Microsoft announces a public preview for Trusted Launch as the default security setting on new Azure Gen2 VMs, Scale Sets, Compute Gallery images, and disks. This enhances foundational cloud security with features like Secure Boot and vTPM, helping users prepare for stronger, compliance-ready deployments. Unique :

Azure Trusted Launch: Default Security Boost for Gen2 VMs and More
Microsoft is rolling out a game-changing update for Azure Gen2 Virtual Machines (VMs), Scale Sets, Compute Gallery images, and OS disks. Starting soon, Trusted Launch will become the default security setting for new deployments. This move strengthens foundational cloud security and helps protect your workloads from modern threats.
What’s New with Trusted Launch Default (TLaD)?
Trusted Launch will automatically activate on new Gen2 VMs, Scale Sets, Azure Compute Gallery (ACG) images, and OS disks. Previously, you had to explicitly enable it in your deployment scripts. Now, if your deployment uses the latest API versions and meets certain conditions, Trusted Launch kicks in by default—no extra config needed.
Key changes include:
- Security type set to
TrustedLaunch
by default for new Gen2 VM and Scale Set deployments. - ACG image definitions default to
TrustedLaunchSupported
security type. - New disk property
SupportedSecurityOption
inherits security from the source image.
“This change is a major step and result of our ongoing efforts to improve the foundational security of our cloud computing platform.”
Why Trusted Launch Matters
Trusted Launch boosts VM security through cryptographic verification and boot integrity monitoring. It protects against rootkits and bootkits by enforcing Secure Boot and virtual TPM (vTPM) attestation. This ensures your VM boots into a trusted, uncompromised state.
It’s not just about security—it’s about compliance too. Trusted Launch helps meet standards like Azure Security Benchmark, FedRAMP, HIPAA, and PCI-DSS, making it essential for regulated workloads.
Key Features of Trusted Launch:
- Secure Boot: Blocks unauthorized boot-level malware.
- vTPM: Acts as a secure vault for encryption keys and measurements.
- Boot Integrity Monitoring: Continuously attests VM boot health.
How to Get Started with the Preview
Microsoft invites users to test this upcoming change via public preview. To enable it, register the feature flag TrustedLaunchByDefaultPreview
in your Azure subscription under the Microsoft.Compute
namespace.
After onboarding, all new Gen2 VM, Scale Set, ACG, and disk deployments will default to Trusted Launch—unless you explicitly override it. This applies across popular deployment tools like ARM templates, Bicep, and Terraform.
“We strongly recommend onboarding your subscription for public preview and validating this change with your existing deployments.”
Important Considerations and Limitations
Currently, some limitations exist. For example, the Azure portal doesn’t yet allow disabling Trusted Launch once preview is enabled. Also, resizing VMs to unsupported sizes after enabling Trusted Launch isn’t supported. Microsoft plans fixes before the full rollout.
If you need to bypass Trusted Launch temporarily, you can set the security type to Standard
in your deployment or unregister the preview feature flag.
Final Thoughts
Azure’s move to make Trusted Launch the default security setting marks a big leap in cloud workload protection. This change enhances trust and compliance while simplifying security management for your Gen2 VMs and related resources.
Tech pros should start testing now to ensure smooth adoption. As Microsoft puts it, “We take the security of our cloud computing platform as priority.” So, gear up to secure your Azure workloads with Trusted Launch by default!
From the New blog articles in Microsoft Community Hub