You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-investigate-sensor-detections-in-a-device-inventory.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,9 +54,9 @@ This section describes device details available from the inventory and describes
54
54
| MAC Address | The MAC address of the device. |
55
55
| Protocols | The protocols that the device uses. |
56
56
| Unacknowledged Alerts | The number of unacknowledged alerts associated with this device. |
57
-
| Is Authorized | The authorization status defined by the user:<br />- **True**: The device has been authorized.<br />- **False**: The device has not been authorized. |
57
+
| Is Authorized | The authorization status defined by the user:<br />- **True**: The device has been authorized.<br />- **False**: The device hasn't been authorized. |
58
58
| Is Known as Scanner | Defined as a network scanning device by the user. |
59
-
| Is Programming device | Defined as an authorized programming device by the user. <br />- **True**: The device performs programming activities for PLCs, RTUs, and controllers, which are relevant to engineering stations. <br />- **False**: The device is not a programming device. |
59
+
| Is Programming device | Defined as an authorized programming device by the user. <br />- **True**: The device performs programming activities for PLCs, RTUs, and controllers, which are relevant to engineering stations. <br />- **False**: The device isn't a programming device. |
60
60
| Groups | The groups that this device participates in. |
61
61
| Last Activity | The last activity that the device performed. |
62
62
| Discovered | When this device was first seen in the network. |
@@ -190,7 +190,7 @@ You can deploy the script once or schedule ongoing queries by using standard aut
190
190
191
191
### About the script
192
192
193
-
- The script is run as a utility and not an installed program. Running the script does not affect the endpoint.
193
+
- The script is run as a utility and not an installed program. Running the script doesn't affect the endpoint.
194
194
195
195
- The files that the script generates remain on the local drive until you delete them.
196
196
@@ -246,15 +246,15 @@ Devices may become inactive because of:
246
246
247
247
Deleting inactive devices helps:
248
248
249
-
- Defender for IoT create a more accurate representation of current network activity
249
+
- Defender for IoT creates a more accurate representation of current network activity
250
250
- Better evaluate committed devices when managing subscriptions
251
251
- Reduce clutter on your screen
252
252
253
253
### View inactive devices
254
254
255
255
You can filter the inventory to display devices that are inactive:
256
256
257
-
- for 7 days or more
257
+
- for seven days or more
258
258
- for 14 days or more
259
259
- 30 days or more
260
260
- 90 days or more
@@ -271,7 +271,7 @@ You can filter the inventory to display devices that are inactive:
271
271
272
272
Devices you delete from the Inventory are removed from the map and won't be calculated when generating Defender for IoT reports, for example Data Mining, Risk Assessment, and Attack Vector reports.
273
273
274
-
You will be prompted to record a reason for deleting devices. This information, as well as the time/date and number of devices deleted, appears in the Event timeline.
274
+
You'll be prompted to record a reason for deleting devices. This information, as well as the time/date and number of devices deleted, appears in the Event timeline.
0 commit comments