Skip to content

Commit

Permalink
Merge pull request #91 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
9/5 11:00 AM IST Publish
  • Loading branch information
PhilKang0704 authored Sep 5, 2024
2 parents 45bd76c + b7262e2 commit ca4c673
Show file tree
Hide file tree
Showing 7 changed files with 41 additions and 20 deletions.
3 changes: 2 additions & 1 deletion .openpublishing.publish.config.json
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,8 @@
"monikers": [],
"open_to_public_contributors": true,
"type_mapping": {
"Conceptual": "Content"
"Conceptual": "Content",
"ZonePivotGroups": "Toc"
},
"build_entry_point": "docs"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,8 @@ ms.subservice: sizes
ms.date: 04/19/2024
ms.author: mattmcinnes
ms.custom: include file
---
**Confidential Computing:** They support secure enclave technology using Intel SGX, which allows parts of the VM memory to be isolated from the main operating system. This enclave securely processes sensitive data, ensuring that it is protected even from privileged users and underlying system software.
---

**Data Protection:** DC-series VMs are ideal for applications that manage, store, and process sensitive data, such as personal identifiable information (PII), financial data, health records, and other types of confidential information. The hardware-based encryption ensures that data is protected at rest and during processing.

**Regulatory Compliance:** For businesses that need to comply with stringent regulatory requirements for data privacy and security (like GDPR, HIPAA, or financial industry regulations), DC-series VMs provide a hardware-assured environment that can help meet these compliance demands.
**Regulatory Compliance:** For businesses that need to comply with stringent regulatory requirements for data privacy and security (like GDPR, HIPAA, or financial industry regulations), DC-series VMs provide a hardware-assured environment that can help meet these compliance demands.
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,12 @@ ms.author: mattmcinnes
ms.reviewer: mattmcinnes
ms.custom: include file
---
The DCedsv5-series run Azure confidential VMs that can be used to protect the confidentiality and integrity of your code and data while it's being processed in the public cloud. Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to the application. These machines are powered by Intel® 4th Generation Xeon® Scalable processors with Base Frequency of 2.1 GHz, All Core Turbo Frequency of reach 2.9 GHz and Intel® Advanced Matrix Extensions (AMX) for AI acceleration. Featuring Intel® Trust Domain Extensions (TDX), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated hardware and software attacks. These VMs have native support for confidential disk encryption meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with Azure KeyVault or Azure Managed HSM with validation for FIPS 140-2 Level 3.
The DCedsv5-series are [Azure confidential VMs](/azure/confidential-computing/confidential-vm-overview) that protect the confidentiality and integrity of your code and data while it's being processed. Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to the application. These machines are powered by Intel® 4th Generation Xeon® Scalable processors with Base Frequency of 2.1 GHz, All Core Turbo Frequency of reach 2.9 GHz and [Intel® Advanced Matrix Extensions (AMX)](https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/advanced-matrix-extensions/overview.html) for AI acceleration.

Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html). These VMs have native support for confidential disk encryption meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3.

The DCedsv5 offer a balance of memory to vCPU performance that is suitable most production workloads. With up to 96 vCPUs, 384 GiB of RAM, and support for up to 2.8 TB of local disk storage. These VMs work well for many general computing workloads, e-commerce systems, web front ends, desktop virtualization solutions, sensitive databases, other enterprise applications and more.

> [!IMPORTANT]
> These virtual machines are in public preview and not recommended for production usage.
> These VMs are available in West Europe, Central US, East US 2 and North Europe.
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,12 @@ ms.author: mattmcinnes
ms.reviewer: mattmcinnes
ms.custom: include file
---
The DCesv5-series run Azure confidential VMs that can be used to protect the confidentiality and integrity of your code and data while it's being processed in the public cloud. Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to the application. These machines are powered by Intel® 4th Generation Xeon® Scalable processors with Base Frequency of 2.1 GHz, All Core Turbo Frequency of reach 2.9 GHz and Intel® Advanced Matrix Extensions (AMX) for AI acceleration. Featuring Intel® Trust Domain Extensions (TDX), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated hardware and software attacks. These VMs have native support for confidential disk encryption meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with Azure KeyVault or Azure Managed HSM with validation for FIPS 140-2 Level 3.
The DCesv5-series are [Azure confidential VMs](/azure/confidential-computing/confidential-vm-overview) that protect the confidentiality and integrity of your code and data while it's being processed. Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to the application. These machines are powered by Intel® 4th Generation Xeon® Scalable processors with Base Frequency of 2.1 GHz, All Core Turbo Frequency of reach 2.9 GHz and [Intel® Advanced Matrix Extensions (AMX)](https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/advanced-matrix-extensions/overview.html) for AI acceleration.

Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html). These VMs have native support for confidential disk encryption meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3.

The DCesv5 offer a balance of memory to vCPU performance that is suitable most production workloads. With up to 96 vCPUs, 384 GiB of RAM, and support for remote disk storage. If you require a local disk, please consider DCedsv5-series. These VMs work well for many general computing workloads, e-commerce systems, web front ends, desktop virtualization solutions, sensitive databases, other enterprise applications and more.

> [!IMPORTANT]
> These virtual machines are in public preview and not recommended for production usage.
> These VMs are available in West Europe, Central US, East US 2 and North Europe.
Original file line number Diff line number Diff line change
Expand Up @@ -189,7 +189,7 @@ Use the following steps to deploy the Java EE Cafe sample application to the Red
1. Use the following command to clone the source code from GitHub and check out the tag corresponding to this version of the article:

```bash
git clone https://github.com/Azure/rhel-jboss-templates.git --branch 20230418 --single-branch
git clone https://github.com/Azure/rhel-jboss-templates.git --branch 20240904 --single-branch
```

If you see an error message with the text `You are in 'detached HEAD' state`, you can safely ignore it.
Expand Down
25 changes: 12 additions & 13 deletions docfx.json
Original file line number Diff line number Diff line change
Expand Up @@ -7,14 +7,9 @@
"**/*.yml"
],
"exclude": [
"iot-edge/**",
"ai-services/document-intelligence/**",
"**/_themes/**",
"**/includes/**",
"**/obj/**",
"**/*.graffle",
"machine-learning/**",
"machine-learning/v1/**"
"**/obj/**"
],
"src": "articles",
"dest": "."
Expand All @@ -25,6 +20,13 @@
],
"src": "breadcrumb/azure-compute",
"dest": "breadcrumb/azure-compute"
},
{
"files": [
"zone-pivot-groups.yml"
],
"src": "zone-pivots",
"dest": "zone-pivots/azure-compute"
}
],
"resource": [
Expand All @@ -37,12 +39,8 @@
"**/*.svg"
],
"exclude": [
"iot-edge/**",
"ai-services/document-intelligence/**",
"**/_themes/**",
"**/obj/**",
"machine-learning/**",
"machine-learning/v1/**"
"**/obj/**"
],
"src": "articles",
"dest": "."
Expand Down Expand Up @@ -140,7 +138,8 @@
"Certification"
],
"uhfHeaderId": "azure",
"ms.suite": "office"
"ms.suite": "office",
"zone_pivot_group_filename": "zone-pivots/azure-compute/zone-pivot-groups.json"
},
"fileMetadata": {
"author": {
Expand Down Expand Up @@ -243,7 +242,7 @@
"overwrite": [],
"externalReference": [],
"template": [],
"rules": {
"rules": {
"sensitive-language-ma": {
"exclude": [
"articles/virtual-machines/workloads/sap/dbms-guide-ha-ibm.md",
Expand Down
10 changes: 10 additions & 0 deletions zone-pivots/zone-pivot-groups.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
### YamlMime:ZonePivotGroups
groups:
- id: empty
title: empty
prompt: empty
pivots:
- id: empty1
title: empty1
- id: empty2
title: empty2

0 comments on commit ca4c673

Please sign in to comment.