Skip to content

Commit 6038be7

Browse files
committed
fixing typos and links
1 parent a96e709 commit 6038be7

File tree

2 files changed

+34
-34
lines changed

2 files changed

+34
-34
lines changed

articles/defender-for-iot/organizations/how-to-deploy-certificates.md

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,13 @@ Make sure to create a unique certificate for each OT sensor, on-premises managem
2525
To perform the procedures described in this article, make sure that:
2626

2727
- You have a security, PKI or certificate specialist available to oversee the certificate creation
28-
- You can access the OT network sensor or on-premises management console as an **Admin** user. For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
28+
- You can access the OT network sensor or on-premises management console as an **Admin** user.
29+
30+
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
2931

3032
## Create SSL/TLS certificates
3133

32-
Create SSL/TLS certificates by first downloading the certificate from the OT sensor or on-premises management console and exporting it to the required file types.
34+
Create SSL/TLS certificates by first downloading a security certificate from the OT sensor or on-premises management console and then exporting it to the required file types.
3335

3436
### Download a security certificate
3537

@@ -41,7 +43,9 @@ Create SSL/TLS certificates by first downloading the certificate from the OT sen
4143

4244
1. Select the :::image type="icon" source="media/how-to-activate-and-set-up-your-sensor/show-certificate-icon.png" border="false"::: **Show certificate** icon to view the security certificate for this website.
4345

44-
### Create self-signed SSL/TLS certificates
46+
1. In the **Certificate viewer** pane, select the **Details** tab, then select **Export** to save the file on your local machine.
47+
48+
### Export an SSL/TLS certificate
4549

4650
1. Use a certificate management platform to create the following types of SSL/TLS certificate files:
4751

@@ -51,9 +55,7 @@ Create SSL/TLS certificates by first downloading the certificate from the OT sen
5155
| **.key – Private key file** | A key file is in the same format as a `.pem` file, with a different extension for support in Windows Explorer.|
5256
| **.pem – certificate container file (optional)** | Optional. A text file with a Base64-encoding of the certificate text, and a plain-text header and footer to mark the beginning and end of the certificate. |
5357

54-
For example: <!--i'm not sure now. is this the procedure to create a self-signed certificate? maybe we should divide it up, or give this a different title?-->
55-
56-
1. In the **Certificate viewer** pane, select the **Details** tab, then select **Export** to save the file on your local machine.
58+
For example:
5759

5860
1. Open the downloaded certificate file and select the **Details** tab > **Copy to file** to run the **Certificate Export Wizard**.
5961

@@ -67,30 +69,32 @@ Create SSL/TLS certificates by first downloading the certificate from the OT sen
6769
> You may need to convert existing files types to supported types.
6870
> For more information, see [Convert existing files to supported files](#convert-existing-files-to-supported-files).
6971
70-
1. <a name="1"></a> Verify that the certificates meet the following requirements:
72+
### Verify certificate file parameter requirements
73+
74+
Verify that the certificates meet the following requirements:
7175

72-
- **CRT file requirements**:
76+
- **CRT file requirements**:
7377

74-
| Field | Requirement |
75-
|---------|---------|
76-
| **Signature Algorithm** | SHA256RSA |
77-
| **Signature Hash Algorithm** | SHA256 |
78-
| **Valid from** | A valid past date |
79-
| **Valid To** | A valid future date |
80-
| **Public Key** | RSA 2048 bits (Minimum) or 4096 bits |
81-
| **CRL Distribution Point** | URL to a CRL server. If your organization doesn't [validate certificates against a CRL server](#verify-crl-server-access), remove this line from the certificate. |
82-
| **Subject CN (Common Name)** | domain name of the appliance, such as *sensor.contoso.com*, or *.contoso.com* |
83-
| **Subject (C)ountry** | Certificate country code, such as `US` |
84-
| **Subject (OU) Org Unit** | The organization's unit name, such as *Contoso Labs* |
85-
| **Subject (O)rganization** | The organization's name, such as *Contoso Inc.* |
78+
| Field | Requirement |
79+
|---------|---------|
80+
| **Signature Algorithm** | SHA256RSA |
81+
| **Signature Hash Algorithm** | SHA256 |
82+
| **Valid from** | A valid past date |
83+
| **Valid To** | A valid future date |
84+
| **Public Key** | RSA 2048 bits (Minimum) or 4096 bits |
85+
| **CRL Distribution Point** | URL to a CRL server. If your organization doesn't [validate certificates against a CRL server](#verify-crl-server-access), remove this line from the certificate. |
86+
| **Subject CN (Common Name)** | domain name of the appliance, such as *sensor.contoso.com*, or *.contoso.com* |
87+
| **Subject (C)ountry** | Certificate country code, such as `US` |
88+
| **Subject (OU) Org Unit** | The organization's unit name, such as *Contoso Labs* |
89+
| **Subject (O)rganization** | The organization's name, such as *Contoso Inc.* |
8690

87-
> [!IMPORTANT]
88-
> While certificates with other parameters might work, they aren't supported by Defender for IoT. Additionally, wildcard SSL certificates, which are public key certificates that can be used on multiple subdomains such as *.contoso.com*, are insecure and aren't supported.
89-
> Each appliance must use a unique CN. <!--what is this?-->
91+
> [!IMPORTANT]
92+
> While certificates with other parameters might work, they aren't supported by Defender for IoT. Additionally, wildcard SSL certificates, which are public key certificates that can be used on multiple subdomains such as *.contoso.com*, are insecure and aren't supported.
93+
> Each appliance must use a unique CN.
9094
91-
- **Key file requirements**: Use either RSA 2048 bits or 4096 bits. Using a key length of 4096 bits will slow down the SSL handshake at the start of each connection, and increase the CPU usage during handshakes.
95+
- **Key file requirements**: Use either RSA 2048 bits or 4096 bits. Using a key length of 4096 bits will slow down the SSL handshake at the start of each connection, and increase the CPU usage during handshakes.
9296

93-
1. (Optional) Create a certificate chain, which is a `.pem` file that contains the certificates of all the certificate authorities in the chain of trust that led to your certificate. Certificate chain files support bag attributes. <!--what is this and why do we care?-->
97+
- (Optional) Create a certificate chain, which is a `.pem` file that contains the certificates of all the certificate authorities in the chain of trust that led to your certificate. Certificate chain files support bag attributes. <!--what is this and why do we care?-->
9498

9599
## Verify CRL server access
96100

@@ -109,8 +113,6 @@ If your OT sensors and on-premises management consoles can't access your CRL ser
109113

110114
If validation fails, communication between the relevant components is halted and a validation error is presented in the console.
111115

112-
import the certificate by installing it on a trusted store.
113-
114116
## Import the SSL/TLS certificate to a trusted store
115117

116118
After creating your certificate, import it to a trusted storage location. For example:
@@ -148,7 +150,7 @@ If you want to check the information within the certificate `.csr` file or priva
148150
- **Check a private key**: Run `openssl rsa -in privateKey.key -check`
149151
- **Check a certificate**: Run `openssl x509 -in certificate.crt -text -noout`
150152

151-
If these tests fail, review certificate file parameter requirements <sup>[1](#1)</sup> to verify that your file parameters are accurate, or consult your certificate specialist.
153+
If these tests fail, review [certificate file parameter requirements](#verify-certificate-file-parameter-requirements) to verify that your file parameters are accurate, or consult your certificate specialist.
152154

153155
### Validate the certificate's common name
154156

@@ -170,8 +172,6 @@ If these tests fail, review certificate file parameter requirements <sup>[1](#1)
170172

171173
:::image type="content" source="media/how-to-activate-and-set-up-your-sensor/hosts-file.png" alt-text="Screenshot of the hosts file." lightbox="media/how-to-activate-and-set-up-your-sensor/hosts-file.png":::
172174

173-
<!--how do these last 2 steps validate the name? are they related or something different?-->
174-
175175
## Deploy an SSL/TLS certificate
176176

177177
After you've created your SSL/TLS certificate as required and have it installed on a trusted storage, deploy it to your OT sensor or on-premises management console.
@@ -184,7 +184,7 @@ After you've created your SSL/TLS certificate as required and have it installed
184184

185185
Select **Enable certificate validation** to validate the certificate against a [CRL server](#verify-crl-server-access).
186186

187-
[!NOTE]
187+
> [!NOTE]
188188
> While you can also use a locally-generated and self-signed certificate, we do not recommend this option.
189189
190190
1. Select **Save** to save your certificate settings.
@@ -212,7 +212,7 @@ Use the following CLI commands to convert existing certificate files to supporte
212212
| Convert a PKCS#12 file (.pfx .p12) containing a private key and certificates to .pem | `openssl pkcs12 -in keyStore.pfx -out keyStore.pem -nodes`. You can add -nocerts to only output the private key, or add -nokeys to only output the certificates. |
213213
| Convert .cer file to .crt file | `openssl x509 -inform PEM -in <filepath>/certificate.cer -out certificate.crt` <br> Make sure to specify the full path. <br><br> **Note**: Other options are available for the -inform flag. The value is usually `DER` or `PEM` but might also be `P12` or another value. For more information, see [`openssl-format-options`]( https://www.openssl.org/docs/manmaster/man1/openssl-format-options.html) and [openssl-x509]( https://www.openssl.org/docs/manmaster/man1/openssl-x509.html). |
214214

215-
Your file conversion may create an invalid certificate, such as with an inaccurate structure. If the conversion fails, make sure your required parameters <sup>[1](#1)</sup> are correct or consult your certificate specialist.
215+
Your file conversion may create an invalid certificate, such as with an inaccurate structure. If the conversion fails, make sure your [required parameters](#verify-certificate-file-parameter-requirements) are correct or consult your certificate specialist.
216216

217217
## Troubleshoot certificate upload errors
218218

@@ -229,7 +229,7 @@ You won't be able to upload certificates to your OT sensors or on-premises manag
229229

230230
## Next steps
231231

232-
For more information, see
232+
For more information, see:
233233

234234
- [Identify required appliances](how-to-identify-required-appliances.md)
235235
- [Manage individual sensors](how-to-manage-individual-sensors.md)

articles/defender-for-iot/organizations/how-to-forward-alert-information-to-partners.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -302,7 +302,7 @@ If your forwarding alert rules aren't working as expected, check the following d
302302

303303
- **Certificate validation**. Forwarding rules for [Syslog CEF](#syslog-server-actions), [Microsoft Sentinel](integrate-overview.md#microsoft-sentinel), and [QRadar](tutorial-qradar.md) support encryption and certificate validation.
304304

305-
If your OT sensors or on-premises management console are configured to [validate certificates](how-to-deploy-certificates.md.md#verify-crl-server-access) and the certificate can't be verified, the alerts aren't forwarded.
305+
If your OT sensors or on-premises management console are configured to [validate certificates](how-to-deploy-certificates.md#verify-crl-server-access) and the certificate can't be verified, the alerts aren't forwarded.
306306

307307
In these cases, the sensor or on-premises management console is the session's client and initiator. Certificates are typically received from the server or use asymmetric encryption, where a specific certificate is provided to set up the integration.
308308

0 commit comments

Comments
 (0)