Skip to content

Commit 101ceca

Browse files
committed
making edits
1 parent 837163b commit 101ceca

File tree

2 files changed

+13
-9
lines changed

2 files changed

+13
-9
lines changed

articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: how-to
77

88
# Attack vector reporting
99

10-
Attack vector reports, generated by Defender for IoT OT network sensors, provide a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target.
10+
Attack vector reports provide a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target.
1111

1212
## Prerequisites
1313

@@ -34,13 +34,17 @@ You must be an **Admin** or **Security Analyst** user to create an attack vector
3434
| **Exclude Subnets** | Specified subnets will be excluded from the attack vector simulation. |
3535

3636
1. Select **Save**.
37-
1. Select the report that is saved from the Attack vector page and review:
38-
- network attack paths and insights
39-
- a risk score
40-
- source and target devices
41-
- a graphical representation of attack vectors
4237

43-
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report.":::
38+
## Attack vector report contents
39+
40+
From the report that is saved from the Attack vector page, you can review:
41+
42+
- network attack paths and insights
43+
- a risk score
44+
- source and target devices
45+
- a graphical representation of attack vectors
46+
47+
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report.":::
4448

4549
## Next steps
4650

articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,6 @@ ms.topic: how-to
99

1010
Running data mining queries provides dynamic, detailed information about your network devices. This includes information for specific time periods, internet connectivity, ports and protocols, firmware versions, programming commands, and device state.
1111

12-
Reports can be viewed in the **Data Mining** page. You can refresh a report, edit report parameters, and export to a CSV file or PDF. You can also take a snapshot of a report.
13-
1412
Data mining information is saved and stored continuously, except for when a device is deleted. Data mining results can be exported and stored externally to a secure server. In addition, the sensor performs automatic daily backups to ensure system continuity and preservation of data.
1513

1614
## Prerequisites
@@ -93,6 +91,8 @@ When you choose the sensor from the on-premises management console, all the cust
9391

9492
## Next steps
9593

94+
Reports can be viewed in the **Data Mining** page. You can refresh a report, edit report parameters, and export to a CSV file or PDF. You can also take a snapshot of a report.
95+
9696
For more information, see:
9797

9898
- [Risk assessment reporting](how-to-create-risk-assessment-reports.md)

0 commit comments

Comments
 (0)