Skip to content

Commit

Permalink
Merge pull request #202 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
9/23 11:00 AM IST Publish
  • Loading branch information
PhilKang0704 authored Sep 23, 2024
2 parents 10eb227 + 119e7be commit dd01af5
Show file tree
Hide file tree
Showing 5 changed files with 11 additions and 7 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,4 @@ ms.date: 04/19/2024
ms.author: mattmcinnes
ms.custom: include file
---
The 'DC' series family are one of Azure's security focused general purpose VM instances. They're designed for [confidential computing](/azure/confidential-computing/overview-azure-products) offering enhanced data protection and integrity with various hardware-based Trusted Execution Environments (TEEs). These VMs are ideal for highly sensitive data, which may need more isolation from the host environment.
The 'DC' series family are one of Azure's security focused general purpose VM instances. They're designed for [confidential computing](/azure/confidential-computing/overview-azure-products) offering enhanced data protection and integrity with various hardware-based Trusted Execution Environments (TEEs). These VMs work well for many general computing workloads, e-commerce systems, web front ends, desktop virtualization solutions, sensitive databases, other enterprise applications and more.
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,9 @@ ms.custom: include file
---
The DCedsv5-series are [Azure confidential VMs](/azure/confidential-computing/confidential-vm-overview) that protect the confidentiality and integrity of code and data while it's being processed. Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to the application. These machines are powered by Intel® 4th Generation Xeon® Scalable processors with Base Frequency of 2.1 GHz, All Core Turbo Frequency of 2.9 GHz and [Intel® AMX](https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/advanced-matrix-extensions/overview.html) for AI acceleration.

Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html). These VMs have native support for confidential disk encryption meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3.
Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html).

These VMs have native support for [confidential disk encryption](/azure/virtual-machines/disk-encryption-overview) meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3.

The DCedsv5 offer a balance of memory to vCPU performance that is suitable most production workloads. With up to 96 vCPUs, 384 GiB of RAM, and support for up to 2.8 TB of local disk storage. These VMs work well for many general computing workloads, e-commerce systems, web front ends, desktop virtualization solutions, sensitive databases, other enterprise applications and more.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,9 @@ ms.custom: include file
---
The DCesv5-series are [Azure confidential VMs](/azure/confidential-computing/confidential-vm-overview) that protect the confidentiality and integrity of code and data while it's being processed. Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to the application. These machines are powered by Intel® 4th Generation Xeon® Scalable processors with Base Frequency of 2.1 GHz, All Core Turbo Frequency of 2.9 GHz and [Intel® AMX](https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/advanced-matrix-extensions/overview.html) for AI acceleration.

Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html). These VMs have native support for confidential disk encryption meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3.
Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html).

These VMs have native support for [confidential disk encryption](/azure/virtual-machines/disk-encryption-overview) meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3.

The DCesv5 offer a balance of memory to vCPU performance that is suitable most production workloads. With up to 96 vCPUs, 384 GiB of RAM, and support for remote disk storage. If you require a local disk, please consider DCedsv5-series. These VMs work well for many general computing workloads, e-commerce systems, web front ends, desktop virtualization solutions, sensitive databases, other enterprise applications and more.

Expand Down
6 changes: 3 additions & 3 deletions articles/virtual-machines/sizes/memory-optimized/ec-family.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,23 +24,23 @@ ms.author: mattmcinnes
### ECasv5 and ECadsv5-series
[!INCLUDE [ecasv5-ecadsv5-series-summary](./includes/ecasv5-ecadsv5-series-summary.md)]

[View the full Ecasv5 and Ecadsv5-series page](../../ecasv5-ecadsv5-series.md).
[View the full ECasv5 and ECadsv5-series page](../../ecasv5-ecadsv5-series.md).

[!INCLUDE [ecasv5-ecadsv5-series-specs](./includes/ecasv5-ecadsv5-series-specs.md)]

---
### ECesv5 and ECedsv5-series
[!INCLUDE [ecesv5-ecedsv5-series-summary](./includes/ecesv5-ecedsv5-series-summary.md)]

[View the full Ecesv5 and Ecedsv5-series page](../../ecesv5-ecedsv5-series.md).
[View the full ECesv5 and ECedsv5-series page](../../ecesv5-ecedsv5-series.md).

[!INCLUDE [ecesv5-ecedsv5-series-specs](./includes/ecesv5-ecedsv5-series-specs.md)]

---
### ECas_ccv5 and ECads_ccv5-series
[!INCLUDE [ecasccv5-ecadsccv5-series-summary](./includes/ecasccv5-ecadsccv5-series-summary.md)]

[View the full Ecasccv5 and Ecadsccv5-series page](../../ecasccv5-ecadsccv5-series.md).
[View the full ECas_ccv5 and ECads_ccv5-series page](../../ecasccv5-ecadsccv5-series.md).

[!INCLUDE [ecasccv5-ecadsccv5-series-specs](./includes/ecasccv5-ecadsccv5-series-specs.md)]

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,4 +11,4 @@ ms.author: mattmcinnes
ms.custom: include file
---

The 'EC' sub-family of VM size series are one of Azure's security focused memory-optimized VM instances. They're designed for [confidential computing](/azure/confidential-computing/overview-azure-products) with enhanced data protection and integrity, featuring various hardware-based Trusted Execution Environments (TEEs). These instances are ideal for for memory-intensive workloads, such as large databases, big data analytics, and enterprise applications that require significant amounts of RAM to maintain high performance. Equipped with high memory-to-core ratios, EC-series VMs support applications and services that benefit from faster data access and more efficient data processing capabilities. This makes them particularly well-suited for scenarios involving in-memory databases and extensive data processing tasks where ample memory is crucial for optimal performance.
The 'EC' sub-family of VM size series are one of Azure's security focused memory-optimized VM instances. They're designed for [confidential computing](/azure/confidential-computing/overview-azure-products) with enhanced data protection and integrity, featuring various hardware-based Trusted Execution Environments (TEEs). These instances are ideal for memory-intensive workloads, such as large databases, big data analytics, and enterprise applications that require significant amounts of RAM to maintain high performance.

0 comments on commit dd01af5

Please sign in to comment.