Skip to content

Commit 54c9a51

Browse files
committed
updating download wmi + next steps
1 parent 3b32217 commit 54c9a51

File tree

2 files changed

+6
-15
lines changed

2 files changed

+6
-15
lines changed

articles/defender-for-iot/organizations/configure-windows-endpoint-monitoring.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,7 @@ If you'll be using a non-admin account to run your WEM scans, this procedure is
177177

178178
For more information, see:
179179

180+
- [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md)
180181
- [View your device inventory from a sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md)
181182
- [View your device inventory from the Azure portal](how-to-manage-device-inventory-for-organizations.md)
182183
- [Configure active monitoring for OT networks](configure-active-monitoring.md)

articles/defender-for-iot/organizations/detect-windows-endpoints-script.md

Lines changed: 5 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The script detects enriched Windows data, and is run as a utility and not an ins
6464

6565
1. Run the `run.bat` file.
6666

67-
After the script runs to probe the registry, a CX-snapshot file appears with the registry information. The filename indicates the system name, date, and time of the snapshot with the following syntax: `CX-snaphot_SystemName_Month_Year_Time`
67+
After the script runs to probe the registry, a CX-snapshot file appears with the registry information. The filename indicates the machine name and the current date and time of the snapshot with the following syntax: `cx_snapshot_[machinename]_[current date time]`.
6868

6969
Files generated by the script include:
7070

@@ -88,21 +88,9 @@ After having run the script as described [earlier](#download-and-run-the-script)
8888

8989
:::image type="content" source="media/detect-windows-endpoints-script/import-wmi-script.png" alt-text="Screenshot of where to import WMI script." lightbox="media/detect-windows-endpoints-script/import-wmi-script.png":::
9090

91-
1. Select **Close**. The device registry information is imported and a successful confirmation message is shown.
92-
93-
If there's a problem uploading one of the files, you'll be informed which file upload failed.
94-
95-
## Offline WMI
96-
97-
To preform offline WMI:
98-
99-
1. [Download the script](#download-and-run-the-script), then extract it.
91+
## View devices applications report
10092

101-
1. Run `run.bat` as administrator directly on the Windows endpoint.
102-
103-
After the script runs to probe the registry, a CX-snapshot file appears with the registry information. The filename indicates the machine name and the current date and time of the snapshot with the following syntax: `cx_snapshot_[machinename]_[current date time]`.
104-
105-
1. [Import](#import-device-details) the received output file to the sensor.
93+
After [downloading and running](#download-and-run-the-script) the script, then [importing](#import-device-details) the generated data to your sensor, you can view your devices applications with a custom data mining report.
10694

10795
**To view the devices applications:**
10896

@@ -112,6 +100,8 @@ To preform offline WMI:
112100

113101
:::image type="content" source="media/detect-windows-endpoints-script/devices-applications-report.png" alt-text="Screenshot of creating devices applications custom report." lightbox="media/detect-windows-endpoints-script/devices-applications-report.png":::
114102

103+
1. Your devices applications report is shown in the **My reports** area.
104+
115105
Based on this information, the Windows device CVE list will be displayed in Azure if the sensor is cloud-connected.
116106

117107
## Next steps

0 commit comments

Comments
 (0)