docs.aws.amazon.com
Open in
urlscan Pro
18.66.147.42
Public Scan
Submitted URL: https://aws.amazon.com/answers/security/aws-securing-windows-instances
Effective URL: https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/ec2-security.html
Submission: On January 18 via manual from US — Scanned from DE
Effective URL: https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/ec2-security.html
Submission: On January 18 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
WÄHLEN SIE IHRE COOKIE-EINSTELLUNGEN AUS Wir verwenden wichtige Cookies und ähnliche Tools, die für die Bereitstellung unserer Website und Dienste erforderlich sind. Wir verwenden Performance-Cookies, um anonyme Statistiken zu sammeln, damit wir verstehen, wie Kunden unsere Website nutzen, und Verbesserungen vornehmen können. Essentielle Cookies können nicht deaktiviert werden, aber Sie können auf „Cookies anpassen“ klicken, um Performance-Cookies abzulehnen. Wenn Sie zustimmen, verwenden AWS und zugelassene Dritte ebenfalls Cookies, um nützliche Website-Funktionen bereitzustellen, Ihre Präferenzen zu speichern und relevante Inhalte, einschließlich relevanter Werbung, anzuzeigen. Um fortzufahren, ohne diese Cookies zu akzeptieren, klicken Sie auf „Weiter ohne zu akzeptieren“. Um detailliertere Entscheidungen zu treffen oder mehr zu erfahren, klicken Sie auf „Cookies anpassen“. Alle Cookies akzeptierenOhne Akzeptieren fortfahrenAnpassen von Cookies COOKIE-EINSTELLUNGEN ANPASSEN Wir verwenden Cookies und ähnliche Tools (zusammen "Cookies") für folgende Zwecke. ESSENZIELL Diese Cookies sind erforderlich, um unsere Website und Services bereitzustellen und können nicht deaktiviert werden. Sie werden in der Regel als Reaktion auf Ihre Aktionen auf der Website festgelegt, z. B. die Festlegung Ihrer Datenschutzeinstellungen, die Anmeldung oder das Ausfüllen von Formularen. LEISTUNG Leistungs-Cookies stellen anonyme Statistiken darüber bereit, wie Kunden auf unserer Website navigieren, damit wir die Website-Erfahrung und -Leistung verbessern können. Zugelassene Dritte können Analysen in unserem Namen durchführen, die Daten aber nicht für ihre eigenen Zwecke verwenden. Lesitungs-Cookies zulassen Erlaubt FUNKTIONAL Funktionale Cookies helfen uns dabei, nützliche Website-Funktionen bereitzustellen, Ihre Präferenzen zu speichern und relevante Inhalte anzuzeigen. Zugelassene Dritte können diese Cookies so einrichten, dass bestimmte Website-Funktionen bereitgestellt werden. Wenn Sie diese Cookies nicht zulassen, funktionieren einige oder alle dieser Services möglicherweise nicht ordnungsgemäß. Funktionale Cookies zulassen Erlaubt WERBUNG Diese Cookies können von uns oder unseren Werbepartnern über unsere Website gesetzt werden und uns helfen, relevante Marketinginhalte bereitzustellen. Wenn Sie diese Cookies nicht zulassen, werden Sie weniger relevante Werbung erleben. Werbe-Cookies zulassen Erlaubt Das Blockieren einiger Arten von Cookies kann sich auf Ihre Erfahrung auf unseren Websites auswirken. Sie können Ihre Cookie-Einstellungen jederzeit ändern, indem Sie in der Fußzeile dieser Website auf Cookie-Einstellungen klicken. Um mehr darüber zu erfahren, wie wir und zugelassene Dritte Cookies auf unseren Websites verwenden, lesen Sie bitte unseren AWS-Cookie-Hinweis. AbbrechenEinstellungen speichern COOKIE-EINSTELLUNGEN KONNTEN NICHT GESPEICHERT WERDEN Wir speichern derzeit nur wichtige Cookies, da wir Ihre Cookie-Einstellungen nicht speichern konnten. Wenn Sie Ihre Cookie-Einstellungen ändern möchten, versuchen Sie es später erneut über den Link in der Fußzeile der AWS-Konsole oder wenden Sie sich an den Support, wenn das Problem weiterhin besteht. Verwerfen Kontakt Deutsch AWS-Konto erstellen 1. AWS 2. ... 3. Documentation 4. Amazon EC2 5. User Guide for Windows Instances Feedback Präferenzen AMAZON ELASTIC COMPUTE CLOUD USER GUIDE FOR WINDOWS INSTANCES * What is Amazon EC2? * Set up * Get started tutorial * Best practices * Working with AWS SDKs * Console-to-Code * Amazon Machine Images * Boot modes * Launch an instance * AMI boot mode parameter * Instance type boot mode * Instance boot mode * Operating system boot mode * UEFI variables * UEFI Secure Boot * How UEFI Secure Boot works * Launch an instance with UEFI Secure Boot support * Verify whether an instance is enabled for UEFI Secure Boot * AWS Windows AMIs * Windows fast launch * Prerequisites * Configure Windows fast launch settings * View Windows fast launch AMIs * Manage resource costs * Monitor Windows fast launch * Service-linked role * Managed AWS Windows AMIs * Specialized Windows AMIs * SQL Server AMIs * STIG Hardened AMIs * AWS Windows AMI version history * Find a Windows AMI * Shared AMIs * Find shared AMIs * Make an AMI public * Share an AMI with organizations or OUs * Share an AMI with specific AWS accounts * Cancel having an AMI shared with your account * Use bookmarks * Best practices for shared Windows AMIs * Paid AMIs * AMI lifecycle * Create a custom Windows AMI * Modify an AMI * Copy an AMI * Store and restore an AMI * Deprecate an AMI * Disable an AMI * Archive AMI snapshots * Deregister your AMI * Recover AMIs from the Recycle Bin * Automate the EBS-backed AMI lifecycle * Use encryption with EBS-backed AMIs * Monitor AMI events * Understand AMI billing * AMI billing fields * Find AMI billing information * Verify AMI charges on your bill * AMI quotas * Instances * Windows instances * Instance types * General purpose * Burstable performance instances * Key concepts * Unlimited mode * Concepts * Examples * Standard mode * Concepts * Examples * Work with burstable performance instances * Monitor your CPU credits * Compute optimized * Memory optimized * Storage optimized * Accelerated computing * Install NVIDIA drivers * Install AMD drivers * Activate NVIDIA GRID Virtual Applications * Optimize GPU settings * High-performance computing * Find an instance type * Get recommendations * For new workloads * For existing workloads * Change the instance type * Compatibility * Troubleshoot * Instance purchasing options * On-Demand Instances * Reserved Instances * Regional and zonal Reserved Instances (scope) * Types of Reserved Instances (offering classes) * How Reserved Instances are applied * Use your Reserved Instances * How you are billed * Buy Reserved Instances * Sell in the Reserved Instance Marketplace * Modify Reserved Instances * Exchange Convertible Reserved Instances * Reserved Instance quotas * Spot Instances * Best practices * How Spot Instances work * Spot Instance pricing history * Savings * Work with Spot Instances * Example launch specifications * Spot request status * Rebalance recommendations * Spot Instance interruptions * Reasons for interruption * Interruption behavior * Stop * Hibernate * Terminate * Prepare for interruptions * Initiate an interruption * Spot Instance interruption notices * Find interrupted Spot Instances * Determine whether Amazon EC2 terminated a Spot Instance * Billing * Spot placement score * Spot Instance data feed * Spot Instance quotas * Burstable performance instances * Dedicated Hosts * Pricing and billing * Burstable T3 instances on Dedicated Hosts * Work with Dedicated Hosts * Work with shared Dedicated Hosts * Dedicated Hosts on AWS Outposts * Host recovery * Host maintenance * Track configuration changes * Dedicated Instances * Work with Dedicated Instances * Capacity Reservations * On-Demand Capacity Reservations * Capacity Reservation pricing and billing * Work with Capacity Reservations * Work with Capacity Reservation groups * Capacity Reservations in cluster placement groups * Capacity Reservations in Local Zones * Capacity Reservations in Wavelength Zones * Capacity Reservations on AWS Outposts * Work with shared Capacity Reservations * Capacity Reservation Fleets * Capacity Reservation Fleet concepts * Work with Capacity Reservation Fleets * Example configurations * Using service-linked roles * Monitoring Capacity Reservations * CloudWatch metrics * EventBridge events * Utilization notifications * Capacity Blocks for ML * Capacity Blocks pricing and billing * Work with Capacity Blocks * Monitor Capacity Blocks * Instance lifecycle * Launch * Launch using the launch instance wizard * Old launch instance wizard * Launch using a launch template * Restrictions * Permissions * Control launching instances * Create * Modify (manage versions) * Delete * Launch instances * Launch an instance from an existing instance * Use an AWS Marketplace instance * Stop and start * Hibernate * Overview * Prerequisites * Limitations * Enable hibernation for an instance * Hibernate an instance * Start a hibernated instance * Troubleshoot * Reboot * Retire * Terminate * Considerations * Terminate an instance * Recover * Connect * Connect to your instance * Connect to instances without requiring a public IPv4 address * Prerequisites * Permissions * Security groups * Create an EC2 Instance Connect Endpoint * Connect to an instance * Log connections * Remove EC2 Instance Connect Endpoint * Service-linked role * Quotas * Connect your instance to a resource * Tutorial: Connect an EC2 instance to an RDS database * Option 1: Automatically connect – EC2 console * Task 1: Create an RDS database – optional * Task 2: Launch an EC2 instance – optional * Task 3: Automatically connect your EC2 instance to your RDS database * Task 4: Verify the connection configuration * Option 2: Automatically connect – RDS console * Task 1: Launch an EC2 instance – optional * Task 2: Create an RDS database and automatically connect it to your EC2 instance * Task 3: Verify the connection configuration * Option 3: Manually connect (create security groups) * Task 1: Launch an EC2 instance – optional * Task 2: Create an RDS database – optional * Task 3: Manually connect your EC2 instance to your RDS database * Clean up * Configure instances * EC2Launch v2 * Overview * Install * Migrate * Manage * Subscribe * Settings * Troubleshoot * Version histories * EC2Launch * Install EC2Launch * Version history * EC2Config service * Install EC2Config * Version history * Troubleshoot * PV drivers * Upgrade PV drivers * Troubleshoot PV drivers * AWS NVMe drivers * Optimize CPU options * Rules for specifying CPU options * CPU cores and threads per CPU core per instance type * Specify CPU options for your instance * View the CPU options for your instance * Set the time * Set the password * Add Windows components * Configure a secondary private IPv4 Address * Run commands at launch * Instance metadata and user data * Use IMDSv2 * How IMDSv2 works * Transition to using IMDSv2 * Supported SDKs * Configure the instance metadata options * For new instances * For existing instances * Retrieve instance metadata * Work with instance user data * Retrieve dynamic data * Instance metadata categories * Instance identity documents * Verify using the PKCS7 signature * Verify using the base64-encoded signature * Verify using the RSA-2048 signature * AWS public certificates * Instance identity roles * SQL Server Clustering in EC2 * Install WSL * Upgrade Windows instances * Perform an in-place upgrade * Perform an automated upgrade * Migrate to latest generation instance types * Migrate to Xen from Nitro * Migrate Microsoft SQL Server from Windows to Linux * Setting up * Get started * Troubleshoot an upgrade * Identify instances * Set up a Windows HPC cluster * Fleets * EC2 Fleet * EC2 Fleet request types * EC2 Fleet 'instant' type * EC2 Fleet configuration strategies * Plan an EC2 Fleet * Allocation strategies for Spot Instances * Attribute-based instance type selection * On-Demand backup * Capacity Rebalancing * Maximum price overrides * Control spending * Instance weighting * Work with EC2 Fleets * Spot Fleet * Spot Fleet request types * Spot Fleet configuration strategies * Plan a Spot Fleet request * Allocation strategies for Spot Instances * Attribute-based instance type selection * On-Demand in Spot Fleet * Capacity Rebalancing * Spot price overrides * Control spending * Instance weighting * Work with Spot Fleets * CloudWatch metrics for Spot Fleet * Automatic scaling for Spot Fleet * Target tracking scaling policies * Step scaling policies * Scheduled scaling * Monitor fleet events * EC2 Fleet event types * Spot Fleet event types * Create EventBridge rules * For EC2 Fleet events * For Spot Fleet events * Tutorials * Tutorial: Use EC2 Fleet with instance weighting * Tutorial: Use EC2 Fleet with On-Demand as the primary capacity * Tutorial: Launch On-Demand Instances using targeted Capacity Reservations * Tutorial: Launch instances into Capacity Blocks * Tutorial: Use Spot Fleet with instance weighting * Example configurations * EC2 Fleet example configurations * Spot Fleet example configurations * Fleet quotas * Elastic Graphics * Work with Elastic Graphics * Elastic Graphics maintenance * Use CloudWatch metrics to monitor Elastic Graphics * Troubleshoot * Monitor * Automated and manual monitoring * Best practices for monitoring * Monitor the status of your instances * Instance status checks * State change events * Scheduled events * Define event windows for scheduled events * Monitor your instances using CloudWatch * Enable detailed monitoring * List available metrics * Get statistics for metrics * Get statistics for a specific instance * Aggregate statistics across instances * Aggregate statistics by Auto Scaling group * Aggregate statistics by AMI * Graph metrics * Create an alarm * Create alarms that stop, terminate, reboot, or recover an instance * Automate using EventBridge * Log API calls with AWS CloudTrail * Monitor your .NET and SQL Server applications * Networking * Regions and Zones * Instance IP addressing * Multiple IP addresses * Instance hostname types * Bring your own IP addresses * Elastic IP addresses * Network interfaces * Best practices for configuring network interfaces * Scenarios for network interfaces * Requester-managed network interfaces * Assign prefixes * Work with prefixes * Network bandwidth * Enhanced networking * Elastic Network Adapter (ENA) * ENA Express * Intel 82599 VF * Operating system optimizations * Network performance metrics * Troubleshoot ENA Windows driver * Instance topology * How it works * Prerequisites * Permissions * Limitations * Examples * Placement groups * Work with placement groups * Share a placement group * Placement groups on AWS Outposts * Network MTU * Virtual private clouds * Ports and Protocols * Code examples * Actions * Add tags to resources * Allocate an Elastic IP address * Associate an Elastic IP address with an instance * Create a Amazon Virtual Private Cloud (Amazon VPC) * Create a launch template * Create a route table * Create a security group * Create a security key pair * Create a subnet * Create and run an instance * Delete a launch template * Delete a security group * Delete a security key pair * Delete a snapshot * Describe Availability Zones * Describe Regions * Describe instance status * Describe instances * Describe snapshots * Disable detailed monitoring * Disassociate an Elastic IP address from an instance * Enable monitoring * Get data about Amazon Machine Images * Get data about a security group * Get data about instance types * Get data about the instance profile associated with an instance * Get details about Elastic IP addresses * Get the default VPC * Get the default subnets for a VPC * List security key pairs * Reboot an instance * Release an Elastic IP address * Replace the instance profile associated with an instance * Set inbound rules for a security group * Start an instance * Stop an instance * Terminate an instance * Scenarios * Build and manage a resilient service * Get started with instances * Security * Infrastructure security * Resilience * Data protection * Windows VBS * Credential Guard * Identity and access management * IAM policies * Policy structure * Tag resources during creation * Control access to EC2 resources using resource tags * Example policies for CLI or SDK * Example policies for the console * AWS managed policies * IAM roles * Network access * Key pairs * Create key pairs * Tag a public key * Describe public keys * Delete a public key * Verify the fingerprint * Security groups * Security group rules * Connection tracking * Default and custom security groups * Work with security groups * Security group rules for different use cases * AWS PrivateLink * Configuration management * Update management * Change management * Compliance validation * Audit and accountability * NitroTPM * Considerations * Prerequisites * Verify whether an AMI is enabled for NitroTPM * Enable or stop using NitroTPM on an instance * Storage * Amazon EBS * EBS volumes * EBS volume types * General Purpose SSD volumes * Provisioned IOPS SSD volumes * Throughput Optimized HDD and Cold HDD volumes * Size and configuration constraints * Create a volume * Attach a volume to an instance * Attach a volume to multiple instances * NVMe reservations * Make a volume available for use * View volume details * Replace a volume * Replace a root volume * Monitor the status of your volumes * Detach a volume from an instance * Delete a volume * Fault testing * EBS snapshots * Create snapshots * Delete a snapshot * Lock a snapshot * Concepts * Considerations * IAM permissions * Work with snapshot lock * Monitoring snapshot locks * Monitoring snapshot locks using AWS CloudTrail * Monitoring snapshot locks using Amazon EventBridge * Copy a snapshot * Archive snapshots * Guidelines and best practices for archiving snapshots * Required IAM permissions * Work with snapshot archiving * Monitor snapshot archiving * View snapshot information * Share a snapshot * Block public access for snapshots * Considerations * IAM permissions * Enable block public access for snapshots * Monitor events * Recover snapshots from the Recycle Bin * Local snapshots on Outposts * Amazon EBS direct APIs * IAM permissions for EBS direct APIs * Use EBS direct APIs * Read snapshots * Write snapshots * Use encryption * Use Signature Version 4 signing * Use checksums * Idempotency for StartSnapshot API * Error retries * Optimize performance * EBS direct APIs service endpoints * Interface VPC endpoints * Log API calls with AWS CloudTrail * Frequently asked questions * Automate the snapshot lifecycle * VSS-based snapshots * What is AWS VSS? * Prerequisites * System requirements * IAM permissions * VSS components * Install manually * Update on a schedule * Create VSS snapshots * Use AWS Systems Manager * Use AWS Backup * Use Amazon Data Lifecycle Manager * Troubleshooting * Restore volumes from VSS snapshots * Version history * Amazon Data Lifecycle Manager * How Amazon Data Lifecycle Manager works * Default policies vs custom policies * Default policies * Default policy for EBS snapshots * Default policy for EBS-backed AMIs * Custom policies * Automate snapshot lifecycles * Requirements for using pre and post scripts * Automating application-consistent snapshots * Other use cases for pre and post scripts * How pre and post scripts work * Identifying snapshots created with pre and post scripts * Monitoring pre and post script execution * Automate AMI lifecycles * Automate cross-account snapshot copies * View, modify, and delete lifecycle policies * AWS Identity and Access Management * AWS managed policies * IAM service roles * Permissions for users * Permissions for encryption * Monitor the lifecycle of snapshots and AMIs * Monitor your policies using CloudWatch Events * Monitor your policies using Amazon CloudWatch * Troubleshooting * EBS data services * Elastic volumes * Requirements * Request volume modifications * Monitor modifications * Extend a file system * EBS encryption * Fast snapshot restore * EBS volumes and NVMe * EBS optimization * EBS performance * I/O characteristics and monitoring * Initialize volumes * RAID configuration * Benchmark EBS volumes * EBS CloudWatch metrics * EBS EventBridge events * EBS quotas * Instance store * Instance store volumes * Add instance store volumes * SSD instance store volumes * File storage * Amazon S3 * Amazon EFS * Amazon FSx * Instance volume limits * Root device volume * Device names * Block device mappings * Map disks to volumes * Resources and tags * Recycle Bin * Considerations * Required IAM permissions * Condition keys for Recycle Bin * Work with retention rules * Work with resources in the Recycle Bin * Monitor Recycle Bin * Monitor using EventBridge * Monitor using CloudTrail * Resource locations * Resource IDs * List and filter your resources * Global View * Tag your resources * Service quotas * Usage reports * Troubleshoot * Common issues * Common messages * Troubleshoot launch issues * Connect to your instance * Troubleshoot an unreachable instance * Reset a lost or expired Windows administrator password * Reset using EC2Launch v2 * Reset Using EC2Config * Reset using EC2Launch * Stop your instance * Terminate your instance * Troubleshoot Sysprep * EC2Rescue for Windows Server * Use the GUI * Use the command line * Use Systems Manager * EC2 Serial Console * Prerequisites * Configure access to the EC2 Serial Console * Connect to the EC2 Serial Console * Disconnect from the EC2 Serial Console * Troubleshoot your instance using the EC2 Serial Console * Use SAC to troubleshoot your Windows instance * Send a diagnostic interrupt * AWS Systems Manager for Microsoft System Center VMM * Set up * Manage EC2 Instances * Import Your VM * Troubleshoot * AWS Management Pack * Download * Deploy * Step 1: Install the AWS Management Pack * Step 2: Configure the watcher node * Step 3: Create an AWS Run As account * Step 4: Run the Add Monitoring wizard * Step 5: Configure ports and endpoints * Use * Upgrade * Uninstall * Troubleshoot * Related information * Document history Security in Amazon EC2 - Amazon Elastic Compute Cloud AWSDocumentationAmazon EC2User Guide for Windows Instances Diese Seite wurde nicht in Ihre Sprache übersetzt. Übersetzung anfragen SECURITY IN AMAZON EC2 PDFRSS Cloud security at AWS is the highest priority. As an AWS customer, you benefit from a data center and network architecture that are built to meet the requirements of the most security-sensitive organizations. Security is a shared responsibility between AWS and you. The shared responsibility model describes this as security of the cloud and security in the cloud: * Security of the cloud – AWS is responsible for protecting the infrastructure that runs AWS services in the AWS Cloud. AWS also provides you with services that you can use securely. Third-party auditors regularly test and verify the effectiveness of our security as part of the AWS Compliance Programs. To learn about the compliance programs that apply to Amazon EC2, see AWS Services in Scope by Compliance Program. * Security in the cloud – Your responsibility includes the following areas: * Controlling network access to your instances, for example, through configuring your VPC and security groups. For more information, see Controlling network traffic. * Managing the credentials used to connect to your instances. * Managing the guest operating system and software deployed to the guest operating system, including updates and security patches. For more information, see Update management in Amazon EC2. * Configuring the IAM roles that are attached to the instance and the permissions associated with those roles. For more information, see IAM roles for Amazon EC2. This documentation helps you understand how to apply the shared responsibility model when using Amazon EC2. It shows you how to configure Amazon EC2 to meet your security and compliance objectives. You also learn how to use other AWS services that help you to monitor and secure your Amazon EC2 resources. For security best practices for Amazon EC2 running Windows Server, see Security and Network under Best practices for Windows on Amazon EC2. CONTENTS * Infrastructure security in Amazon EC2 * Resilience in Amazon EC2 * Data protection in Amazon EC2 * Windows virtualization-based security features * Identity and access management for Amazon EC2 * Amazon EC2 key pairs and Windows instances * Amazon EC2 security groups for Windows instances * Access Amazon EC2 using an interface VPC endpoint * Configuration management in Amazon EC2 * Update management in Amazon EC2 * Change management in Amazon EC2 * Compliance validation for Amazon EC2 * Audit and accountability in Amazon EC2 * NitroTPM Javascript is disabled or is unavailable in your browser. To use the Amazon Web Services Documentation, Javascript must be enabled. Please refer to your browser's Help pages for instructions. Document Conventions Get started with instances Infrastructure security Did this page help you? - Yes Thanks for letting us know we're doing a good job! If you've got a moment, please tell us what we did right so we can do more of it. Did this page help you? - No Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better. HAT IHNEN DIESE SEITE GEHOLFEN? Ja Nein Feedback geben NÄCHSTES THEMA: Infrastructure security VORHERIGES THEMA: Get started with instances BRAUCHEN SIE HILFE? * Versuchen Sie es mit AWS re:Post * Einen AWS IQ-Experten kontaktieren DatenschutzNutzungsbedingungen für die WebsiteCookie-Einstellungen © 2024, Amazon Web Services, Inc. oder Tochtergesellschaften. Alle Rechte vorbehalten. AUF DIESER SEITE DID THIS PAGE HELP YOU? - NO Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better. Feedback