You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
24
+
-[Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
25
25
26
26
> [!NOTE]
27
27
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
28
28
29
-
Certificates can be used in multiple ways, this includes:
29
+
Certificates can be used in multiple ways. For example:
30
30
31
-
-being part of the TLS\SSL protocol
32
-
-user certificates being used for VPN client authentication, document signing, email encryption and email signing
33
-
-providing data encryption and authentication to ensure the secure transfer of information within your network and over the internet
-Data encryption and authentication to ensure the secure transfer of information within your network and over the internet.
34
34
35
-
If there is an issue with a certificate, for example, it has expired or is misconfigured, it could leave your organization vulnerable, cause an outage, and have an impact on day-to-day business operations.
35
+
Issues with a certificate (for example, expiration or misconfiguration) could lead to the following results:
36
36
37
-
The **Certificate inventory** lets you view a list of the certificates installed across your organization in a single central certificate inventory page. This can help you:
37
+
- A security vulnerability for your organization.
38
+
- A service outage.
39
+
- Negative results on day-to-day business operations.
40
+
41
+
The **Certificate inventory** lets you view a list of the certificates installed across your organization in a single central certificate inventory page. This feature can help you with the following tasks:
38
42
39
43
- Identify certificates that are about to expire so you can update them and prevent service disruption
40
-
- Detect potential vulnerabilities due to the use of weak signature algorithm (e.g. SHA-1-RSA), short key size (e.g. RSA 512bit), or weak signature hash algorithm (e.g. MD5)
44
+
- Detect potential vulnerabilities due to the use of weak signature algorithm (for example, SHA-1-RSA), short key size (for example, RSA 512 bit), or weak signature hash algorithm (for example, MD5)
41
45
- Ensure compliance with regulatory guidelines and organizational policy
42
46
43
47
> [!TIP]
@@ -57,13 +61,13 @@ The **Certificate inventory** page opens with a list of the certificates install
57
61
58
62
## Gain insights into potentially vulnerable certificates
59
63
60
-
At the top of the page, you can view the number of certificates that have been identified as potentially less secure and introduce risk into your organization. This includes the number of certificates that:
64
+
At the top of the page, you can view the number of certificates that have been identified as potentially less secure and introduce risk into your organization. This number includes certificates with the following issues:
61
65
62
-
-have already expired
63
-
-will expire in 60 days or less
64
-
-have a key size with fewer than 2048 bits, as they are considered less secure
65
-
-have a weak signature algorithm, like SHA-1 and MD5
66
-
-are considered vulnerable since they are self-signed
66
+
-Expired.
67
+
-Will expire in 60 days or less.
68
+
-Have a key size with fewer than 2,048 bits, as they're considered less secure.
69
+
-Have a weak signature algorithm, like SHA-1 and MD5.
70
+
-Are considered vulnerable since they're self-signed.
67
71
68
72
## Use filters on the certificate inventory page
69
73
@@ -77,7 +81,7 @@ You can use filters to view the inventory based on:
77
81
78
82
## Get more information on a discovered certificate
79
83
80
-
When you select the certificate that you want to investigate, a flyout panel will open with the certificate details page:
84
+
When you select the certificate that you want to investigate, a flyout panel opens with the certificate details page:
81
85
82
86
:::image type="content" source="/defender/media/defender-vulnerability-management/certificate_details.png" alt-text="Screenshot of the certificate details page" lightbox="/defender/media/defender-vulnerability-management/certificate_details.png":::
0 commit comments