diff --git a/articles/virtual-machines/sizes/general-purpose/includes/dc-family-summary.md b/articles/virtual-machines/sizes/general-purpose/includes/dc-family-summary.md index e8e2495563..c414ffba4b 100644 --- a/articles/virtual-machines/sizes/general-purpose/includes/dc-family-summary.md +++ b/articles/virtual-machines/sizes/general-purpose/includes/dc-family-summary.md @@ -10,4 +10,4 @@ ms.date: 04/19/2024 ms.author: mattmcinnes ms.custom: include file --- -The 'DC' series family are one of Azure's security focused general purpose VM instances. They're designed for [confidential computing](/azure/confidential-computing/overview-azure-products) offering enhanced data protection and integrity with various hardware-based Trusted Execution Environments (TEEs). These VMs are ideal for highly sensitive data, which may need more isolation from the host environment. +The 'DC' series family are one of Azure's security focused general purpose VM instances. They're designed for [confidential computing](/azure/confidential-computing/overview-azure-products) offering enhanced data protection and integrity with various hardware-based Trusted Execution Environments (TEEs). These VMs work well for many general computing workloads, e-commerce systems, web front ends, desktop virtualization solutions, sensitive databases, other enterprise applications and more. diff --git a/articles/virtual-machines/sizes/general-purpose/includes/dcedsv5-series-summary.md b/articles/virtual-machines/sizes/general-purpose/includes/dcedsv5-series-summary.md index 1c2935835a..5b67709fef 100644 --- a/articles/virtual-machines/sizes/general-purpose/includes/dcedsv5-series-summary.md +++ b/articles/virtual-machines/sizes/general-purpose/includes/dcedsv5-series-summary.md @@ -12,7 +12,9 @@ ms.custom: include file --- The DCedsv5-series are [Azure confidential VMs](/azure/confidential-computing/confidential-vm-overview) that protect the confidentiality and integrity of code and data while it's being processed. Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to the application. These machines are powered by Intel® 4th Generation Xeon® Scalable processors with Base Frequency of 2.1 GHz, All Core Turbo Frequency of 2.9 GHz and [Intel® AMX](https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/advanced-matrix-extensions/overview.html) for AI acceleration. -Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html). These VMs have native support for confidential disk encryption meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3. +Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html). + +These VMs have native support for [confidential disk encryption](/azure/virtual-machines/disk-encryption-overview) meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3. The DCedsv5 offer a balance of memory to vCPU performance that is suitable most production workloads. With up to 96 vCPUs, 384 GiB of RAM, and support for up to 2.8 TB of local disk storage. These VMs work well for many general computing workloads, e-commerce systems, web front ends, desktop virtualization solutions, sensitive databases, other enterprise applications and more. diff --git a/articles/virtual-machines/sizes/general-purpose/includes/dcesv5-series-summary.md b/articles/virtual-machines/sizes/general-purpose/includes/dcesv5-series-summary.md index cc5aa82c12..658208bd77 100644 --- a/articles/virtual-machines/sizes/general-purpose/includes/dcesv5-series-summary.md +++ b/articles/virtual-machines/sizes/general-purpose/includes/dcesv5-series-summary.md @@ -12,7 +12,9 @@ ms.custom: include file --- The DCesv5-series are [Azure confidential VMs](/azure/confidential-computing/confidential-vm-overview) that protect the confidentiality and integrity of code and data while it's being processed. Organizations can use these VMs to seamlessly bring confidential workloads to the cloud without any code changes to the application. These machines are powered by Intel® 4th Generation Xeon® Scalable processors with Base Frequency of 2.1 GHz, All Core Turbo Frequency of 2.9 GHz and [Intel® AMX](https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/advanced-matrix-extensions/overview.html) for AI acceleration. -Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html). These VMs have native support for confidential disk encryption meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3. +Featuring [Intel® Trust Domain Extensions (TDX)](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html), these VMs are hardened from the cloud virtualized environment by denying the hypervisor, other host management code and administrators access to the VM memory and state. It helps to protect VMs against a broad range of sophisticated [hardware and software attacks](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html). + +These VMs have native support for [confidential disk encryption](/azure/virtual-machines/disk-encryption-overview) meaning organizations can encrypt their VM disks at boot with either a customer-managed key (CMK), or platform-managed key (PMK). This feature is fully integrated with [Azure KeyVault](/azure/key-vault/general/overview) or [Azure Managed HSM](/azure/key-vault/managed-hsm/overview) with validation for FIPS 140-2 Level 3. The DCesv5 offer a balance of memory to vCPU performance that is suitable most production workloads. With up to 96 vCPUs, 384 GiB of RAM, and support for remote disk storage. If you require a local disk, please consider DCedsv5-series. These VMs work well for many general computing workloads, e-commerce systems, web front ends, desktop virtualization solutions, sensitive databases, other enterprise applications and more. diff --git a/articles/virtual-machines/sizes/memory-optimized/ec-family.md b/articles/virtual-machines/sizes/memory-optimized/ec-family.md index 3c73a95345..94c055e842 100644 --- a/articles/virtual-machines/sizes/memory-optimized/ec-family.md +++ b/articles/virtual-machines/sizes/memory-optimized/ec-family.md @@ -24,7 +24,7 @@ ms.author: mattmcinnes ### ECasv5 and ECadsv5-series [!INCLUDE [ecasv5-ecadsv5-series-summary](./includes/ecasv5-ecadsv5-series-summary.md)] -[View the full Ecasv5 and Ecadsv5-series page](../../ecasv5-ecadsv5-series.md). +[View the full ECasv5 and ECadsv5-series page](../../ecasv5-ecadsv5-series.md). [!INCLUDE [ecasv5-ecadsv5-series-specs](./includes/ecasv5-ecadsv5-series-specs.md)] @@ -32,7 +32,7 @@ ms.author: mattmcinnes ### ECesv5 and ECedsv5-series [!INCLUDE [ecesv5-ecedsv5-series-summary](./includes/ecesv5-ecedsv5-series-summary.md)] -[View the full Ecesv5 and Ecedsv5-series page](../../ecesv5-ecedsv5-series.md). +[View the full ECesv5 and ECedsv5-series page](../../ecesv5-ecedsv5-series.md). [!INCLUDE [ecesv5-ecedsv5-series-specs](./includes/ecesv5-ecedsv5-series-specs.md)] @@ -40,7 +40,7 @@ ms.author: mattmcinnes ### ECas_ccv5 and ECads_ccv5-series [!INCLUDE [ecasccv5-ecadsccv5-series-summary](./includes/ecasccv5-ecadsccv5-series-summary.md)] -[View the full Ecasccv5 and Ecadsccv5-series page](../../ecasccv5-ecadsccv5-series.md). +[View the full ECas_ccv5 and ECads_ccv5-series page](../../ecasccv5-ecadsccv5-series.md). [!INCLUDE [ecasccv5-ecadsccv5-series-specs](./includes/ecasccv5-ecadsccv5-series-specs.md)] diff --git a/articles/virtual-machines/sizes/memory-optimized/includes/ec-family-summary.md b/articles/virtual-machines/sizes/memory-optimized/includes/ec-family-summary.md index a5ee7d2940..d3652dbcbb 100644 --- a/articles/virtual-machines/sizes/memory-optimized/includes/ec-family-summary.md +++ b/articles/virtual-machines/sizes/memory-optimized/includes/ec-family-summary.md @@ -11,4 +11,4 @@ ms.author: mattmcinnes ms.custom: include file --- -The 'EC' sub-family of VM size series are one of Azure's security focused memory-optimized VM instances. They're designed for [confidential computing](/azure/confidential-computing/overview-azure-products) with enhanced data protection and integrity, featuring various hardware-based Trusted Execution Environments (TEEs). These instances are ideal for for memory-intensive workloads, such as large databases, big data analytics, and enterprise applications that require significant amounts of RAM to maintain high performance. Equipped with high memory-to-core ratios, EC-series VMs support applications and services that benefit from faster data access and more efficient data processing capabilities. This makes them particularly well-suited for scenarios involving in-memory databases and extensive data processing tasks where ample memory is crucial for optimal performance. +The 'EC' sub-family of VM size series are one of Azure's security focused memory-optimized VM instances. They're designed for [confidential computing](/azure/confidential-computing/overview-azure-products) with enhanced data protection and integrity, featuring various hardware-based Trusted Execution Environments (TEEs). These instances are ideal for memory-intensive workloads, such as large databases, big data analytics, and enterprise applications that require significant amounts of RAM to maintain high performance.