Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Linux » How to create Confidential VMs in Azure
  • microsoft authenticator 1280x720 1
    How to setup Microsoft Authenticator Password Manager
  • task manager not responding thumbnail
    Process Explorer: Replace built-in Task Manager Windows Server
  • Remove Frequently Used Folders from Quick Access in Windows 11
    How to Remove Frequently Used Folders from Quick Access in Windows 11 Windows
  • Featured image 1
    Transfer Windows License from one PC to the other on Windows Windows
  • speedtest
    How to set up a self-hosted speed test server on Ubuntu Linux Linux
  • username
    Is my AD user or service account password correct? Run App as a different User and switch Users in Windows Windows
  • Create Windows Defender Firewall Rule
    Fix Windows defender blocked incoming connection on Windows Network | Monitoring
  • Featured image Some Settings are managed by your organization
    How to Fix “Some Settings Are Managed by Your Organization” Error in Windows Update Windows

How to create Confidential VMs in Azure

Posted on 28/02/202327/03/2024 Raphael Gab-Momoh By Raphael Gab-Momoh No Comments on How to create Confidential VMs in Azure
FEATUREDC

A confidential VM is a virtual machine (VM) that uses hardware-based security technologies in protecting the data and code running inside of it from unauthorized access or tampering. In this article, you will be introduced to what a confidential virtual machine is and how to create Confidential VMs in Azure. Other useful articles can be viewed here: Enable Two-Factor Authentication for SSH in Linux and How to Install and Configure Jenkins on Windows 11 and How to determine the Remote Desktop Client App Version.

Even privileged insiders as the cloud provider or system administrator. Confidential VMs leverage trusted execution environments (TEEs), which are isolated and encrypted enclaves within the processor, to ensure that only trusted code and data can access and manipulate the confidential information stored inside them.

Benefits of Confidential Virtual Machines

Below are some benefits of Confidential Virtual Machines (VMs).

  • Confidential VMs protect sensitive data and workloads with hardware-based encryption and a Trusted Execution Environment (TEE). This reduces data breaches, unauthorized access and tampering by privileged employees.
  • Confidential VM help organizations comply with privacy and compliance regulations (GDPR, HIPAA, and PCI-DSS) as they require strict security controls for handling sensitive data. By deploying Confidential VMs, organizations can demonstrate their commitment to privacy and security.
  • Confidential VMs are adaptable and useful across a wide range of sectors and applications, as they are used in a variety of sensitive workloads, including data analytics, machine learning, financial services, healthcare, and government.
  • : When operating in encrypted settings, Confidential VMs are made to deliver high-performance computing with little overhead and latency. They are therefore perfect for demanding tasks that demand both security and efficiency.

Confidential VMs offer a strong and secure platform for delicate data and workloads in the cloud. Confidential VMs help businesses take advantage of Cloud Computing by preserving the privacy and security of customers’ data.

Create a Confidential Virtual Machines

1: On the top left-hand side of the portal, click on create a resource button

create-a-resource
Click create a resource

2. In the search bar, type “confidential VM” and select “Confidential VM” from the search results and click create on it for options

select
select from search result

3. Start with a preconfigured template

select-a
start with a preconfigured template

4. select your workload type

preconfigured
preconfigured template for production

5. On the “Create a Confidential VM” page, select your project details which include your desired subscription and resource group.

project-details
project details

6. Enter your instance details, these include the VM name, region and availability option, image

instance-details
instance details

7. Enter your Admin details

admin-account
Admin details

8. Enter your port rules

port-rules
port rules

9. Review to begin validation

review
review to validate

10. Create to begin the deployment. Wait for the deployment to be completed

wait
deployment in progress

11. Click on resource to access the VM when deployment completes

go-to-resource
deployment complete

12. Check out the details of the VM

offer

13. Connect if you need to. The port rule was ssh, click on the connect button and paste the number 4 into your PowerShell. The format is ssh username@ipaddress.

ssh techdivm@74.235.144.233
connected-to-confidential-vm
ssh connection established

Determine the hardware information for Confidential VMs

14. Hardware info

hardware-info
info

Summary of Confidential VM

A confidential VM is like every other VMs you know. It protects the data and workload with enhanced hardware-based security features.

To create one, access to the Azure marketplace has to be established by clicking on create a resource and searching with the keyword confidential VM. The steps to create one have been outlined in this article.

I hope you found this blog post helpful. In this guide, you have learned how to create Confidential VMs in Azure. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Linux Tags:Azure, security, SSH

Post navigation

Previous Post: Running PowerShell remotely on Azure VMs
Next Post: How to start HyperV VMs in safe mode

Related Posts

  • discorddd
    Discord Installation Guide for Linux System Linux
  • teams feature
    How to install and configure Microsoft Teams on Ubuntu Linux
  • AADSTS50020  User from Identity Provider does not exist in Tenant
    AADSTS50020: User from Identity Provider does not exist in Tenant AWS/Azure/OpenShift
  • Azure Backup 1
    How to Install Azure Backup Agent AWS/Azure/OpenShift
  • google sdk feature
    How To Install Google Cloud SDK on a Linux System Linux
  • azure
    Enter connection information for your on-premise directory or forests: Azure AD connect unable to connect directory, forest not available AWS/Azure/OpenShift

More Related Articles

discorddd Discord Installation Guide for Linux System Linux
teams feature How to install and configure Microsoft Teams on Ubuntu Linux
AADSTS50020  User from Identity Provider does not exist in Tenant AADSTS50020: User from Identity Provider does not exist in Tenant AWS/Azure/OpenShift
Azure Backup 1 How to Install Azure Backup Agent AWS/Azure/OpenShift
google sdk feature How To Install Google Cloud SDK on a Linux System Linux
azure Enter connection information for your on-premise directory or forests: Azure AD connect unable to connect directory, forest not available AWS/Azure/OpenShift

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • microsoft authenticator 1280x720 1
    How to setup Microsoft Authenticator Password Manager
  • task manager not responding thumbnail
    Process Explorer: Replace built-in Task Manager Windows Server
  • Remove Frequently Used Folders from Quick Access in Windows 11
    How to Remove Frequently Used Folders from Quick Access in Windows 11 Windows
  • Featured image 1
    Transfer Windows License from one PC to the other on Windows Windows
  • speedtest
    How to set up a self-hosted speed test server on Ubuntu Linux Linux
  • username
    Is my AD user or service account password correct? Run App as a different User and switch Users in Windows Windows
  • Create Windows Defender Firewall Rule
    Fix Windows defender blocked incoming connection on Windows Network | Monitoring
  • Featured image Some Settings are managed by your organization
    How to Fix “Some Settings Are Managed by Your Organization” Error in Windows Update Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,825 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.