Skip to content

Commit bd58edd

Browse files
Merge pull request #310413 from karengu0/postgadocs
update quickstarts
2 parents ff53fcc + bac026c commit bd58edd

3 files changed

Lines changed: 15 additions & 11 deletions

File tree

articles/firmware-analysis/quickstart-upload-firmware-using-azure-command-line-interface.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ Once you've confirmed that your analysis status is "Ready", you can run commands
128128
The following command retrieves a general summary of your firmware analysis results. Replace each argument with the appropriate value for your resource group, workspace name, and firmware ID.
129129

130130
```azurecli
131-
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --summary-type Firmware
131+
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --name Firmware
132132
```
133133

134134
### SBOM
@@ -150,7 +150,7 @@ az firmwareanalysis firmware cve --resource-group myResourceGroup --subscription
150150
For a summary of your CVEs, run the following command:
151151

152152
```azurecli
153-
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --summary-type CommonVulnerabilitiesAndExposures
153+
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --name CVE
154154
```
155155

156156
### Binary hardening
@@ -164,7 +164,7 @@ az firmwareanalysis firmware binary-hardening --resource-group myResourceGroup -
164164
For a summary of your binary hardening results, run the following command:
165165

166166
```azurecli
167-
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --summary-type BinaryHardening
167+
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --name BinaryHardening
168168
```
169169

170170
### Password hashes
@@ -186,7 +186,7 @@ az firmwareanalysis firmware crypto-certificate --resource-group myResourceGroup
186186
For a summary of your certificates, run the following command:
187187

188188
```azurecli
189-
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --summary-type CryptoCertificate
189+
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --name CryptoCertificate
190190
```
191191

192192
### Keys
@@ -200,5 +200,5 @@ az firmwareanalysis firmware crypto-key --resource-group myResourceGroup --subsc
200200
For a summary of your keys, run the following command:
201201

202202
```azurecli
203-
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --summary-type CryptoKey
203+
az firmwareanalysis firmware summary --resource-group myResourceGroup --workspace-name default --firmware-id 123e4567-e89b-12d3-a456-426614174000 --name CryptoKey
204204
```

articles/firmware-analysis/quickstart-upload-firmware-using-powershell.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ while ($true) {
133133
The following command retrieves a general summary of your firmware analysis results. Replace each argument with the appropriate value for your resource group, subscription, workspace name, and firmware ID.
134134

135135
```powershell
136-
Get-AzFirmwareAnalysisSumary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type Firmware
136+
Get-AzFirmwareAnalysisSummary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type Firmware
137137
```
138138

139139
### SBOM
@@ -155,7 +155,7 @@ Get-AzFirmwareAnalysisCve -FirmwareId sampleFirmwareID -ResourceGroupName myReso
155155
For a summary of your CVEs, run the following command:
156156

157157
```powershell
158-
Get-AzFirmwareAnalysisSumary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type CVE
158+
Get-AzFirmwareAnalysisSummary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type CVE
159159
```
160160

161161
### Binary hardening
@@ -169,7 +169,7 @@ Get-AzFirmwareAnalysisBinaryHardening -FirmwareId sampleFirmwareID -ResourceGrou
169169
For a summary of your binary hardening results, run the following command:
170170

171171
```powershell
172-
Get-AzFirmwareAnalysisSumary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type BinaryHardening
172+
Get-AzFirmwareAnalysisSummary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type BinaryHardening
173173
```
174174

175175
### Password hashes
@@ -191,7 +191,7 @@ Get-AzFirmwareAnalysisCryptoCertificate -FirmwareId sampleFirmwareID -ResourceGr
191191
For a summary of your certificates, run the following command:
192192

193193
```powershell
194-
Get-AzFirmwareAnalysisSumary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type CryptoCertificate
194+
Get-AzFirmwareAnalysisSummary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type CryptoCertificate
195195
```
196196

197197
### Keys
@@ -205,5 +205,5 @@ Get-AzFirmwareAnalysisCryptoKey -FirmwareId sampleFirmwareID -ResourceGroupName
205205
For a summary of your keys, run the following command:
206206

207207
```powershell
208-
Get-AzFirmwareAnalysisSumary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type CryptoKey
208+
Get-AzFirmwareAnalysisSummary -FirmwareId sampleFirmwareID -ResourceGroupName myResourceGroup -WorkspaceName default -Type CryptoKey
209209
```

articles/firmware-analysis/quickstart-upload-firmware-using-python.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,9 @@ This article explains how to use a Python script to upload firmware images to fi
1717

1818
## Prerequisites
1919

20-
This quickstart assumes a basic understanding of firmware analysis. For more information, see [Firmware analysis for device builders](./overview-firmware-analysis.md). For a list of the file systems that are supported, see [Frequently asked Questions about firmware analysis](./firmware-analysis-faq.md#what-types-of-firmware-images-does-firmware-analysis-support).
20+
This quickstart assumes a basic understanding of firmware analysis. For more information, see [Overview of firmware analysis](./overview-firmware-analysis.md). For a list of the file systems that are supported, see [Frequently asked Questions about firmware analysis](./firmware-analysis-faq.md#what-types-of-firmware-images-does-firmware-analysis-support).
21+
22+
You must have a resource group and workspace to upload and analyze firmware images. To create a resource group and workspace, see [Firmware analysis tutorial](./quickstart-firmware-analysis-portal.md).
2123

2224
You must have a resource group and workspace to upload and analyze firmware images. To create a resource group and workspace, see [Firmware analysis tutorial](./quickstart-firmware-analysis-portal.md).
2325

@@ -32,6 +34,8 @@ You must have a resource group and workspace to upload and analyze firmware imag
3234
pip install azure.storage.blob
3335
pip install halo
3436
pip install tabulate
37+
pip install azure-identity
38+
pip install azure-mgmt-iotfirmwaredefense
3539
```
3640
6. Log in to your Azure account by running the command [`az login`](/cli/azure/reference-index?#az-login).
3741

0 commit comments

Comments
 (0)