You can monitor the integrity of your Shielded VMs in some of the
following ways:
You can use Cloud Monitoring to
monitor the boot integrity of
Shielded VM instances. Next, you can identify the cause of an integrity
validation failure, and update the integrity policy baseline accordingly.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-05 UTC."],[[["Shielded VM on Compute Engine enhances security against rootkits and bootkits."],["Shielded VM uses Secure Boot, vTPM-enabled Measured Boot, and Integrity monitoring."],["You can monitor the boot integrity of Shielded VM instances using Cloud Monitoring."],["Cloud Run functions can be used to automate actions in response to integrity monitoring events."]]],[]]