55
-
>Customers do not need to configure a key provider to use vTPM with Azure VMware Solution. Azure VMware Solution already provides and manages key providers for each environment.
54
+
>Customers don't need to configure a key provider to use vTPM with Azure VMware Solution. Azure VMware Solution already provides and manages key providers for each environment.
56
55
57
56
### How to Configure vTPM
58
57
59
58
To configure vTPM on a VM in Azure VMware Solution, follow these steps:
60
59
61
60
1. Connect to vCenter Server using the vSphere Client.
62
61
63
-
2. In the inventory, right-click the virtual machine you want to modify and select "Edit Settings".
62
+
2. In the inventory, right-click the virtual machine you want to modify and select **Edit Settings**.
64
63
65
64
:::image type="content" source="./media/enable-virtual-trusted-platform-module-on-virtual-machine-highres.png" alt-text="Diagram showing how to enable vTPM on a virtual machine in Azure VMware Solution." border="false" lightbox="./media/enable-virtual-trusted-platform-module-on-virtual-machine-highres.png":::
66
65
67
-
3. In the Edit Settings dialog box, click "Add New Device" and choose "Trusted Platform Module".
66
+
3. In the Edit Settings dialog box, select **Add New Device** and choose **Trusted Platform Module**.
68
67
69
-
4.Click "OK". The virtual machine Summary tab displays the Virtual Trusted Platform Module in the VM Hardware pane.
68
+
4.Select **OK**. The virtual machine Summary tab displays the Virtual Trusted Platform Module in the VM Hardware pane.
70
69
71
70
>[!IMPORTANT]
72
-
>On VMware vSphere 7, cloning a virtual machine creates an exact replica of both the VM and the vTPM. VMware vSphere 8 introduces options to either copy or replace the TPM, allowing for better handling of different use cases.
71
+
>On VMware vSphere 7, cloning a virtual machine creates an exact replica of both the VM and the vTPM. VMware vSphere 8 introduces options to either copy or replace the TPM, which allows for better handling of different use cases.
73
72
74
73
## Unsupported scenarios
75
74
76
-
Migration of VMs with vTPM might not be supported by some tools. Check the documentation of the migration tool. If it isn't supported, you can follow VMware documentation to safely disable vTPM and re-enable it post-migration.
75
+
Some tools don't support migrations of VMs with vTPM. Check the documentation of the migration tool. If it isn't supported, you can follow VMware documentation to safely disable vTPM and re-enable it post-migration.
Copy file name to clipboardExpand all lines: articles/azure-vmware/enable-managed-snat-for-workloads.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,16 +3,16 @@ title: Turn on Managed SNAT for Azure VMware Solution workloads
3
3
description: Learn how to turn on Managed SNAT for Azure VMware Solution workloads.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 3/22/2024
6
+
ms.date: 4/02/2026
7
7
ms.custom: engagement-fy23
8
8
# Customer intent: "As a cloud architect, I want to enable Managed SNAT for Azure VMware Solution workloads, so that I can facilitate outbound internet connectivity for my private cloud environment."
9
9
---
10
10
11
11
# Turn on Managed SNAT for Azure VMware Solution workloads
12
12
13
-
In this article, learn how to turn on Source Network Address Translation (SNAT) via the Azure VMware Solution Managed SNAT service to connect to outbound internet.
13
+
In this article, learn how to turn on Source Network Address Translation (SNAT) using the Azure VMware Solution Managed SNAT service to connect to outbound internet.
14
14
15
-
A SNAT service translates from an RFC 1918 space to the public internet for simple outbound internet access. Internet Control Message Protocol (ICMP) is turned off by design so that users can't ping an internet host. The SNAT service doesn't work when you have a default route from Azure.
15
+
A SNAT service translates from an RFC 1918 space to the public internet for simple outbound internet access. Internet Control Message Protocol (ICMP) gets turned off by design so users can't ping an internet host. The SNAT service doesn't work when you have a default route from Azure.
16
16
17
17
The Managed SNAT service in Azure VMware Solution gives you:
18
18
@@ -22,15 +22,15 @@ The Managed SNAT service in Azure VMware Solution gives you:
22
22
By using the Managed SNAT service, you *don't* have:
23
23
24
24
- Control of outbound SNAT rules.
25
-
- Control of the public IP address that's used.
25
+
- Control of the public IP address used.
26
26
- The ability to terminate inbound-initiated internet traffic.
27
27
- The ability to view connection logs.
28
28
29
29
## Reference architecture
30
30
31
31
The following figure shows internet access that's outbound from your Azure VMware Solution private cloud via the Managed SNAT service in Azure VMware Solution.
32
32
33
-
:::image type="content" source="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip-snat.png" alt-text="Diagram that shows the architecture of internet access to and from your Azure VMware Solution private cloud via public IP address directly to the SNAT edge." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip-snat-expanded.png":::
33
+
:::image type="content" source="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip-snat.png" alt-text="Diagram shows architecture of internet access to and from your Azure VMware Solution private cloud using public IP address directly to the SNAT edge." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip-snat-expanded.png":::
34
34
35
35
## Set up outbound internet access by using the Managed SNAT service
description: Learn how to access an Azure VMware Solution private cloud
4
4
ms.topic: tutorial
5
5
ms.service: azure-vmware
6
-
ms.date: 4/1/2024
6
+
ms.date: 4/02/2026
7
7
ms.custom: engagement-fy23
8
8
# Customer intent: As a cloud administrator, I want to access the Azure VMware Solution private cloud through a jump box, so that I can manage the vCenter Server and NSX Manager in a secure and efficient manner.
9
9
---
@@ -12,7 +12,7 @@ ms.custom: engagement-fy23
12
12
13
13
Azure VMware Solution doesn't allow you to manage your private cloud with your on-premises vCenter Server. Instead, you need to connect to the Azure VMware Solution vCenter Server instance through a jump box.
14
14
15
-
In this tutorial, learn how to create a jump box in the resource group that you created in the [previous tutorial](tutorial-configure-networking.md) and sign in to the Azure VMware Solution vCenter Server. This jump box is a Windows virtual machine (VM) on the same virtual network you created. It provides access to both vCenter Server and the NSX Manager.
15
+
In this tutorial, learn how to create a jump box in the resource group that you created in the [previous tutorial](tutorial-configure-networking.md) and sign in to the Azure VMware Solution vCenter Server. This jump box is a Windows virtual machine (VM) on the same virtual network you created. It provides access to both vCenter Server and the NSX Manager.
16
16
17
17
In this tutorial, you learn how to:
18
18
@@ -50,7 +50,7 @@ In this tutorial, you learn how to:
50
50
51
51
## Connect to the vCenter Server of your private cloud
52
52
53
-
1. From the jump box, sign in to vSphere Client with VMware vCenter Server SSO using a cloudadmin username and verify that the user interface displays successfully.
53
+
1. From the jump box, sign in to vSphere Client with VMware vCenter Server SSO using a CloudAdmin username and verify that the user interface displays successfully.
54
54
55
55
1. In the Azure portal, select your private cloud, and then **Manage** > **VMware credentials**.
56
56
@@ -70,7 +70,7 @@ In this tutorial, you learn how to:
70
70
71
71
:::image type="content" source="media/tutorial-access-private-cloud/ss6-vsphere-client-home.png" alt-text="Screenshot showing a summary of Cluster-1 in the vSphere Client."lightbox="media/tutorial-access-private-cloud/ss6-vsphere-client-home.png" border="true":::
72
72
73
-
1. In the second tab of the browser, sign in to NSX Manager with the 'cloudadmin' user credentials from earlier.
73
+
1. In the second tab of the browser, sign in to NSX Manager with the CloudAdmin user credentials from earlier.
74
74
75
75
:::image type="content" source="media/tutorial-access-private-cloud/ss9-nsx-manager-login.png" alt-text="Screenshot of the NSX Manager sign in page."lightbox="media/tutorial-access-private-cloud/ss9-nsx-manager-login.png" border="true":::
Copy file name to clipboardExpand all lines: articles/azure-vmware/tutorial-configure-networking.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Tutorial: Configure networking for your VMware private cloud in Azure"
3
3
description: Learn to create and configure the necessary network resources for deploying your private cloud in Azure.
4
4
ms.topic: tutorial
5
5
ms.service: azure-vmware
6
-
ms.date: 6/12/2024
6
+
ms.date: 4/06/2026
7
7
ms.custom:
8
8
- engagement-fy23
9
9
- sfi-image-nochange
@@ -29,13 +29,13 @@ This tutorial assumes that you completed the [previous tutorial about creating a
29
29
> [!NOTE]
30
30
> Before you create a virtual network, evaluate whether you want to connect to Azure VMware Solution by using an existing virtual network or by creating a new one:
31
31
>
32
-
> * To use an existing virtual network in the same Azure subscription as Azure VMware Solution, use the [Azure VNet connect](#select-an-existing-virtual-network) tab on the **Connectivity** pane.
32
+
> * To use an existing virtual network in the same Azure subscription as Azure VMware Solution, use the [Azure virtual network connect](#select-an-existing-virtual-network) tab on the **Connectivity** pane.
33
33
> * To use an existing virtual network in a different Azure subscription from Azure VMware Solution, use the guidance for [connecting to the private cloud manually](#connect-to-the-private-cloud-manually).
34
-
> * To create a new virtual network in the same Azure subscription as Azure VMware Solution, use the [Azure VNet connect](#create-a-new-virtual-network) tab or create one [manually](#create-a-virtual-network-manually).
34
+
> * To create a new virtual network in the same Azure subscription as Azure VMware Solution, use the [Azure virtual network connect](#create-a-new-virtual-network) tab or create one [manually](#create-a-virtual-network-manually).
35
35
36
36
## Prerequisites
37
37
38
-
*Make sure that the virtual network that you use for this tutorial:
38
+
*Verify the virtual network you use for this tutorial meets the following requirements:
39
39
40
40
* Contains a gateway subnet.
41
41
* Is in the same region as the Azure VMware Solution private cloud.
@@ -54,7 +54,7 @@ You can take advantage of the **Azure VNet connect** feature if you want to conn
54
54
55
55
When you select an existing virtual network, the Azure Resource Manager (ARM) template that creates the virtual network and other resources is redeployed. The resources, in this case, are the public IP address, gateway, gateway connection, and ExpressRoute authorization key.
56
56
57
-
If everything is set up, the deployment doesn't change anything. However, if anything is missing, it's created automatically. For example, if the gateway subnet is missing, it's added during the deployment.
57
+
If everything is set up, the deployment doesn't change anything. However, if anything is missing, it gets created automatically. For example, if the gateway subnet is missing, it gets added during the deployment.
58
58
59
59
1. In the Azure portal, go to the Azure VMware Solution private cloud.
60
60
@@ -121,7 +121,7 @@ After the deployment is complete, your virtual network appears in the resource g
121
121
122
122
### Create a virtual network gateway
123
123
124
-
Now that you've created a virtual network, create a virtual network gateway:
124
+
Now that you created a virtual network, create a virtual network gateway:
125
125
126
126
1. In your resource group, select **+ Add** to add a new resource.
127
127
@@ -151,7 +151,7 @@ After the deployment finishes, move to the next section to connect ExpressRoute
151
151
152
152
### Connect ExpressRoute to the virtual network gateway
153
153
154
-
Now that you've deployed a virtual network gateway, add a connection between it and your Azure VMware Solution private cloud:
154
+
Now that you deployed a virtual network gateway, add a connection between it and your Azure VMware Solution private cloud:
0 commit comments