Skip to content

Commit 837163b

Browse files
committed
refreshing reports articles
1 parent 2884d50 commit 837163b

File tree

3 files changed

+42
-40
lines changed

3 files changed

+42
-40
lines changed

articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,26 +7,21 @@ ms.topic: how-to
77

88
# Attack vector reporting
99

10-
## About attack vector reports
10+
Attack vector reports, generated by Defender for IoT OT network sensors, provide a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target.
1111

12-
Attack vector reports provide a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target.
12+
## Prerequisites
1313

14-
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can then determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities.
15-
16-
> [!NOTE]
17-
> Administrators and security analysts can perform the procedures described in this section.
14+
You must be an **Admin** or **Security Analyst** user to create an attack vector report.
1815

1916
## Create an attack vector report
2017

21-
This section describes how to create Attack Vector reports.
22-
2318
**To create an attack vector simulation:**
2419

2520
1. Select **Attack vector** from the sensor side menu.
2621
1. Select **Add simulation**.
2722
1. Enter simulation properties:
2823

29-
| Parameter | Description |
24+
| Property | Description |
3025
|---------|---------|
3126
| **Name** | Simulation name |
3227
| **Maximum vectors** | The maximum number of vectors in a single simulation. |
@@ -49,4 +44,4 @@ This section describes how to create Attack Vector reports.
4944

5045
## Next steps
5146

52-
For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md).
47+
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can now determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities. For more information, see [fill this in](not-sure-yet.md).

articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md

Lines changed: 31 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -5,39 +5,40 @@ ms.date: 02/02/2022
55
ms.topic: how-to
66
---
77

8-
# Run data mining queries
8+
# Data mining queries
99

10-
Using data mining queries to get dynamic, granular information about your network devices, including for specific time periods, internet connectivity, ports and protocols, firmware versions, programming commands, and device state. You can use data mining queries for:
10+
Running data mining queries provides dynamic, detailed information about your network devices. This includes information for specific time periods, internet connectivity, ports and protocols, firmware versions, programming commands, and device state.
1111

12-
| Information | Description |
13-
|---------|---------|
14-
| **SOC incident response** | Generate a report in real time to help deal with immediate incident response. For example, Data Mining can generate a report for a list of devices that might require patching. |
15-
| **Forensics** | Generate a report based on historical data for investigative reports. |
16-
| **Network security** | Generate a report that helps improve overall network security. For example, generate a report can be generated that lists devices with weak authentication credentials. |
17-
| **Visibility** | Generate a report that covers all query items to view all baseline parameters of your network. |
18-
| **PLC security** | Improve security by detecting PLCs in unsecure states, for example, Program and Remote states. |
12+
Reports can be viewed in the **Data Mining** page. You can refresh a report, edit report parameters, and export to a CSV file or PDF. You can also take a snapshot of a report.
1913

2014
Data mining information is saved and stored continuously, except for when a device is deleted. Data mining results can be exported and stored externally to a secure server. In addition, the sensor performs automatic daily backups to ensure system continuity and preservation of data.
2115

16+
## Prerequisites
17+
18+
You must be an **Admin** or **Security Analyst** user to access predefined data mining reports.
19+
2220
## Predefined data mining reports
2321

24-
The following predefined reports are available. These queries are generated in real time.
22+
The following predefined reports are available in **Analyze** > **Data Mining**. These queries are generated in real time.
2523

2624
| Report | Description |
2725
|---------|---------|
2826
| **Programming commands** | Devices that send industrial programming. |
2927
| **Remote access** | Devices that communicate through remote session protocols. |
3028
| **Internet activity** | Devices that are connected to the internet. |
3129
| **CVEs** | A list of devices detected with known vulnerabilities, along with CVSSv2 risk scores. |
32-
| **Excluded CVEs** | A list of all the CVEs that were manually excluded. It is possible to customize the CVE list manually so that the VA reports and attack vectors more accurately reflect your network by excluding or including particular CVEs and updating the CVSSv2 score accordingly. |
30+
| **Excluded CVEs** | A list of all the CVEs that were manually excluded. It's possible to customize the CVE list manually so that the VA reports and attack vectors more accurately reflect your network by excluding or including particular CVEs and updating the CVSSv2 score accordingly. |
3331
| **Nonactive devices** | Devices that haven't communicated for the past seven days. |
3432
| **Active devices** | Active network devices within the last 24 hours. |
3533

36-
Find these reports in **Analyze** > **Data Mining**. Reports are available for users with Administrator and Security Analyst permissions. Read only users can't access these reports.
37-
3834
## Create a report
3935

40-
To create a data-mining report:
36+
Reports are dynamically updated each time you open them. For example:
37+
38+
- If you create a report for firmware versions on devices on June 1 and open the report again on June 10, this report will be updated with information that's accurate for June 10.
39+
- If you create a report to detect new devices discovered over the last 30 days on June 1 and open the report on June 30, the results will be displayed for the last 30 days.
40+
41+
**To generate a report**:
4142

4243
1. Select **Data Mining** from the side menu. Predefined suggested reports appear automatically.
4344

@@ -53,27 +54,32 @@ To create a data-mining report:
5354

5455
1. Select **Save** to save your report and display results on the **Data Mining** page.
5556

56-
Reports are dynamically updated each time you open them. For example:
57+
## Data mining report contents
5758

58-
- If you create a report for firmware versions on devices on June 1 and open the report again on June 10, this report will be updated with information that's accurate for June 10.
59-
- If you create a report to detect new devices discovered over the last 30 days on June 1 and open the report on June 30, the results will be displayed for the last 30 days.
59+
You can use data mining queries for:
6060

61-
## Managing reports
62-
63-
Reports can be viewed in the **Data Mining** page, You can refresh a report, edit report parameters, and export to a CSV file or PDF. You can also take a snapshot of a report.
61+
| Information | Description |
62+
|---------|---------|
63+
| **SOC incident response** | Generate a report in real time to help deal with immediate incident response. For example, Data Mining can generate a report for a list of devices that might require patching. |
64+
| **Forensics** | Generate a report based on historical data for investigative reports. |
65+
| **Network security** | Generate a report that helps improve overall network security. For example, generate a report can be generated that lists devices with weak authentication credentials. |
66+
| **Visibility** | Generate a report that covers all query items to view all baseline parameters of your network. |
67+
| **PLC security** | Improve security by detecting PLCs in unsecure states, for example, Program and Remote states. |
6468

6569
## View reports in on-premises management console
6670

6771
The on-premises management console lets you generate reports for each sensor that's connected to it. Reports are based on sensor data-mining queries that are performed, and include:
6872

69-
- **Active Devices (Last 24 Hours)**: Presents a list of devices that show network activity within a period of 24 hours.
70-
- **Non-Active Devices (Last 7 Days)**: Presents a list of devices that show no network activity in the last seven days.
71-
- **Programming Commands**: Presents a list of devices that sent programming commands within the last 24 hours.
72-
- **Remote Access**: Presents a list of devices that remote sources accessed within the last 24 hours.
73+
| Information | Description |
74+
|---------|---------|
75+
| **Active Devices (Last 24 Hours)** | Presents a list of devices that show network activity within a period of 24 hours. |
76+
| **Non-Active Devices (Last 7 Days)** | Presents a list of devices that show no network activity in the last seven days. |
77+
| **Programming Commands** | Presents a list of devices that sent programming commands within the last 24 hours. |
78+
| **Remote Access** | Presents a list of devices that remote sources accessed within the last 24 hours. |
7379

7480
When you choose the sensor from the on-premises management console, all the custom reports configured on that sensor appear in the list of reports. For each sensor, you can generate a default report or a custom report configured on that sensor.
7581

76-
To generate a report:
82+
**To generate a report**:
7783

7884
1. On the left pane, select **Reports**. The **Reports** window appears.
7985

articles/defender-for-iot/organizations/how-to-create-trends-and-statistics-reports.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,17 @@ ms.topic: how-to
77

88
# Create trends and statistics dashboards
99

10-
This article describes how to create dashboards on your sensor console to get insight into network trends and statistics.
10+
Dashboards on your sensor console provide insight into network trends and statistics.
1111

12+
## Prerequisites
1213

13-
## Before you start
14-
15-
You need Administrator or Security Analyst permissions to create dashboards.
14+
You must be an **Administrator** or **Security Analyst** user to create dashboards.
1615

1716
## Create dashboards
1817

19-
You can create many different types of dashboard. Based on traffic, device state, alerts, connectivity, and protocol.
18+
You can create many different types of dashboards, based on traffic, device state, alerts, connectivity, and protocol.
19+
20+
**To create a dashboard**:
2021

2122
1. On your Defender for IoT sensor console, select **Trends & Statistics** > **Create Dashboard**.
2223

0 commit comments

Comments
 (0)