Skip to content

Commit bd82d5e

Browse files
committed
Adding changes and what's new
1 parent 457a51c commit bd82d5e

File tree

5 files changed

+25
-25
lines changed

5 files changed

+25
-25
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3769,6 +3769,11 @@
37693769
"source_path_from_root": "/articles/defender-for-iot/device-builders/defender-iot-firmware-analysis-faq.md",
37703770
"redirect_url": "/azure/firmware-analysis/overview-firmware-analysis",
37713771
"redirect_document_id": false
3772+
},
3773+
{
3774+
"source_path_from_root": "/articles/defender-for-iot/device-builders/defender-iot-firmware-analysis-rbac.md",
3775+
"redirect_url": "/azure/firmware-analysis/overview-firmware-analysis",
3776+
"redirect_document_id": false
37723777
}
37733778
]
37743779
}

articles/defender-for-iot/device-builders/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@
1616
href: quickstart-onboard-iot-hub.md
1717
- name: Upload Firmware using Azure CLI
1818
displayName: Azure CLI, upload, firmware
19-
href: quickstart-upload-firmware-using-azure-command-line-interface.md
19+
href: /azure/firmware-analysis/quickstart-upload-firmware-using-azure-command-line-interface
2020
- name: Upload Firmware using Azure PowerShell
2121
displayName: Azure PowerShell, upload, firmware
22-
href: quickstart-upload-firmware-using-powershell.md
22+
href: /azure/firmware-analysis/quickstart-upload-firmware-using-powershell
2323
expanded: true
2424
- name: Tutorials
2525
items:
@@ -36,7 +36,7 @@
3636
- name: Investigate security alerts
3737
href: tutorial-investigate-security-alerts.md
3838
- name: Analyze an IoT/OT firmware image
39-
href: tutorial-analyze-firmware.md
39+
href: /azure/firmware-analysis/tutorial-analyze-firmware
4040
- name: Concepts
4141
items:
4242
- name: Agent portfolio overview and OS support
@@ -72,7 +72,7 @@
7272
href: overview-firmware-analysis.md
7373
- name: Azure role-based access control for Defender for IoT Firmware analysis
7474
displayName: RBAC, role, access, control, firmware, analysis
75-
href: defender-iot-firmware-analysis-rbac.md
75+
href: /azure/firmware-analysis/firmware-analysis-rbac
7676
- name: How-to guides
7777
items:
7878
- name: Install Defender for IoT micro agent for Edge

articles/defender-for-iot/device-builders/defender-iot-firmware-analysis-rbac.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
---
22
title: Azure role-based access control for Defender for IoT Firmware analysis
33
description: Learn about how to use Azure Role-Based Access Control for Defender for IoT Firmware Analysis.
4+
ms.author: lwainstein
5+
author: limwainstein
46
ms.topic: conceptual
57
ms.date: 01/10/2024
68
---

articles/defender-for-iot/device-builders/overview-firmware-analysis.md

Lines changed: 8 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -12,32 +12,19 @@ Just like computers have operating systems, IoT devices have firmware, and it's
1212

1313
For example, IoT attack vectors typically use easily exploitable--but easily correctable--weaknesses such as hardcoded user accounts, outdated and vulnerable open-source packages, or a manufacturer's private cryptographic signing key.
1414

15-
Use Microsoft Defender for IoT's firmware analysis to identify embedded security threats, vulnerabilities, and common weaknesses that may be otherwise undetectable.
15+
Use firmware analysis to identify embedded security threats, vulnerabilities, and common weaknesses that may be otherwise undetectable.
16+
17+
For more information on firmware analysis for device builders, see the [firmware analysis documentation](/azure/firmware-analysis/overview-firmware-analysis).
1618

1719
> [!NOTE]
1820
> The Defender for IoT **Firmware analysis** page is in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1921
>
2022
21-
## How to be sure your firmware is secure
22-
23-
Defender for IoT can analyze your firmware for common weaknesses and vulnerabilities, and provide insight into your firmware security. This analysis is useful whether you build the firmware in-house or receive firmware from your supply chain.
24-
25-
- **Software bill of materials (SBOM)**: Receive a detailed listing of open-source packages used during the firmware's build process. See the package version and what license governs the use of the open-source package.
26-
27-
- **CVE analysis**: See which firmware components have publicly known security vulnerabilities and exposures.
28-
29-
- **Binary hardening analysis**: Identify binaries that haven't enabled specific security flags during compilation like buffer overflow protection, position independent executables, and more common hardening techniques.
30-
31-
- **SSL certificate analysis**: Reveal expired and revoked TLS/SSL certificates.
32-
33-
- **Public and private key analysis**: Verify that the public and private cryptographic keys discovered in the firmware are necessary and not accidental.
34-
35-
- **Password hash extraction**: Ensure that user account password hashes use secure cryptographic algorithms.
23+
## How to access firmware analysis
3624

37-
:::image type="content" source="media/tutorial-firmware-analysis/overview.png" alt-text="Screenshot that shows the overview page of the analysis results.":::
25+
You can access firmware analysis data in one of two ways:
3826

39-
## Next steps
27+
- In Defender for IoT, select **Firmware analysis**.
28+
- In the Azure portal, select **Firmware analysis**.
4029

41-
- [Analyze a firmware image](tutorial-analyze-firmware.md)
42-
- [Understand Role-Based Access Control for Firmware Images](defender-iot-firmware-analysis-rbac.md)
43-
- [Frequently asked questions about Defender for IoT Firmware Analysis](defender-iot-firmware-analysis-FAQ.md)
30+
For more information on firmware analysis for device builders, see the [firmware analysis documentation](/azure/firmware-analysis/overview-firmware-analysis).

articles/defender-for-iot/device-builders/release-notes.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,12 @@ Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://az
1515

1616
For more information, see [Upgrade the Microsoft Defender for IoT micro agent](upgrade-micro-agent.md).
1717

18+
## November 2025
19+
20+
You can now access the **Firmware analysis** page both from Defender for IoT, and directly via the Azure portal.
21+
22+
The firmware analysis documentation is now located and maintained as part of the Azure portal documentation. See the full [firmware analysis documentation set](/azure/firmware-analysis/overview-firmware-analysis).
23+
1824
## August 2024
1925

2026
Defender for IoT plans to retire the micro agent on August 1, 2025.

0 commit comments

Comments
 (0)