Skip to content

Commit 774c577

Browse files
Merge pull request #294214 from karengu0/update-name-case
Update name case
2 parents b34fff4 + fcfbfec commit 774c577

12 files changed

+73
-77
lines changed

articles/firmware-analysis/automate-firmware-analysis-service-principals.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,12 @@ ms.topic: conceptual
77
ms.date: 11/04/2024
88
ms.service: azure
99
---
10-
10+
1111
# How to Use Service Principals to Automate Workflows in firmware analysis
1212

1313
Many users of the firmware analysis service may need to automate their workflow. The command `az login` creates an interactive login experience with two-factor authentication that makes it difficult for users to fully automate their workflow. A [service principal](/entra/identity-platform/app-objects-and-service-principals) is a secure identity with proper permissions that authenticates to Azure in the command line without requiring two-factor authentication or an interactive log-in. This article explains how to create a service principal and use it to interact with the firmware analysis service. For more information on creating service principals, visit [Create Azure service principals using the Azure CLI](/cli/azure/azure-cli-sp-tutorial-1#create-a-service-principal). To authenticate securely, we recommend creating a service principal and authenticating using certificates. To learn more, visit [Create a service principal containing a certificate using Azure CLI](/cli/azure/azure-cli-sp-tutorial-3).
1414

15-
1. Log in to your Azure account using the Azure portal.
15+
1. Log in to your Azure account using the Azure portal.
1616

1717
2. Navigate to your subscription and assign yourself `User Access Administrator` or `Role Based Access Control Administrator` permissions, or higher, in your subscription. This gives you permission to create a service principal.
1818

@@ -49,7 +49,4 @@ Many users of the firmware analysis service may need to automate their workflow.
4949
- [Upload firmware using Azure PowerShell](quickstart-upload-firmware-using-powershell.md)
5050
- [Upload firmware using Python](quickstart-upload-firmware-using-python.md)
5151

52-
53-
#test
54-
test
55-
test
52+

articles/firmware-analysis/firmware-analysis-faq.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Frequently asked questions about Firmware analysis
3-
description: Find answers to some of the common questions about Firmware Analysis. This article includes the file systems that are supported by Firmware Analysis, and links to the Azure CLI and Azure PowerShell commands.
2+
title: Frequently asked questions about firmware analysis
3+
description: Find answers to some of the common questions about firmware analysis. This article includes the file systems that are supported by firmware analysis, and links to the Azure CLI and Azure PowerShell commands.
44
author: karengu0
55
ms.author: karenguo
66
ms.topic: conceptual
@@ -9,12 +9,12 @@ ms.date: 01/10/2024
99
ms.service: azure
1010
---
1111

12-
# Frequently asked questions about Firmware analysis
13-
This article addresses frequent questions about Firmware analysis.
12+
# Frequently asked questions about firmware analysis
13+
This article addresses frequent questions about firmware analysis.
1414

1515
[Firmware analysis](./overview-firmware-analysis.md) is a tool that analyzes firmware images and provides an understanding of security vulnerabilities in the firmware images.
1616

17-
## What types of firmware images does Firmware analysis support?
17+
## What types of firmware images does firmware analysis support?
1818
Firmware analysis supports unencrypted images that contain file systems with embedded Linux operating systems. Firmware analysis supports the following file system formats:
1919

2020
* Android sparse image
@@ -47,7 +47,8 @@ Firmware analysis supports unencrypted images that contain file systems with emb
4747
* ZStandard compressed data
4848
* Zip archive
4949

50-
## Where are the Firmware analysis Azure CLI/PowerShell docs?
50+
## Where are the firmware analysis Azure CLI/PowerShell docs?
5151
You can find the documentation for our Azure CLI commands [here](/cli/azure/firmwareanalysis/firmware) and the documentation for our Azure PowerShell commands [here](/powershell/module/az.firmwareanalysis/?#firmwareanalysis).
52-
52+
5353
You can also find the Quickstart for our Azure CLI [here](./quickstart-upload-firmware-using-azure-command-line-interface.md) and the Quickstart for our Azure PowerShell [here](./quickstart-upload-firmware-using-powershell.md). To run a Python script using the SDK to upload and analyze firmware images, visit [Quickstart: Upload firmware using Python](./quickstart-upload-firmware-using-python.md).
54+

articles/firmware-analysis/firmware-analysis-rbac.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,14 +27,14 @@ When you onboard your subscription to firmware analysis and select your resource
2727
Navigate to your resource group and select **Show hidden types** to show the **default** resource. The **default** resource has the **Microsoft.IoTFirmwareDefense.workspaces** type.
2828

2929
:::image type="content" source="media/firmware-analysis-rbac/default-workspace.png" alt-text="Screenshot of the toggle button 'Show hidden types' that reveals a resource named 'default'." lightbox="media/firmware-analysis-rbac/default-workspace.png":::
30-
30+
3131
Although the **default** workspace resource isn't something that you'll regularly interact with, each firmware image that you upload will be represented as a resource and stored here.
3232

3333
You can use RBAC at each level of the hierarchy, including at the hidden **default firmware analysis workspace** resource level.
3434

3535
Here's the resource hierarchy of firmware analysis:
3636

37-
:::image type="content" source="media/firmware-analysis-rbac/resource-hierarchy.png" alt-text="Diagram that shows the resource hierarchy of firmware images of Firmware Analysis." lightbox="media/firmware-analysis-rbac/resource-hierarchy.png":::
37+
:::image type="content" source="media/firmware-analysis-rbac/resource-hierarchy.png" alt-text="Diagram that shows the resource hierarchy of firmware images of firmware analysis." lightbox="media/firmware-analysis-rbac/resource-hierarchy.png":::
3838

3939
## Apply Azure RBAC
4040

@@ -82,5 +82,5 @@ To invite a third party, follow the [Assign Azure roles to external guest users
8282
* In step 7, select the **Firmware Analysis Admin** role.
8383

8484
> [!Note]
85-
> If you received an email to join an organization, be sure to check your Junk folder for the invitation email if you don't see it in your inbox.
86-
>
85+
> If you received an email to join an organization, be sure to check your Junk folder for the invitation email if you don't see it in your inbox.
86+
>

articles/firmware-analysis/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ landingContent:
3737
linkLists:
3838
- linkListType: how-to-guide
3939
links:
40-
- text: Automate your workflow using service principals
40+
- text: Automate your workflow using service principals
4141
url: automate-firmware-analysis-service-principals.md
4242
- text: Analyze firmware images using Azure CLI commands
4343
url: quickstart-upload-firmware-using-azure-command-line-interface.md

articles/firmware-analysis/interpreting-extractor-paths.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Interpreting extractor paths from SBOM view in Firmware analysis
3-
description: Learn how to interpret extractor paths from the SBOM view in Firmware analysis results.
2+
title: Interpreting extractor paths from SBOM view in firmware analysis
3+
description: Learn how to interpret extractor paths from the SBOM view in firmware analysis results.
44
author: karengu0
55
ms.author: karenguo
66
ms.topic: conceptual
77
ms.date: 11/04/2024
88
ms.service: azure
99
---
10-
10+
1111
# Overview of How Firmware Images are Structured
1212

1313
A firmware image is a collection of files and file systems containing software that operates hardware. Often, it includes compressed files, executables, and system files. These file systems may or may not include other file systems within each file. For example, a firmware image that’s a .zip file may include individual files such as executables within it but may also include other compressed file systems, such as a SquashFS file. You can visualize it like the following:
@@ -22,17 +22,17 @@ Because of the complex structure of firmware images – any given layer could be
2222

2323
**How the Extractor Works**
2424

25-
The Firmware Analysis extractor identifies and decompresses data found within firmware images. There are multiple types of extractors, one for each type of file. For a full list of file formats that Firmware Analysis supports, check [Firmware analysis Frequently Asked Questions](firmware-analysis-faq.md).
25+
The firmware analysis extractor identifies and decompresses data found within firmware images. There are multiple types of extractors, one for each type of file. For a full list of file formats that firmware analysis supports, check [Firmware analysis Frequently Asked Questions](firmware-analysis-faq.md).
2626

27-
For example, a `ZipArchive` extractor would extract a `ZipArchive` file. The extractor extracts the image as it sits on the disk in your system, and you will need to correlate the file path to the structure of files on your build environment. When you upload your firmware images to the Firmware Analysis service, the extractor recursively extracts the image until it cannot extract further. This means that the original firmware image is decompressed into individual files, and each individual file is sent again to the extractor to see if they can be further decompressed. This repeats until the extractor cannot decompress further.
27+
For example, a `ZipArchive` extractor would extract a `ZipArchive` file. The extractor extracts the image as it sits on the disk in your system, and you will need to correlate the file path to the structure of files on your build environment. When you upload your firmware images to the firmware analysis service, the extractor recursively extracts the image until it cannot extract further. This means that the original firmware image is decompressed into individual files, and each individual file is sent again to the extractor to see if they can be further decompressed. This repeats until the extractor cannot decompress further.
2828

2929
Sometimes, there may be numerous files concatenated into one. Extractor will identify that there are numerous files in that one file, and use the appropriate extractor to extract each file, then put each file into its own respective directory. This means that if there were four files that were compiled with `GZip`, and they were concatenated into one file, extractor will identify that there are four `GZip` files at that level of extraction. Extractor will put the first `GZip` file into a directory named `GZipExtractor/1`, the second into a directory named `GZipExtractor/2`, and so on.
3030

3131
## Interpret File Paths Created by the Extractor
3232

33-
In the Firmware Analysis service, the SBOM view of the analysis results contains the file paths:
33+
In the firmware analysis service, the SBOM view of the analysis results contains the file paths:
3434

35-
:::image type="content" source="media/extractor-paths/sbom-view.png" alt-text="Screenshot of SBOM view in the Firmware analysis results." lightbox="media/extractor-paths/sbom-view.png":::
35+
:::image type="content" source="media/extractor-paths/sbom-view.png" alt-text="Screenshot of SBOM view in the firmware analysis results." lightbox="media/extractor-paths/sbom-view.png":::
3636

3737
Here is an example of a file path that might be seen in analysis results, and how to visualize the path in a file-system structure:
3838

@@ -81,4 +81,3 @@ When you hover over the number, you’ll see a pop-up that looks like this:
8181
:::image type="content" source="media/extractor-paths/pop-up-multiple-paths.png" alt-text="Screenshot of an SBOM's multiple paths." lightbox="media/extractor-paths/pop-up-multiple-paths.png":::
8282

8383
This means that the SBOM can be found at these two executable paths.
84-

articles/firmware-analysis/overview-firmware-analysis.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ ms.service: azure
99
#Customer intent: As a device builder, I want to understand how firmware analysis can help secure my IoT/OT devices and products.
1010
---
1111

12-
# What is Firmware analysis (preview)?
12+
# What is firmware analysis (preview)?
1313

1414
Just like computers have operating systems, IoT devices have firmware, and it's the firmware that runs and controls IoT devices. For IoT device builders, security is a near-universal concern as IoT devices have traditionally lacked basic security measures.
1515

1616
For example, IoT attack vectors typically use easily exploitable--but easily correctable--weaknesses such as hardcoded user accounts, outdated and vulnerable open-source packages, or a manufacturer's private cryptographic signing key.
1717

18-
Use the Firmware analysis service to identify embedded security threats, vulnerabilities, and common weaknesses that may be otherwise undetectable.
18+
Use the firmware analysis service to identify embedded security threats, vulnerabilities, and common weaknesses that may be otherwise undetectable.
1919

2020
> [!NOTE]
2121
> The **Firmware analysis** page is in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -38,9 +38,9 @@ Firmware analysis can analyze your firmware for common weaknesses and vulnerabil
3838
- **Password hash extraction**: Ensure that user account password hashes use secure cryptographic algorithms.
3939

4040
:::image type="content" source="media/tutorial-firmware-analysis/overview.png" alt-text="Screenshot that shows the overview page of the analysis results.":::
41-
41+
4242
## Next steps
4343

4444
- [Analyze a firmware image](./tutorial-analyze-firmware.md)
4545
- [Understand Role-Based Access Control for Firmware Images](./firmware-analysis-rbac.md)
46-
- [Frequently asked questions about Firmware analysis](./firmware-analysis-faq.md)
46+
- [Frequently asked questions about firmware analysis](./firmware-analysis-faq.md)

articles/firmware-analysis/quickstart-upload-firmware-using-azure-command-line-interface.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Quickstart: Upload firmware images to Firmware analysis using Azure CLI"
2+
title: "Quickstart: Upload firmware images to firmware analysis using Azure CLI"
33
description: "Learn how to upload firmware images for analysis using the Azure command line interface."
44
author: karengu0
55
ms.author: karenguo
@@ -9,15 +9,15 @@ ms.date: 01/29/2024
99
ms.service: azure
1010
---
1111

12-
# Quickstart: Upload firmware images to Firmware Analysis using Azure CLI
13-
14-
This article explains how to use the Azure CLI to upload firmware images to Firmware analysis.
12+
# Quickstart: Upload firmware images to firmware analysis using Azure CLI
1513

14+
This article explains how to use the Azure CLI to upload firmware images to firmware analysis.
15+
1616
[Firmware analysis](./overview-firmware-analysis.md) is a tool that analyzes firmware images and provides an understanding of security vulnerabilities in the firmware images.
1717

1818
## Prerequisites
1919

20-
This quickstart assumes a basic understanding of Firmware analysis. For more information, see [Firmware analysis for device builders](./overview-firmware-analysis.md). For a list of the file systems that are supported, see [Frequently asked Questions about Firmware analysis](./firmware-analysis-faq.md#what-types-of-firmware-images-does-firmware-analysis-support).
20+
This quickstart assumes a basic understanding of firmware analysis. For more information, see [Firmware analysis for device builders](./overview-firmware-analysis.md). For a list of the file systems that are supported, see [Frequently asked Questions about firmware analysis](./firmware-analysis-faq.md#what-types-of-firmware-images-does-firmware-analysis-support).
2121

2222
### Prepare your environment for the Azure CLI
2323

@@ -26,14 +26,14 @@ This quickstart assumes a basic understanding of Firmware analysis. For more inf
2626
* Sign in to the Azure CLI by using the [az login](/cli/azure/reference-index?#az-login) command. Follow the steps displayed in your terminal to finish the authentication process. For other sign-in options, see [Sign in with the Azure CLI](/cli/azure/authenticate-azure-cli).
2727

2828
* When you're prompted, install the Azure CLI extension on first use. For more information about extensions, see [Use extensions with the Azure CLI](/cli/azure/azure-cli-extensions-overview).
29-
* Install the Firmware analysis extension by running the following command:
29+
* Install the firmware analysis extension by running the following command:
3030
```azurecli
3131
az extension add --name firmwareanalysis
3232
```
3333

3434
* To find the version and dependent libraries that are installed, run the command [az version](/cli/azure/reference-index?#az-version). To upgrade to the latest version, run the command [az upgrade](/cli/azure/reference-index?#az-upgrade).
3535

36-
* [Onboard](./tutorial-analyze-firmware.md#onboard-your-subscription-to-use-firmware-analysis) your subscription to Firmware analysis.
36+
* [Onboard](./tutorial-analyze-firmware.md#onboard-your-subscription-to-use-firmware-analysis) your subscription to firmware analysis.
3737

3838
* Select the appropriate subscription ID where you'd like to upload your firmware images by running the command [az account set](/cli/azure/account?#az-account-set).
3939

@@ -110,7 +110,7 @@ for /f "tokens=*" %i in ('az resource wait --ids %ID% --custom "properties.statu
110110
111111
for /f "tokens=*" %i in ('az resource show --ids %ID% --query "properties.status"') do set STATUS=%i
112112
113-
echo Firmware analysis completed with status: %STATUS%
113+
echo firmware analysis completed with status: %STATUS%
114114
```
115115

116116
Once you've confirmed that your analysis status is "Ready", you can run commands to pull the results.

articles/firmware-analysis/quickstart-upload-firmware-using-powershell.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Quickstart: Upload firmware images to Firmware analysis using Azure PowerShell"
2+
title: "Quickstart: Upload firmware images to firmware analysis using Azure PowerShell"
33
description: "Learn how to upload firmware images for analysis using the Azure PowerShell."
44
author: karengu0
55
ms.author: karenguo
@@ -9,29 +9,29 @@ ms.date: 01/29/2024
99
ms.service: azure
1010
---
1111

12-
# Quickstart: Upload firmware images to Firmware analysis using Azure PowerShell
13-
14-
This article explains how to use Azure PowerShell to upload firmware images to Firmware analysis.
12+
# Quickstart: Upload firmware images to firmware analysis using Azure PowerShell
1513

14+
This article explains how to use Azure PowerShell to upload firmware images to firmware analysis.
15+
1616
[Firmware analysis](./overview-firmware-analysis.md) is a tool that analyzes firmware images and provides an understanding of security vulnerabilities in the firmware images.
1717

1818
## Prerequisites
1919

20-
This quickstart assumes a basic understanding of Firmware analysis. For more information, see [Firmware analysis for device builders](./overview-firmware-analysis.md). For a list of the file systems that are supported, see [Frequently asked Questions about Firmware analysis](./firmware-analysis-faq.md#what-types-of-firmware-images-does-firmware-analysis-support).
20+
This quickstart assumes a basic understanding of firmware analysis. For more information, see [Firmware analysis for device builders](./overview-firmware-analysis.md). For a list of the file systems that are supported, see [Frequently asked Questions about firmware analysis](./firmware-analysis-faq.md#what-types-of-firmware-images-does-firmware-analysis-support).
2121

2222
### Prepare your environment for Azure PowerShell
2323

2424
1. [Install Azure PowerShell](/powershell/azure/install-azure-powershell) or [Use Azure Cloud Shell](/azure/cloud-shell/get-started/classic).
2525

2626
2. Sign in to Azure PowerShell by running the command [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount). Skip this step if you're using Cloud Shell.
2727

28-
3. If this is your first use of Firmware analysis's Azure PowerShell, install the extension:
28+
3. If this is your first use of firmware analysis's Azure PowerShell, install the extension:
2929

3030
```powershell
3131
Find-Module -Name Az.FirmwareAnalysis | Install-Module
3232
```
3333
34-
4. [Onboard](tutorial-analyze-firmware.md#onboard-your-subscription-to-use-firmware-analysis) your subscription to Firmware analysis.
34+
4. [Onboard](tutorial-analyze-firmware.md#onboard-your-subscription-to-use-firmware-analysis) your subscription to firmware analysis.
3535
3636
5. Run [Set-AzContext](/powershell/module/az.accounts/set-azcontext) to set your subscription to use in the current session. Select the subscription where you would like to upload your firmware images.
3737

0 commit comments

Comments
 (0)