Quickstart: Encrypt a Windows IaaS VM with Azure PowerShell
Azure Disk Encryption helps you encrypt your Windows and Linux IaaS virtual machine disks. The solution is integrated with Azure Key Vault to help you control and manage the disk-encryption keys and secrets. By using Azure Disk encryption, you can ensure that your VMs are secured at rest using industry-standard encryption technology. In this quickstart, you'll create a Windows Server 2016 VM and encrypt the OS disk.
If you don't have an Azure subscription, create a free account before you begin.
This article has been updated to use the new Azure PowerShell Az module. You can still use the AzureRM module, which will continue to receive bug fixes until at least December 2020. To learn more about the new Az module and AzureRM compatibility, see Introducing the new Azure PowerShell Az module. For Az module installation instructions, see Install Azure PowerShell.
- Windows PowerShell ISE
- Install or update to the latest version of the Azure PowerShell module
- The Az module version needs to be 1.0.0 or higher. Use
Get-Module Az -ListAvailable | Select-Object -Property Name,Version,Pathto check the version.
- The Az module version needs to be 1.0.0 or higher. Use
- A copy of the Azure Disk Encryption prerequisites script.
- If you have this script already, download a new copy as it has recently changed.
- Use CTRL-A to select all the text then use CTRL-C to copy all the text into Notepad.
- Save the file as ADEPrereqScript.ps1
Sign in to Azure
Right-click Windows PowerShell ISE and click Run as administrator.
In the Administrator: Windows PowerShell ISE window, click View and then click Show Script Pane.
In the script pane, type the following cmdlet:
Click on the green arrow for Run Script, or use F5.
Use the interactive sign-in to finish connecting to your Azure account.
Copy your subscription ID that is returned for use in running the next PowerShell script.
Run the Azure Disk Encryption prerequisites script
ADEPrereqScript.ps1 will create a resource group, a key vault, and set the key vault access policy. The script also creates a resource lock on the key vault to help protect it from accidental deletion.
- In the Administrator: Windows PowerShell ISE window, click File and then click Open. Navigate to the ADEPrereqScript.ps1 file and double-click on it. The script will open in the script pane.
- Click on the green arrow for Run Script, or use F5 to run the script.
- Type in names for a new resource group and a new key vault. Don't use an existing resource group or key vault for this quickstart since we'll delete the resource group later.
- Type in the location where you want to create the resources, such as EastUS. Get a location list with
- Copy in your subscription ID. You can get your Subscription ID with
- Click on the green arrow for Run Script.
- Copy the returned DiskEncryptionKeyVaultUrl and DiskEncryptionKeyVaultId to be used later.
Create a virtual machine
You now need to create a virtual machine so you can encrypt its disk. The script you'll use creates a Windows Server 2016 VM with 8-GB RAM and a 30-GB OS disk.
Copy the script into the Administrator: Windows PowerShell ISE script pane and change the top three variables. The resource group and location need to be the same as you used for the prerequisites script.
# Variables for common values $resourceGroup = "MySecureRG" $location = "EastUS" $vmName = "MySecureVM" # Create user object $cred = Get-Credential -Message "Enter a username and password for the virtual machine." # Create a resource group #New-AzResourceGroup -Name $resourceGroup -Location $location # Create a subnet configuration $subnetConfig = New-AzVirtualNetworkSubnetConfig -Name mySubnet -AddressPrefix 192.168.1.0/24 # Create a virtual network $vnet = New-AzVirtualNetwork -ResourceGroupName $resourceGroup -Location $location ` -Name MYvNET -AddressPrefix 192.168.0.0/16 -Subnet $subnetConfig # Create a public IP address and specify a DNS name $pip = New-AzPublicIpAddress -ResourceGroupName $resourceGroup -Location $location ` -Name "mypublicdns$(Get-Random)" -AllocationMethod Static -IdleTimeoutInMinutes 4 # Create an inbound network security group rule for port 3389 $nsgRuleRDP = New-AzNetworkSecurityRuleConfig -Name myNetworkSecurityGroupRuleRDP -Protocol Tcp ` -Direction Inbound -Priority 1000 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * ` -DestinationPortRange 3389 -Access Allow # Create a network security group $nsg = New-AzNetworkSecurityGroup -ResourceGroupName $resourceGroup -Location $location ` -Name myNetworkSecurityGroup -SecurityRules $nsgRuleRDP # Create a virtual network card and associate with public IP address and NSG $nic = New-AzNetworkInterface -Name myNic -ResourceGroupName $resourceGroup -Location $location ` -SubnetId $vnet.Subnets.Id -PublicIpAddressId $pip.Id -NetworkSecurityGroupId $nsg.Id # Create a virtual machine configuration $vmConfig = New-AzVMConfig -VMName $vmName -VMSize Standard_D2_v3 | ` Set-AzVMOperatingSystem -Windows -ComputerName $vmName -Credential $cred | ` Set-AzVMSourceImage -PublisherName MicrosoftWindowsServer -Offer WindowsServer -Skus 2016-Datacenter-smalldisk -Version latest | ` Add-AzVMNetworkInterface -Id $nic.Id # Create a virtual machine New-AzVM -ResourceGroupName $resourceGroup -Location $location -VM $vmConfig
Click on the green arrow for Run Script to build the VM.
Encrypt the disk of the VM
Now that you've created and configured a key vault and a VM, you can encrypt the disk with the Set-AzVmDiskEncryptionExtension cmdlet.
Run the following cmdlet to encrypt the VM's disk:
Set-AzVmDiskEncryptionExtension -ResourceGroupName "MySecureRG" -VMName "MySecureVM" ` -DiskEncryptionKeyVaultId "<Returned by the prerequisites script>" -DiskEncryptionKeyVaultUrl "<Returned by the prerequisites script>"
When the encryption finishes, you can verify that the disk is encrypted with the following cmdlet:
Get-AzVmDiskEncryptionStatus -ResourceGroupName "MySecureRG" -VMName "MySecureVM"
Clean up resources
ADEPrereqScript.ps1 creates a resource lock on the key vault. To clean up the resources from this quickstart, you need to remove the resource lock first then delete the resource group.
Remove the resource lock from the key vault
$LockId =(Get-AzResourceLock -ResourceGroupName "MySecureRG" -ResourceName "MySecureVault" -ResourceType "Microsoft.KeyVault/vaults").LockID Remove-AzResourceLock -LockID $LockId
Remove the resource group. This will delete all resources in the group too.
Remove-AzResourceGroup -Name "MySecureRG"
Advance to the next article to learn more about Azure Disk Encryption prerequisites for IaaS VMs.
Send feedback about: