Loading...

Confidential Virtual Machine support for Azure Virtual Desktop now in Public Preview

Confidential Virtual Machine support for Azure Virtual Desktop now in Public Preview

We’re announcing that Azure Virtual Desktop has public preview support for Azure Confidential Virtual Machines. Confidential Virtual Machines increase data privacy and security by protecting data in use. The Azure DCasv5 and ECasv5 confidential VM series provide a hardware-based Trusted Execution Environment (TEE) that features AMD SEV-SNP security capabilities, which harden guest protections to deny the hypervisor and other host management code access to VM memory and state, and that is designed to protect against operator access and encrypts data in use.

 

With this preview, support for Windows 11 22H2 has been added to Confidential Virtual Machines. Confidential OS Disk encryption and Integrity monitoring will be added to the preview at a later date. Confidential VM support for Windows 10 is planned.

 

Azure Confidential Virtual Machines enable encrypting data in use.Azure Confidential Virtual Machines enable encrypting data in use.

How to deploy Confidential Virtual Machines with AVD Host pool provisioning:

1) Select Confidential virtual machines from the Security Type dropdown in the AVD Host Pool Virtual Machine blade.

AVD Host pool provisioning Security Type Drop-DownAVD Host pool provisioning Security Type Drop-Down

2) Once Security Type is set to Confidential virtual machines, you will see Enable Secure Boot and Enable vTPM each selected. You have the option to disable Secure Boot though it is not recommended. vTPM is required.

AVD Host pool provisioning vTPM and Secure Boot checkboxes.AVD Host pool provisioning vTPM and Secure Boot checkboxes.

Learn More:

Review the Confidential Virtual Machine documentation for more information.

 

Published on:

Learn more
Azure Virtual Desktop Blog articles
Azure Virtual Desktop Blog articles

Azure Virtual Desktop Blog articles

Share post:

Related posts

Comparing feature sets for AKS enabled by Azure Arc deployment options

This article shows a comparison of features available for the different deployment options under AKS enabled by Azure Arc.    ...

3 hours ago

Azure Fluid Relay: Leveraging Azure Blob Storage to scale Git

Learn how to leverage Git as a storage mechanism behind the globally available Azure Fluid Relay (AFR) service. The post Azure Fluid Relay: Le...

9 hours ago

Verify the integrity of Azure Confidential Ledger transactions with receipts and application claims

In today's digital landscape, the integrity and confidentiality of transactional data are paramount. Microsoft’s Azure Confidential Ledger off...

10 hours ago

HTTP Trigger Azure Function Authorization Types simplified

Here' how you can quickly understand what are the different Authorization Levels to be set while working with HTTP Azure Functions.

1 day ago

Increasing Security for SQL Server Enabled by Azure Arc

Back in November 2023, the least privileges deployment model was introduced as a public preview. After thorough testing, we are excited to ann...

3 days ago

Govern your Azure Firewall configuration with Azure Policies

Introduction:  In the rapidly evolving digital landscape, securing cloud environments is more critical than ever. Azure Firewall emerges ...

3 days ago

Azure Verified Modules - Monthly Update [June]

AVM Module Summary The AVM team are excited that our community have been busy building AVM Modules. As of June 17th, the AVM Footprint curren...

3 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy