You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-risk-assessment-reports.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.date: 12/01/2022
5
5
ms.topic: how-to
6
6
---
7
7
8
-
# Risk assessment reporting
8
+
# Create risk assessment reports
9
9
10
10
Risk assessment reports provide details about security scores, vulnerabilities, and operational issues on detected devices as well as risks coming from imported firewall rules.
11
11
@@ -17,7 +17,7 @@ Each Defender for IoT network sensor can generate a risk assessment report, whil
17
17
18
18
- You must be an **Admin** or **Security Analyst** user to create or view risk assessment reports on the OT sensor or on-premises management console.
19
19
20
-
## Create and view risk assessment reports for a specific sensor
20
+
## Generate risk assessment reports for a specific sensor
21
21
22
22
Use an individual OT sensor to view reports generated for that sensor only.
23
23
@@ -39,9 +39,12 @@ Risk assessment reports include the following details:
39
39
|**Security and operational issues**| Insight into any of the following security and operational issues: <br><br> - Configuration issues <br> - Device vulnerability, prioritized by security level <br> - Network security issues <br> - Network operational issues <br> - Connections to ICS networks <br> - Internet connections <br> - Industrial malware indicators <br> - Protocol issues <br> - Attack vectors |
40
40
|**Firewall rule risk**| The Risk Assessment report highlights if a rule isn't secure, or if there's a mismatch between the rule and the monitored network. |
41
41
42
-
## Enriching the risk assessment report
42
+
## Enrich the risk assessment report
43
43
44
-
You can enrich a risk assessment report to provide you with more content. For example, you can import firewall data to your sensor, and then the risk assessment report will also include data about firewall rule risk, based on the imported rules. You can also define addresses for backup and anti-virus servers.
44
+
Enrich your sensor with extra data to provide fuller risk assessment reports:
45
+
46
+
- Import firewall rules to have them assessed for risks in the report
47
+
- Lower your risk by defining addresses for your backup and anti-virus server
45
48
46
49
### Import firewall rules to an OT sensor
47
50
@@ -59,7 +62,7 @@ For example:
59
62
60
63
:::image type="content" source="media/how-to-create-risk-assessment-reports/import-firewall-rules.png" alt-text="Screenshot of how to import firewall rules." lightbox="media/how-to-create-risk-assessment-reports/import-firewall-rules.png":::
61
64
62
-
### Add backup and anti-virus server addresses to your sensor
65
+
### Define backup and anti-virus servers on an OT sensor
63
66
64
67
Backup and anti-virus servers aren't defined on your sensor by default. We recommend defining these addresses on your sensor to keep your network risk assessment low.
65
68
@@ -69,7 +72,7 @@ Backup and anti-virus servers aren't defined on your sensor by default. We recom
69
72
1. Add your backup and anti-virus server addresses to the **backup_servers** and **AV_addresses** fields, respectively. Use commas to separate multiple addresses.
70
73
1. Select **Save** to save your changes.
71
74
72
-
## Create and view risk assessment reports for multiple sensors
75
+
## View risk assessment reports for multiple sensors
73
76
74
77
Use an on-premises management console to view risk assessment reports for all connected sensors.
0 commit comments