You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/connect-sensors.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Use this section to help determine which connection method is right for your org
26
26
|- You require private connectivity between your sensor and Azure, <br>- Your site is connected to Azure via ExpressRoute, or <br>- Your site is connected to Azure over a VPN |**[Connect via an Azure proxy](#connect-via-an-azure-proxy)**|
27
27
|- Your sensor needs a proxy to reach from the OT network to the cloud, or <br>- You want multiple sensors to connect to Azure through a single point |**[Connect via proxy chaining](#connect-via-proxy-chaining)**|
28
28
|- You want to connect your sensor to Azure directly |**[Connect directly](#connect-directly)**|
29
-
|- You have sensors hosted in multiple public clouds |**[Connect via multi-cloud vendors](#connect-via-multi-cloud-vendors)**|
29
+
|- You have sensors hosted in multiple public clouds |**[Connect via multicloud vendors](#connect-via-multicloud-vendors)**|
30
30
31
31
32
32
## Connect via an Azure proxy
@@ -357,21 +357,21 @@ This section describes what you need to configure a direct sensor connection to
357
357
358
358
1. Azure public IP addresses are updated weekly. If you must define firewall rules based on IP addresses, make sure to download the new JSON file each week and make the required changes on your site to correctly identify services running in Azure. You'll need the updated IP ranges for **AzureIoTHub**, **Storage**, and **EventHub**. See the [latest IP ranges](https://www.microsoft.com/en-us/download/details.aspx?id=56519).
359
359
360
-
## Connect via multi-cloud vendors
360
+
## Connect via multicloud vendors
361
361
362
-
This section describes how to connect your sensor to Defender for IoT in Azure from sensors deployed in one or more public clouds. For more information, see [Multi-cloud connections](architecture-connections.md#multi-cloud-connections).
362
+
This section describes how to connect your sensor to Defender for IoT in Azure from sensors deployed in one or more public clouds. For more information, see [Multicloud connections](architecture-connections.md#multicloud-connections).
363
363
364
364
### Prerequisites
365
365
366
366
Before you start:
367
367
368
368
- Make sure that you have a sensor deployed in a public cloud, such as AWS or Google Cloud, and configured to monitor SPAN traffic.
369
369
370
-
- Choose the multi-cloud connectivity method that's right for your organization:
370
+
- Choose the multicloud connectivity method that's right for your organization:
371
371
372
372
Use the following flow chart to determine which connectivity method to use:
373
373
374
-
:::image type="content" source="media/architecture-connections/multi-cloud-flow-chart.png" alt-text="Flow chart to determine which connectivity method to use.":::
374
+
:::image type="content" source="media/architecture-connections/multicloud-flow-chart.png" alt-text="Flow chart to determine which connectivity method to use.":::
375
375
376
376
- **Use public IP addresses over the internet** if you don't need to exchange data using private IP addresses
0 commit comments