Skip to content

Commit 0c1de22

Browse files
authored
Merge pull request #187400 from shhazam-ms/Risk-Assessment-and-Attack-vector---Sensor-redesign
Risk Assessment and Attack Vector Reports: sensor redesign
2 parents ec89aee + e9e16e4 commit 0c1de22

File tree

3 files changed

+33
-46
lines changed

3 files changed

+33
-46
lines changed

articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md

Lines changed: 13 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create attack vector reports
33
description: Attack vector reports provide a graphical representation of a vulnerability chain of exploitable devices.
4-
ms.date: 11/09/2021
4+
ms.date: 02/03/2022
55
ms.topic: how-to
66
---
77

@@ -13,26 +13,25 @@ Attack vector reports provide a graphical representation of a vulnerability chai
1313

1414
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can then determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities.
1515

16-
:::image type="content" source="media/how-to-generate-reports/control-center.png" alt-text="View your alerts in the control center.":::
17-
1816
> [!NOTE]
1917
> Administrators and security analysts can perform the procedures described in this section.
2018
2119
## Create an attack vector report
2220

23-
To create an attack vector simulation:
21+
This section describes how to create Attack Vector reports.
2422

25-
1. Select :::image type="content" source="media/how-to-generate-reports/plus.png" alt-text="Plus sign":::on the side menu to add a Simulation.
23+
**To create an attack vector simulation:**
2624

27-
:::image type="content" source="media/how-to-generate-reports/vector.png" alt-text="The attack vector simulation.":::
25+
1. Select **Attack vector** from the sensor side menu.
26+
1. Select **Add simulation**.
2827

2928
2. Enter simulation properties:
3029

3130
- **Name**: Simulation name.
3231

3332
- **Maximum vectors**: The maximum number of vectors in a single simulation.
3433

35-
- **Show in Device map**: Show the attack vector as a filter on the device map.
34+
- **Show in Device map**: Show the attack vector as a group in the Device map.
3635

3736
- **All Source devices**: The attack vector will consider all devices as an attack source.
3837

@@ -46,19 +45,15 @@ To create an attack vector simulation:
4645

4746
- **Exclude Subnets**: Specified subnets will be excluded from the attack vector simulation.
4847

49-
3. Select **Add Simulation**. The simulation will be added to the simulations list.
50-
51-
:::image type="content" source="media/how-to-generate-reports/new-simulation.png" alt-text="Add a new simulation.":::
52-
53-
4. Select :::image type="icon" source="media/how-to-generate-reports/edit-a-simulation-icon.png" border="false"::: if you want to edit the simulation.
54-
55-
Select :::image type="icon" source="media/how-to-generate-reports/delete-simulation-icon.png" border="false"::: if you want to delete the simulation.
56-
57-
Select :::image type="icon" source="media/how-to-generate-reports/make-a-favorite-icon.png" border="false"::: if you want to mark the simulation as a favorite.
48+
3. Select **Save**.
49+
1. Select the report that is saved from the Attack vector page and review:
50+
- network attack paths and insights
51+
- a risk score
52+
- source and target devices
53+
- a graphical representation of attack vectors
5854

59-
5. A list of attack vectors appears and includes vector score (out of 100), attack source device, and attack target device. Select a specific attack for graphical depiction of attack vectors.
55+
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report.":::
6056

61-
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Attack vectors.":::
6257

6358
## See also
6459

articles/defender-for-iot/organizations/how-to-create-risk-assessment-reports.md

Lines changed: 20 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create risk assessment reports
33
description: Gain insight into network risks detected by individual sensors or an aggregate view of risks detected by all sensors.
4-
ms.date: 11/09/2021
4+
ms.date: 02/03/2022
55
ms.topic: how-to
66
---
77

@@ -50,62 +50,54 @@ Overall network security score is generated in each report. The score represents
5050

5151
Risk Assessment scores are based on information learned from packet inspection, behavioral modeling engines, and a SCADA-specific state machine design.
5252

53-
**Secure Devices** are devices with a security score above 90 %.
53+
**Secure Devices** are devices with a security score above 90%.
5454

55-
**Devices Needing Improvement**: Devices with a security score between 70 percent and 89 %.
55+
**Devices Needing Improvement**: Devices with a security score between 70 percent and 89%.
5656

57-
**Vulnerable Devices** are devices with a security score below 70 %.
57+
**Vulnerable Devices** are devices with a security score below 70%.
5858

5959
### About backup and anti-virus servers
6060

61-
The risk assessment score may be negatively impacted if you do not define backup and anti-virus server addresses in your sensor. Adding these addresses improves your score. By default these addresses are not defined.
61+
The risk assessment score may be negatively impacted if you don't define backup and anti-virus server addresses in your sensor. Adding these addresses improves your score. By default these addresses aren't defined.
6262
The Risk Assessment report cover page will indicate if backup servers and anti-virus servers are not defined.
6363

6464
**To add servers:**
6565

6666
1. Select **System Settings** and then select **System Properties**.
6767
1. Select **Vulnerability Assessment** and add the addresses to **backup_servers** and **AV_addresses** fields. Use commas to separate multiple addresses. separated by commas.
6868
1. Select **Save**.
69-
## Create risk assessment reports
70-
71-
Create a PDF risk assessment report. The report name is automatically generated as risk-assessment-report-1.pdf. The number is updated for each new report you create. The time and day of creation are displayed.
72-
73-
### Create a sensor risk assessment report
7469

75-
Create a risk assessment report based on detections made by the sensor you are logged into.
70+
## Create risk assessment reports
7671

77-
To create a report:
72+
Create a risk assessment report based on detections made by the sensor you are logged into. The report name is automatically generated as risk-assessment-report-1.pdf. The number is updated for each new report you create. The time and day of creation are displayed.
7873

79-
1. Login to the sensor console.
80-
1. Select **Risk Assessment** on the side menu.
81-
1. Select **Generate Report**. The report appears in the Archived Reports section.
82-
1. Select the report from the Archived Reports section to download it.
74+
**To create a report:**
8375

84-
:::image type="content" source="media/how-to-generate-reports/risk-assessment.png" alt-text="A view of the risk assessment.":::
76+
1. Sign in to the sensor console.
77+
1. Select **Risk assessment** on the side menu.
78+
1. Select **Generate report**. The report appears in the Saved Reports section.
79+
1. Select the report from the Saved Reports section to download it.
8580

86-
To import a company logo:
81+
**To import a company logo:**
8782

88-
- Select **Import Logo**.
83+
1. Select **Import logo**.
84+
1. Choose a logo to add to the header of your Risk assessment reports.
8985

9086
### Create an on-premises management console risk assessment report
9187

92-
Create a risk assessment report based on detections made by the any of the sensors managed by your on-premises management console.
88+
Create a risk assessment report based on detections made by sensors that are managed by your on-premises management console.
9389

94-
To create a report:
90+
**To create a report:**
9591

9692
1. Select **Risk Assessment** on the side menu.
97-
9893
2. Select a sensor from the **Select sensor** drop-down list.
99-
10094
3. Select **Generate Report**.
101-
10295
4. Select **Download** from the **Archived Reports** section.
10396

104-
To import a company logo:
105-
106-
- Select **Import Logo**.
97+
**To import a company logo:**
10798

108-
:::image type="content" source="media/how-to-generate-reports/import-logo-screenshot.png" alt-text="Import your logo through the risk assessment view.":::
99+
1. Select **Import logo**.
100+
1. Choose a logo to add to the header of your Risk assessment reports.
109101

110102
## See also
111103

110 KB
Loading

0 commit comments

Comments
 (0)