Skip to content

Commit bba3ed1

Browse files
authored
Merge pull request #290301 from karengu0/velma-docs-nov
Add 'Preview' label
2 parents 55286ac + b3d9555 commit bba3ed1

File tree

8 files changed

+71
-10
lines changed

8 files changed

+71
-10
lines changed

articles/defender-for-iot/device-builders/tutorial-analyze-firmware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To use the **Firmware analysis** page to analyze your firmware security, your fi
3030

3131
- Your image must be an unencrypted, Linux-based firmware image.
3232

33-
- Your image must be less than 5 GB in size.
33+
- Your image must be less than 1 GB in size.
3434

3535
## Onboard your subscription to use Defender for Firmware Analysis
3636
> [!NOTE]

articles/firmware-analysis/automate-firmware-analysis-service-principals.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,15 @@ ms.date: 11/04/2024
99

1010
# How to Use Service Principals to Automate Workflows in Firmware analysis
1111

12-
Many users of the firmware analysis service may need to automate their workflow. The command `az login` creates an interactive login experience with two-factor authentication that makes it difficult for users to fully automate their workflow. A service principal [Apps & service principals in Microsoft Entra ID](/entra/identity-platform/app-objects-and-service-principals) is a secure identity with proper permissions that authenticates to Azure in the command line without requiring two-factor authentication or an interactive log-in. This article explains how to create a service principal and use it to interact with the firmware analysis service. For more information on creating service principals, visit [Create Azure service principals using the Azure CLI](/cli/azure/azure-cli-sp-tutorial-1#create-a-service-principal). To authenticate securely, we recommend creating a service principal and authenticating using certificates. To learn more, visit [Create a service principal containing a certificate using Azure CLI](/cli/azure/azure-cli-sp-tutorial-3).
12+
Many users of the firmware analysis service may need to automate their workflow. The command `az login` creates an interactive login experience with two-factor authentication that makes it difficult for users to fully automate their workflow. A [service principal](/entra/identity-platform/app-objects-and-service-principals) is a secure identity with proper permissions that authenticates to Azure in the command line without requiring two-factor authentication or an interactive log-in. This article explains how to create a service principal and use it to interact with the firmware analysis service. For more information on creating service principals, visit [Create Azure service principals using the Azure CLI](/cli/azure/azure-cli-sp-tutorial-1#create-a-service-principal). To authenticate securely, we recommend creating a service principal and authenticating using certificates. To learn more, visit [Create a service principal containing a certificate using Azure CLI](/cli/azure/azure-cli-sp-tutorial-3).
1313

14-
1. Log in to your Azure account using the portal.
14+
1. Log in to your Azure account using the Azure portal.
1515

1616
2. Navigate to your subscription and assign yourself `User Access Administrator` or `Role Based Access Control Administrator` permissions, or higher, in your subscription. This gives you permission to create a service principal.
1717

1818
3. Navigate to your command line
1919

20-
1. Log in, specifying the tenant ID during login
20+
1. Log in, specifying your tenant ID during login
2121

2222
```azurecli
2323
az login --tenant <TENANT_ID>
@@ -40,7 +40,7 @@ Many users of the firmware analysis service may need to automate their workflow.
4040
5. Log in to your service principal
4141

4242
```azurecli
43-
az login --service-principal --username $clientID --password $secret --tenant $tenantID
43+
az login --service-principal --username <CLIENT_ID> --password <SECRET> --tenant <TENANT_ID>
4444
```
4545

4646
6. Once logged in, refer to the following Quickstarts for scripts to interact with the Firmware analysis service via Azure PowerShell, Azure CLI, or Python:

articles/firmware-analysis/firmware-analysis-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ In Firmware analysis, the most common roles are Owner, Contributor, Security Adm
2222
Azure organizes resources into resource hierarchies, which are in a top-down structure, and you can assign roles at each level of the hierarchy. The level at which you assign a role is the "scope," and lower scopes may inherit roles assigned at higher scopes. Learn more about the [levels of hierarchy and how to organize your resources in the hierarchy](/azure/cloud-adoption-framework/ready/azure-setup-guide/organize-resources).
2323

2424
When you onboard your subscription to Firmware analysis and select your resource group, the action automatically creates the **default** resource within your resource group.
25-
25+
2626
Navigate to your resource group and select **Show hidden types** to show the **default** resource. The **default** resource has the **Microsoft.IoTFirmwareDefense.workspaces** type.
2727

2828
:::image type="content" source="media/firmware-analysis-rbac/default-workspace.png" alt-text="Screenshot of the toggle button 'Show hidden types' that reveals a resource named 'default'." lightbox="media/firmware-analysis-rbac/default-workspace.png":::

articles/firmware-analysis/index.yml

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
### YamlMime:Landing
2+
3+
title: Firmware analysis (preview)
4+
summary: Analyze your firmware images for security vulnerabilities
5+
6+
metadata:
7+
title: Firmware analysis (preview)
8+
description: Analyze your firmware images for security vulnerabilities
9+
ms.topic: landing-page
10+
author: karengu0
11+
ms.author: karenguo
12+
ms.date: 11/11/2024
13+
14+
15+
landingContent:
16+
- title: Get started
17+
linkLists:
18+
- linkListType: get-started
19+
links:
20+
- text: What is Firmware analysis (preview)?
21+
url: overview-firmware-analysis.md
22+
- text: Get started with Firmware analysis in the Azure portal
23+
url: tutorial-analyze-firmware.md
24+
- text: What file systems are supported by Firmware analysis?
25+
url: firmware-analysis-faq.md#what-types-of-firmware-images-does-firmware-analysis-support
26+
- linkListType: concept
27+
links:
28+
- text: What roles and permissions are needed to use Firmware analysis?
29+
url: firmware-analysis-rbac.md
30+
- linkListType: whats-new
31+
links:
32+
- text: What's new in Firmware analysis (preview)?
33+
url: release-notes.md
34+
35+
- title: Automate your workflow
36+
linkLists:
37+
- linkListType: how-to-guide
38+
links:
39+
- text: Automate your workflow using service principals
40+
url: automate-firmware-analysis-service-principals.md
41+
- text: Analyze firmware images using Azure CLI commands
42+
url: quickstart-upload-firmware-using-azure-command-line-interface.md
43+
- text: Analyze firmware images using Azure PowerShell commands
44+
url: quickstart-upload-firmware-using-powershell.md
45+
- text: Analyze firmware images using a Python script
46+
url: quickstart-upload-firmware-using-python.md
47+
48+
- title: Understand the Firmware analysis service
49+
linkLists:
50+
- linkListType: concept
51+
links:
52+
- text: Understand the resource hierarchy of Firmware analysis
53+
url: firmware-analysis-rbac.md#understanding-the-representation-of-firmware-images-in-the-azure-resource-hierarchy
54+
- text: Understand and interpret the extractor path results
55+
url: interpreting-extractor-paths.md
56+

articles/firmware-analysis/overview-firmware-analysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: karenguo
88
#Customer intent: As a device builder, I want to understand how firmware analysis can help secure my IoT/OT devices and products.
99
---
1010

11-
# Firmware analysis
11+
# What is Firmware analysis (preview)?
1212

1313
Just like computers have operating systems, IoT devices have firmware, and it's the firmware that runs and controls IoT devices. For IoT device builders, security is a near-universal concern as IoT devices have traditionally lacked basic security measures.
1414

articles/firmware-analysis/toc.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,15 @@
1+
- name: Firmware analysis (preview)
2+
href: index.yml
3+
14
- name: "Overview"
25
items:
3-
- name: Overview of Firmware analysis
6+
- name: Overview of Firmware analysis (preview)
47
href: overview-firmware-analysis.md
58
- name: Firmware analysis frequently asked questions
69
href: firmware-analysis-faq.md
710
- name: What's new?
811
href: release-notes.md
12+
expanded: true
913
- name: Quickstarts
1014
items:
1115
- name: Quickstart to use Firmware analysis with Azure CLI
@@ -14,6 +18,7 @@
1418
href: quickstart-upload-firmware-using-powershell.md
1519
- name: Quickstart to use Firmware analysis with a Python script
1620
href: quickstart-upload-firmware-using-python.md
21+
expanded: true
1722
- name: Tutorial using Firmware analysis with the Azure portal
1823
href: tutorial-analyze-firmware.md
1924
- name: Concepts

articles/firmware-analysis/tutorial-analyze-firmware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ To use the **Firmware analysis** page to analyze your firmware security, your fi
3232

3333
- Your image must be an unencrypted, Linux-based firmware image.
3434

35-
- Your image must be less than 5 GB in size.
35+
- Your image must be less than 1 GB in size.
3636

3737
## Onboard your subscription to use Firmware analysis
3838
> [!NOTE]

articles/iot/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ conceptualContent:
9797
text: Update your devices
9898
- url: ../firmware-analysis/overview-firmware-analysis.md
9999
itemType: overview
100-
text: Device firmware analysis
100+
text: Device firmware analysis (preview)
101101
# Card
102102
- title: Process and route messages
103103
links:

0 commit comments

Comments
 (0)