You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/device-inventory.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,12 +23,12 @@ For example:
23
23
24
24
The Defender for IoT device inventory is available in the Azure portal, OT network sensor consoles, and the on-premises management console.
25
25
26
-
While you can view device details from any of these locations, each location also offers extra device inventory support. The following table describes the device inventory visible supported for each location and the extra actions available from that location only:
26
+
While you can view device details from any of these locations, each location also offers extra device inventory support. The following table describes the device inventory support for each location and the extra actions available from that location only:
27
27
28
28
|Location |Description | Extra inventory support |
29
29
|---------|---------|---------|
30
30
|**Azure portal**| Devices detected from all cloud-connected OT sensors and Enterprise IoT sensors. <br><br> | - If you have an [Enterprise IoT plan](eiot-defender-for-endpoint.md) on your Azure subscription, the device inventory also includes devices detected by Microsoft Defender for Endpoint agents. <br><br>- If you also use [Microsoft Sentinel](iot-solution.md), incidents in Microsoft Sentinel are linked to related devices in Defender for IoT. <br><br>- Use Defender for IoT [workbooks](workbooks.md) for visibility into all cloud-connected device inventory, including related alerts and vulnerabilities. |
31
-
|**OT network sensor consoles**| Devices detected by that OT sensor | - View all detected devices across a network device map<br>- View related events on the **Event timeline**|
31
+
|**OT network sensor consoles**| Devices detected by that OT sensor | - View all detected devices across a network device map<br><br>- View related events on the **Event timeline**|
32
32
|**An on-premises management console**| Devices detected across all connected OT sensors | Enhance device data by importing data manually or via script |
33
33
34
34
For more information, see:
@@ -51,7 +51,7 @@ Defender for IoT's device inventory supports device types across a variety of in
51
51
|Devices |For example ... |
52
52
|---------|---------|
53
53
|**Manufacturing**| Industrial and operational devices, such as pneumatic devices, packaging systems, industrial packaging systems, industrial robots |
|**Transportation / Utilities**| Turnstiles, people counters, motion sensors, fire and safety systems, intercoms |
57
57
|**Energy and resources**| DCS controllers, PLCs, historian devices, HMIs |
@@ -70,7 +70,7 @@ When you're first working with Defender for IoT, during the learning period just
70
70
71
71
After the learning period is over, any new devices detected are considered to be *unauthorized* and *new* devices. We recommend checking these devices carefully for risks and vulnerabilities. For example, in the Azure portal, filter the device inventory for `Authorization == **Unauthorized**`. On the device details page, drill down and check for related vulnerabilities, alerts, and recommendations.
72
72
73
-
The *new* status is removed as soon as you edit any of the device details move the device on an OT sensor device map. In contrast, the *unauthorized* label remains until you manually edit the device details and mark it as *authorized*.
73
+
The *new* status is removed as soon as you edit any of the device details or move the device on an OT sensor device map. In contrast, the *unauthorized* label remains until you manually edit the device details and mark it as *authorized*.
74
74
75
75
On an OT sensor, unauthorized devices are also included in the following reports:
76
76
@@ -84,7 +84,7 @@ Mark OT devices as *important* to highlight them for extra tracking. On an OT se
84
84
85
85
-[Attack vector reports](how-to-create-attack-vector-reports.md): Devices marked as *important* are included in an attack vector simulation as possible attack targets.
86
86
87
-
-[Risk assessment reports](how-to-create-risk-assessment-reports.md): Devices marked as *important* are counted in risk assessment reports when calculating security scores
87
+
-[Risk assessment reports](how-to-create-risk-assessment-reports.md): Devices marked as *important* are counted in risk assessment reports when calculating security scores.
88
88
89
89
## Device inventory column data
90
90
@@ -97,7 +97,7 @@ The following table lists the columns available in the Defender for IoT device i
97
97
|**Class**| Editable. The device's class. <br>Default: `IoT`|
98
98
|**Data source**| The source of the data, such as a micro agent, OT sensor, or Microsoft Defender for Endpoint. <br>Default: `MicroAgent`|
99
99
|**Description** * | Editable. The device's description. |
100
-
|**Device Id**| The device's Azure-assigned ID number|
100
+
|**Device Id**| The device's Azure-assigned ID number. |
101
101
|**Firmware model**| The device's firmware model.|
102
102
|**Firmware vendor**| Editable. The vendor of the device's firmware. |
103
103
|**Firmware version** * |Editable. The device's firmware version. |
0 commit comments