You can monitor the integrity of your Shielded VMs in some of the
following ways:
You can use Cloud Monitoring to
monitor the boot integrity of
Shielded VM instances. Next, you can identify the cause of an integrity
validation failure, and update the integrity policy baseline accordingly.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-29 UTC."],[[["\u003cp\u003eShielded VM on Compute Engine enhances security against rootkits and bootkits.\u003c/p\u003e\n"],["\u003cp\u003eShielded VM uses Secure Boot, vTPM-enabled Measured Boot, and Integrity monitoring.\u003c/p\u003e\n"],["\u003cp\u003eYou can monitor the boot integrity of Shielded VM instances using Cloud Monitoring.\u003c/p\u003e\n"],["\u003cp\u003eCloud Run functions can be used to automate actions in response to integrity monitoring events.\u003c/p\u003e\n"]]],[],null,["# About Shielded VMs\n\n*** ** * ** ***\n\nYou can enable the Shielded VM service on your Compute Engine VM\ninstances to help defend against rootkits and bootkits. Shielded VM\nleverages advanced platform security capabilities such as\n[Secure Boot](/compute/shielded-vm/docs/shielded-vm#secure-boot),\n[Virtual trusted platform module (vTPM)](/compute/shielded-vm/docs/shielded-vm#vtpm)-enabled\n[Measured Boot](/compute/shielded-vm/docs/shielded-vm#measured-boot), and\n[Integrity monitoring](/compute/shielded-vm/docs/shielded-vm#integrity-monitoring).\n\nFor a more detailed overview, see\n[Key concepts for Shielded VM](/compute/shielded-vm/docs/shielded-vm).\n\nTo get started using Shielded VM, try the\n[quickstart](/compute/shielded-vm/docs/quickstart)\nor see\n[Modifying Shielded VM options](/compute/shielded-vm/docs/modifying-shielded-vm).\n\nYou can monitor the integrity of your Shielded VMs in some of the\nfollowing ways:\n\n- You can use [Cloud Monitoring](/monitoring/docs) to\n [monitor the boot integrity](/compute/shielded-vm/docs/integrity-monitoring) of\n Shielded VM instances. Next, you can identify the cause of an integrity\n validation failure, and update the integrity policy baseline accordingly.\n\n- You can also\n [use a Cloud Run functions trigger to automatically act](/compute/shielded-vm/docs/automating-responses-integrity-failures)\n on integrity monitoring events."]]