You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/overview-firmware-analysis.md
+8-21Lines changed: 8 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,32 +12,19 @@ Just like computers have operating systems, IoT devices have firmware, and it's
12
12
13
13
For example, IoT attack vectors typically use easily exploitable--but easily correctable--weaknesses such as hardcoded user accounts, outdated and vulnerable open-source packages, or a manufacturer's private cryptographic signing key.
14
14
15
-
Use Microsoft Defender for IoT's firmware analysis to identify embedded security threats, vulnerabilities, and common weaknesses that may be otherwise undetectable.
15
+
Use firmware analysis to identify embedded security threats, vulnerabilities, and common weaknesses that may be otherwise undetectable.
16
+
17
+
For more information on firmware analysis for device builders, see the [firmware analysis documentation](/azure/firmware-analysis/overview-firmware-analysis).
16
18
17
19
> [!NOTE]
18
20
> The Defender for IoT **Firmware analysis** page is in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
19
21
>
20
22
21
-
## How to be sure your firmware is secure
22
-
23
-
Defender for IoT can analyze your firmware for common weaknesses and vulnerabilities, and provide insight into your firmware security. This analysis is useful whether you build the firmware in-house or receive firmware from your supply chain.
24
-
25
-
-**Software bill of materials (SBOM)**: Receive a detailed listing of open-source packages used during the firmware's build process. See the package version and what license governs the use of the open-source package.
26
-
27
-
-**CVE analysis**: See which firmware components have publicly known security vulnerabilities and exposures.
28
-
29
-
-**Binary hardening analysis**: Identify binaries that haven't enabled specific security flags during compilation like buffer overflow protection, position independent executables, and more common hardening techniques.
30
-
31
-
-**SSL certificate analysis**: Reveal expired and revoked TLS/SSL certificates.
32
-
33
-
-**Public and private key analysis**: Verify that the public and private cryptographic keys discovered in the firmware are necessary and not accidental.
34
-
35
-
-**Password hash extraction**: Ensure that user account password hashes use secure cryptographic algorithms.
23
+
## How to access firmware analysis
36
24
37
-
:::image type="content" source="media/tutorial-firmware-analysis/overview.png" alt-text="Screenshot that shows the overview page of the analysis results.":::
25
+
You can access firmwareanalysis data in one of two ways:
38
26
39
-
## Next steps
27
+
- In Defender for IoT, select **Firmware analysis**.
28
+
- In the Azure portal, select **Firmware analysis**.
40
29
41
-
-[Analyze a firmware image](tutorial-analyze-firmware.md)
42
-
-[Understand Role-Based Access Control for Firmware Images](defender-iot-firmware-analysis-rbac.md)
43
-
-[Frequently asked questions about Defender for IoT Firmware Analysis](defender-iot-firmware-analysis-FAQ.md)
30
+
For more information on firmware analysis for device builders, see the [firmware analysis documentation](/azure/firmware-analysis/overview-firmware-analysis).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/release-notes.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,12 @@ Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://az
15
15
16
16
For more information, see [Upgrade the Microsoft Defender for IoT micro agent](upgrade-micro-agent.md).
17
17
18
+
## November 2025
19
+
20
+
You can now access the **Firmware analysis** page both from Defender for IoT, and directly via the Azure portal.
21
+
22
+
The firmware analysis documentation is now located and maintained as part of the Azure portal documentation. See the full [firmware analysis documentation set](/azure/firmware-analysis/overview-firmware-analysis).
23
+
18
24
## August 2024
19
25
20
26
Defender for IoT plans to retire the micro agent on August 1, 2025.
0 commit comments