You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-control-what-traffic-is-monitored.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ If the traffic shown on the **Deployment** page isn't what you expect, you might
53
53
54
54
After having analyzed the traffic your sensor is monitoring and fine tuning the deployment, you may need to further fine tune your subnet list. Use this procedure to ensure that your subnets are configured correctly.
55
55
56
-
While your OT sensor automatically learns your network subnets during the initial deployment, we recommend analyzing the detected traffic and updating them as needed to optimize your map views and device inventory.
56
+
While your OT sensor automatically learns your network subnets during the initial deployment, we recommend analyzing the detected traffic and updating them as needed to optimize your map views and device inventory.
57
57
58
58
Also use this procedure to also define subnet settings, determining how devices are displayed in the sensor's [device map](how-to-work-with-the-sensor-device-map.md) and the [Azure device inventory](device-inventory.md).
59
59
@@ -84,7 +84,7 @@ While the OT network sensor automatically learns the subnets in your network, we
84
84
|**Mask**| Define the subnet's IP mask. |
85
85
|**Name**| We recommend that you enter a meaningful name that specifies the subnet's network role. Subnet names can have up to 60 characters.|
86
86
|**Segregated**| Select to show this subnet separately when displaying the device map according to Purdue level. |
87
-
|**Remove subnet**| Select to remove any subnets that aren't related to your IoT/OT network scope.|
87
+
|**Remove subnet**| Select to remove any subnets that aren't related to your IoT/OT network scope.|
88
88
89
89
In the subnet grid, subnets marked as **ICS subnet** are recognized as OT networks. This option is read-only in this grid, but you can [manually define a subnet as ICS](#manually-define-a-subnet-as-ics) if there's an OT subnet not being recognized correctly.
90
90
@@ -184,7 +184,7 @@ If you're working with dynamic networks, you need to handle IP addresses changes
184
184
1. Select **Save** to save your changes.
185
185
186
186
## Configure traffic filters (advanced)
187
-
**Belle remove this??**<!-- should this be removed if the alerts arent available? -->
187
+
188
188
To reduce alert fatigue and focus your network monitoring on high priority traffic, you may decide to filter the traffic that streams into Defender for IoT at the source. Capture filters are configured via the OT sensor CLI, and allow you to block high-bandwidth traffic at the hardware layer, optimizing both appliance performance and resource usage.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/references-work-with-defender-for-iot-cli-commands.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.topic: concept-article
6
6
---
7
7
8
8
# Defender for IoT CLI users and access
9
-
**Belle remove ??** what to remove from this page? -->
9
+
10
10
This article provides an introduction to the Microsoft Defender for IoT command line interface (CLI). The CLI is a text-based user interface that allows you to access your OT sensors and the on-premises management console for advanced configuration, troubleshooting, and support.
11
11
12
12
To access the Defender for IoT CLI, you'll need access to the sensor or on-premises management console.
@@ -25,7 +25,6 @@ If you're using a legacy software version, you may have one or more of the follo
25
25
|Legacy scenario |Description |
26
26
|---------|---------|
27
27
|**Sensor versions earlier than 23.2.0**| In sensor versions earlier than [23.2.0](whats-new.md#default-privileged-user-is-now-admin-instead-of-support), the default *admin* user is named *support*. The *support* user is available and supported only on versions earlier than 23.2.0.<br><br>Documentation refers to the *admin* user to match the latest version of the software. |
28
-
<!--|**Sensor software versions earlier than 23.1.x** | In sensor software versions earlier than [23.1.x](whats-new.md#july-2023), the *cyberx* and *cyberx_host* privileged users are also in use. <br><br>In newly installed versions 23.1.x and higher, the *cyberx* and *cyberx_host* users are available, but not enabled by default. <br><br>To enable these extra privileged users, such as to use the [Defender for IoT CLI](references-work-with-defender-for-iot-cli-commands.md), change their passwords. For more information, see [Recover privileged access to a sensor](manage-users-sensor.md#recover-privileged-access-to-a-sensor). |-->
29
28
30
29
Other CLI users cannot be added.
31
30
@@ -91,8 +90,6 @@ Run:
91
90
system shell
92
91
```
93
92
94
-
<!--OT sensor versions earlier than [23.2.0](whats-new.md#default-privileged-user-is-now-admin-instead-of-support) include the *support* privileged user instead of the *admin* user. If you're using an older version of the sensor software, any commands that are listed as supported for the *admin* user are also supported for the legacy *support* user.-->
95
-
96
93
## Sign out of the CLI
97
94
98
95
Make sure to properly sign out of the CLI when you're done using it. You're automatically signed out after an inactive period of 300 seconds.
0 commit comments