You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ For more information, see [Deploy SSL/TLS certificates on OT appliances](how-to-
59
59
60
60
Activation files on locally-managed OT sensors now remain activated for as long as your Defender for IoT plan is active on your Azure subscription, just like activation files on cloud-connected OT sensors.
61
61
62
-
You'll only need to update you activation file if you're [updating an OT sensor from a legacy version](update-ot-software.md#update-legacy-ot-sensor-software) or switching the sensor management mode, such as moving from locally-managed to cloud-connected.
62
+
You'll only need to update your activation file if you're [updating an OT sensor from a legacy version](update-ot-software.md#update-legacy-ot-sensor-software) or switching the sensor management mode, such as moving from locally-managed to cloud-connected.
63
63
64
64
For more information, see [Manage individual sensors](how-to-manage-individual-sensors.md).
65
65
@@ -75,7 +75,7 @@ For more information, see [Manage your OT device inventory from a sensor console
75
75
76
76
### Updated severity for all Suspicion of Malicious Activity alerts
77
77
78
-
All alerts with the **Suspicion of Malicious Activity** category now have an severity of **Critical**.
78
+
All alerts with the **Suspicion of Malicious Activity** category now have a severity of **Critical**.
79
79
80
80
For more information, see [Malware engine alerts](alert-engine-messages.md#malware-engine-alerts).
0 commit comments