Skip to content

Commit f0f661d

Browse files
committed
Update tvm-certificate-inventory.md
Acrolinx
1 parent 3d5d03f commit f0f661d

File tree

1 file changed

+20
-16
lines changed

1 file changed

+20
-16
lines changed

defender-vulnerability-management/tvm-certificate-inventory.md

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Certificate inventory
3-
description: Find out about the certificates installed in your environment
3+
description: Find out about the certificates installed in your environment.
44
ms.service: defender-vuln-mgmt
55
ms.author: siosulli
66
author: siosulli
@@ -21,23 +21,27 @@ ms.date: 04/11/2022
2121

2222
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)
2323
- [Microsoft Defender XDR](/defender-xdr)
24-
- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
24+
- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
2525

2626
> [!NOTE]
2727
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
2828
29-
Certificates can be used in multiple ways, this includes:
29+
Certificates can be used in multiple ways. For example:
3030

31-
- being part of the TLS\SSL protocol
32-
- user certificates being used for VPN client authentication, document signing, email encryption and email signing
33-
- providing data encryption and authentication to ensure the secure transfer of information within your network and over the internet
31+
- As part of the TLS\SSL protocol.
32+
- VPN client authentication, document signing, email encryption and email signing.
33+
- Data encryption and authentication to ensure the secure transfer of information within your network and over the internet.
3434

35-
If there is an issue with a certificate, for example, it has expired or is misconfigured, it could leave your organization vulnerable, cause an outage, and have an impact on day-to-day business operations.
35+
Issues with a certificate (for example, expiration or misconfiguration) could lead to the following results:
3636

37-
The **Certificate inventory** lets you view a list of the certificates installed across your organization in a single central certificate inventory page. This can help you:
37+
- A security vulnerability for your organization.
38+
- A service outage.
39+
- Negative results on day-to-day business operations.
40+
41+
The **Certificate inventory** lets you view a list of the certificates installed across your organization in a single central certificate inventory page. This feature can help you with the following tasks:
3842

3943
- Identify certificates that are about to expire so you can update them and prevent service disruption
40-
- Detect potential vulnerabilities due to the use of weak signature algorithm (e.g. SHA-1-RSA), short key size (e.g. RSA 512bit), or weak signature hash algorithm (e.g. MD5)
44+
- Detect potential vulnerabilities due to the use of weak signature algorithm (for example, SHA-1-RSA), short key size (for example, RSA 512 bit), or weak signature hash algorithm (for example, MD5)
4145
- Ensure compliance with regulatory guidelines and organizational policy
4246

4347
> [!TIP]
@@ -57,13 +61,13 @@ The **Certificate inventory** page opens with a list of the certificates install
5761

5862
## Gain insights into potentially vulnerable certificates
5963

60-
At the top of the page, you can view the number of certificates that have been identified as potentially less secure and introduce risk into your organization. This includes the number of certificates that:
64+
At the top of the page, you can view the number of certificates that have been identified as potentially less secure and introduce risk into your organization. This number includes certificates with the following issues:
6165

62-
- have already expired
63-
- will expire in 60 days or less
64-
- have a key size with fewer than 2048 bits, as they are considered less secure
65-
- have a weak signature algorithm, like SHA-1 and MD5
66-
- are considered vulnerable since they are self-signed
66+
- Expired.
67+
- Will expire in 60 days or less.
68+
- Have a key size with fewer than 2,048 bits, as they're considered less secure.
69+
- Have a weak signature algorithm, like SHA-1 and MD5.
70+
- Are considered vulnerable since they're self-signed.
6771

6872
## Use filters on the certificate inventory page
6973

@@ -77,7 +81,7 @@ You can use filters to view the inventory based on:
7781

7882
## Get more information on a discovered certificate
7983

80-
When you select the certificate that you want to investigate, a flyout panel will open with the certificate details page:
84+
When you select the certificate that you want to investigate, a flyout panel opens with the certificate details page:
8185

8286
:::image type="content" source="/defender/media/defender-vulnerability-management/certificate_details.png" alt-text="Screenshot of the certificate details page" lightbox="/defender/media/defender-vulnerability-management/certificate_details.png":::
8387

0 commit comments

Comments
 (0)