Skip to content

Commit 09d5b7d

Browse files
authored
belle's comments
1 parent 9eb0b9a commit 09d5b7d

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,13 +64,13 @@ For more information, see the [Microsoft Security Development Lifecycle practice
6464

6565
|Service area |Updates |
6666
|---------|---------|
67-
|**OT networks** |**Sensor software versions 22.x**: [Updates for cloud connection outbound allow rules](#updates-for-cloud-connection-outbound-allow-rules) |
67+
|**OT networks** |**Sensor software versions 22.x**: [Updates for Azure cloud connection firewall rules](#updates-for-azure-cloud-connection-firewall-rules) |
6868

69-
### Increased security for Azure connection firewall rules
69+
### Updates for Azure cloud connection firewall rules
7070

71-
OT network sensors connect to Azure to provide alert and device data and sensor health messages, access threat intelligence packages, and more
71+
OT network sensors connect to Azure to provide alert and device data and sensor health messages, access threat intelligence packages, and more. Connected Azure services include IoT Hub, Blob Storage, Event Hubs, and the Microsoft Download Center.
7272

73-
For OT sensors with software versions 22.x and higher, Defender for IoT now supports increased security when adding outbound allow rules for connections to Azure. Now you can define your outbound allow rules to connect to Azure without using wildcards. Connections between your OT sensors and the Azure portal provide alerts and device data, health messages, threat intelligence packages, and more.
73+
For OT sensors with software versions 22.x and higher, Defender for IoT now supports increased security when adding outbound allow rules for connections to Azure. Now you can define your outbound allow rules to connect to Azure without using wildcards.
7474

7575
When defining outbound allow rules to connect to Azure, you'll need to enable HTTPS traffic to each of the required endpoints on port 443. Outbound allow rules are defined once for all OT sensors onboarded to the same subscription.
7676

0 commit comments

Comments
 (0)