Skip to content

Commit 877d085

Browse files
committed
edits
1 parent 79fa95c commit 877d085

File tree

3 files changed

+7
-5
lines changed

3 files changed

+7
-5
lines changed

articles/trusted-signing/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@
2222
href: how-to-cert-revocation.md
2323
- name: Renew Trusted Signing identity validation
2424
href: how-to-renew-identity-validation.md
25-
- name: Change Pricing Tier
25+
- name: Change the account SKU (pricing tier)
2626
href: how-to-change-sku.md
2727
- name: Device Guard Signing Service Migration
2828
href: how-to-device-guard-signing-service-migration.md

articles/trusted-signing/faq.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,10 +77,12 @@ sections:
7777
FIPS 140-2 Level 3 (mHSMs).
7878
- question: How do I include the appropriate EKU for our certificates in the ELAM driver resources?
7979
answer: |
80-
For information about the Early Launch Antimalware (ELAM) driver configuration for protecting anti-malware user-mode services, see the following guidance: "Beginning in 2022, all user mode anti-malware service binaries must be signed by Microsoft's Trusted Signing signing service. The Trusted Signing issued Authenticode certificate for signing anti-malware binaries is updated every 30 days for security. To prevent the need to update the ELAM driver every time the certificate is updated, we recommend that anti-malware vendors include the Trusted Signing PCA certificate TBS hash in the CertHash portion of the ELAM driver resource file info. Additionally, the anti-malware vendor must include their unique Trusted Signing EKU identity in the EKU field of the resource file info. The EKU identity will begin with the prefix `1.3.6.1.4.1.311.97.*`."
80+
For information about the Early Launch Antimalware (ELAM) driver configuration for protecting antimalware user-mode services, see the following guidance:
81+
82+
"Beginning in 2022, all user mode anti-malware service binaries must be signed by Microsoft's Trusted Signing signing service. The Trusted Signing issued Authenticode certificate for signing anti-malware binaries is updated every 30 days for security. To prevent the need to update the ELAM driver every time the certificate is updated, we recommend that anti-malware vendors include the Trusted Signing PCA certificate TBS hash in the CertHash portion of the ELAM driver resource file info. Additionally, the anti-malware vendor must include their unique Trusted Signing EKU identity in the EKU field of the resource file info. The EKU identity will begin with the prefix `1.3.6.1.4.1.311.97.*`."
8183
8284
For the Microsoft ID Verified Code Signing PCA 2021 certificate, see the [Microsoft PKI Services repository](https://www.microsoft.com/pkiops/docs/repository.htm).
83-
- question: What happens if we run binaries that are signed by using Trusted Signing on a computer that doesn't have the Trusted Signing update (especially binaries that are flagged for /INTEGRITYCHECK?
85+
- question: What happens if we run binaries that are signed by using Trusted Signing on a computer that doesn't have the Trusted Signing update (especially binaries that are flagged for /INTEGRITYCHECK)?
8486
answer: |
8587
- If an /INTEGRITYCHECK flag is set, the user's signature isn't validated at runtime and it isn't run with /INTEGRITYCHECK.
8688
- To check whether the Trusted Signing update is installed, we recommend that you check against one of your packaged /INTEGRITYCHECK-linked DLLs. You can use a test version. This way, you can complete your check and determine the availability of our /INTEGRITYCHECK-linked binaries outside the platform.

articles/trusted-signing/how-to-change-sku.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,13 @@ The following table describes key account details for the Basic SKU and the Prem
2929
| Private Trust signing | Yes | Yes |
3030

3131
> [!NOTE]
32-
> The pricing tier is also called the account *SKU*.
32+
> The pricing tier is also called the *account SKU*.
3333
3434
## Change the SKU
3535

3636
You can change the SKU for a Trusted Signing account at any time by upgrading to Premium or by downgrading to Basic. You can change the SKU by using either the Azure portal or the Azure CLI.
3737

38-
Things to keep in mind:
38+
Considerations:
3939

4040
- SKU updates are effective beginning in the next billing cycle.
4141
- SKU limitations for an updated SKU are enforced after the update is successful.

0 commit comments

Comments
 (0)