Skip to content

Commit 3cd1744

Browse files
authored
Merge pull request #199929 from v-dmankowitz/flavor
Flavor
2 parents 9fe20ad + cc30336 commit 3cd1744

10 files changed

+14
-14
lines changed

articles/defender-for-iot/device-builders/concept-micro-agent-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ These configurations include process, and network activity collectors.
5353
|--|--|--|--|
5454
| **Interval** | `High` <br>`Medium`<br>`Low` | Determines the sending frequency. | `Medium` |
5555
| **Aggregation mode** | `True` <br>`False` | Determines whether to process event aggregation for an identical event. | `True` |
56-
| **Cache size** | cycle FIFO | Defines the number of events collected in between the the times that data is sent. | `256` |
56+
| **Cache size** | cycle FIFO | Defines the number of events collected in between the times that data is sent. | `256` |
5757
| **Disable collector** | `True` <br> `False` | Determines whether or not the collector is operational. | `False` |
5858
| | | | |
5959

@@ -67,7 +67,7 @@ These configurations include process, and network activity collectors.
6767

6868
| Setting Name | Setting options | Description | Default |
6969
|--|--|--|--|
70-
| **Devices** | A list of the network devices separated by a comma. <br><br>For example `eth0,eth1` | Defines the list of network devices (interfaces) that the agent will use to monitor the traffic. <br><br>If a network device is not listed, the Network Raw events will not be recorded for the missing device.| `eth0` |
70+
| **Devices** | A list of the network devices separated by a comma. <br><br>For example `eth0,eth1` | Defines the list of network devices (interfaces) that the agent will use to monitor the traffic. <br><br>If a network device isn't listed, the Network Raw events will not be recorded for the missing device.| `eth0` |
7171
| | | | |
7272

7373
## Process collector specific-settings

articles/defender-for-iot/device-builders/concept-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Security recommendations for IoT Hub
3-
description: Learn about the concept of security recommendations and how they are used in the Defender for IoT Hub.
3+
description: Learn about the concept of security recommendations and how they're used in the Defender for IoT Hub.
44
ms.topic: conceptual
55
ms.date: 11/09/2021
66
---

articles/defender-for-iot/device-builders/concept-security-module.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Defender-IoT-micro-agent and device twins
3-
description: Learn about the concept of Defender-IoT-micro-agent twins and how they are used in Defender for IoT.
3+
description: Learn about the concept of Defender-IoT-micro-agent twins and how they're used in Defender for IoT.
44
ms.topic: conceptual
55
ms.date: 03/28/2022
66
---

articles/defender-for-iot/device-builders/configure-pam-to-audit-sign-in-events.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure Pluggable Authentication Modules (PAM) to audit sign-in events (Preview)
3-
description: Learn how to configure Pluggable Authentication Modules (PAM) to audit sign-in events when syslog is not configured for your device.
3+
description: Learn how to configure Pluggable Authentication Modules (PAM) to audit sign-in events when syslog isn't configured for your device.
44
ms.date: 02/20/2022
55
ms.topic: how-to
66
---

articles/defender-for-iot/device-builders/how-to-agent-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,9 @@ If the agent configuration object does not exist in the **azureiotsecurity** mod
4141

4242
## Configuration schema and validation
4343

44-
Make sure to validate your agent configuration against this [schema](https://aka.ms/iot-security-github-module-schema). An agent will not launch if the configuration object does not match the schema.
44+
Make sure to validate your agent configuration against this [schema](https://aka.ms/iot-security-github-module-schema). An agent will not launch if the configuration object doesn't match the schema.
4545

46-
If, while the agent is running, the configuration object is changed to a non-valid configuration (the configuration does not match the schema), the agent will ignore the invalid configuration and will continue using the current configuration.
46+
If, while the agent is running, the configuration object is changed to a non-valid configuration (the configuration doesn't match the schema), the agent will ignore the invalid configuration and will continue using the current configuration.
4747

4848
### Configuration validation
4949

articles/defender-for-iot/device-builders/how-to-azure-rtos-security-module.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The default behavior of each configuration is provided in the following tables:
3030
| ASC_SECURITY_MODULE_ID | String | defender-iot-micro-agent | The unique identifier of the device. |
3131
| SECURITY_MODULE_VERSION_(MAJOR)(MINOR)(PATCH) | Number | 3.2.1 | The version. |
3232
| ASC_SECURITY_MODULE_SEND_MESSAGE_RETRY_TIME | Number | 3 | The amount of time the Defender-IoT-micro-agent will take to send the security message after a fail. (in seconds) |
33-
| ASC_SECURITY_MODULE_PENDING_TIME | Number | 300 | The Defender-IoT-micro-agent pending time (in seconds). The state will change to suspend, if the time is exceeded.. |
33+
| ASC_SECURITY_MODULE_PENDING_TIME | Number | 300 | The Defender-IoT-micro-agent pending time (in seconds). The state will change to suspend, if the time is exceeded. |
3434

3535
## Collection
3636

articles/defender-for-iot/device-builders/how-to-deploy-linux-c.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ This script performs the following function:
4848

4949
1. Installs prerequisites.
5050

51-
1. Adds a service user (with interactive sign in disabled).
51+
1. Adds a service user (with interactive sign-in disabled).
5252

5353
1. Installs the agent as a **Daemon** - assumes the device uses **systemd** for service management.
5454

articles/defender-for-iot/device-builders/how-to-deploy-linux-cs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ This script performs the following actions:
4646

4747
- Installs prerequisites.
4848

49-
- Adds a service user (with interactive sign in disabled).
49+
- Adds a service user (with interactive sign-in disabled).
5050

5151
- Installs the agent as a **Daemon** - assumes the device uses **systemd** for legacy deployment model.
5252

articles/defender-for-iot/organizations/how-to-connect-sensor-by-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The following diagram shows data going from Microsoft Defender for IoT to the Io
2525

2626
## Set up your system
2727

28-
For this scenario we will be installing, and configuring the latest version of [Squid](http://www.squid-cache.org/) on an Ubuntu 18 server.
28+
For this scenario we'll be installing, and configuring the latest version of [Squid](http://www.squid-cache.org/) on an Ubuntu 18 server.
2929

3030
> [!Note]
3131
> Microsoft Defender for IoT does not offer support for Squid or any other proxy service.

articles/defender-for-iot/organizations/how-to-create-and-manage-users.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ This section describes how to define users. Cyberx, support, and administrator u
101101

102102
If users aren't active at the keyboard or mouse for a specific time, they're signed out of their session and must sign in again.
103103

104-
When users haven't worked with their console mouse or keyboard for 30 minutes, a session sign out is forced.
104+
When users haven't worked with their console mouse or keyboard for 30 minutes, a session sign-out is forced.
105105

106106
This feature is enabled by default and on upgrade, but can be disabled. In addition, session counting times can be updated. Session times are defined in seconds. Definitions are applied per sensor and on-premises management console.
107107

@@ -203,9 +203,9 @@ You can recover the password for the on-premises management console or the senso
203203

204204
**To recover the password for the on-premises management console, or the sensor**:
205205

206-
1. On the sign in screen of either the on-premises management console or the sensor, select **Password recovery**. The **Password recovery** screen opens.
206+
1. On the sign-in screen of either the on-premises management console or the sensor, select **Password recovery**. The **Password recovery** screen opens.
207207

208-
:::image type="content" source="media/how-to-create-and-manage-users/password-recovery.png" alt-text="Screenshot of the Select Password recovery from the sign in screen of either the on-premises management console, or the sensor.":::
208+
:::image type="content" source="media/how-to-create-and-manage-users/password-recovery.png" alt-text="Screenshot of the Select Password recovery from the sign-in screen of either the on-premises management console, or the sensor.":::
209209

210210
1. Select either **CyberX** or **Support** from the drop-down menu, and copy the unique identifier code.
211211

0 commit comments

Comments
 (0)