Skip to content

Commit 8bfe999

Browse files
Merge pull request #219968 from batamig/acrolinx
acrolinx
2 parents bcc6ab5 + 24e85d8 commit 8bfe999

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/defender-for-iot/organizations/manage-users-on-premises-management-console.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This procedure describes how to create new users for an on-premises management c
3939
|**Last Name** | Enter the user's last name. |
4040
|**Role** | Select a user role. For more information, see [On-premises user roles](roles-on-premises.md#on-premises-user-roles). |
4141
|**Remote Sites Access Group** | Available for the on-premises management console only. <br><br> Select either **All** to assign the user to all global access groups, or **Specific** to assign them to a specific group only, and then select the group from the drop-down list. <br><br>For more information, see [Define global access permission for on-premises users](#define-global-access-permission-for-on-premises-users). |
42-
|**Password** | Select the user type, either **Local** or **Active Directory User**. <br><br>For local users, enter a password for the user. Password requirements include: <br>- At least eight characters<br>- Both lowercase and uppercase alphabetic characters<br>- At least one numbers<br>- At least one symbol|
42+
|**Password** | Select the user type, either **Local** or **Active Directory User**. <br><br>For local users, enter a password for the user. Password requirements include: <br>- At least eight characters<br>- Both lowercase and uppercase alphabetic characters<br>- At least one number<br>- At least one symbol|
4343

4444
> [!TIP]
4545
> Integrating with Active Directory lets you associate groups of users with specific permission levels. If you want to create users using Active Directory, first configure [Active Directory on the on-premises management console](#integrate-users-with-active-directory) and then return to this procedure.
@@ -107,7 +107,7 @@ This procedure describes how to recover either the *cyberx* or *support* user pa
107107
>
108108
> Return to Azure, and select the settings icon in the top toolbar. On the **Directories + subscriptions** page, make sure that you've selected the subscription where your sensors were onboarded to Defender for IoT. Then repeat the steps in Azure to download the **password_recovery.zip** file and upload it on the on-premises management console again.
109109
110-
1. Select **Next**. A system-generated password for your on-premises management console appears for you to use for the selected user. Make sure to write the password down as it won't be shown again.
110+
1. Select **Next**. A system-generated password for your on-premises management console appears for you to use for the selected user. Make sure to write down the password as it won't be shown again.
111111

112112
1. Select **Next** again to sign into your on-premises management console.
113113

@@ -219,7 +219,7 @@ Before you create access groups, we also recommend that you:
219219

220220
If you later modify a topology entity and the change affects the rule logic, the rule is automatically deleted.
221221

222-
If modifications to topology entities affect rule logic so that all rules are deleted, the access group remains but users won't be able to sign in to the on-premises management console. Instead, users are notified to contact their on-premises management console administrator for help signing in. [Update the settings](#add-new-on-premises-management-console-users) for these users so that they're no longer part of the legacy access group.
222+
If modifications to topology entities affect rule logic so that all rules are deleted, the access group remains but users won't be able to sign in to the on-premises management console. Instead, users are notified to contact their on-premises management console administrator for help with signing in. [Update the settings](#add-new-on-premises-management-console-users) for these users so that they're no longer part of the legacy access group.
223223

224224
## Control user session timeouts
225225

articles/defender-for-iot/organizations/manage-users-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Microsoft Defender for IoT provides tools both in the Azure portal and on-premis
1111

1212
## Azure users for Defender for IoT
1313

14-
In the Azure portal, user are managed at the subscription level with [Azure Active Directory](/azure/active-directory/) and [Azure role-based access control (RBAC)](/azure/role-based-access-control/overview). Azure subscription users can have one or more user roles, which determine the data and actions they can access from the Azure portal, including in Defender for IoT.
14+
In the Azure portal, users are managed at the subscription level with [Azure Active Directory](/azure/active-directory/) and [Azure role-based access control (RBAC)](/azure/role-based-access-control/overview). Azure subscription users can have one or more user roles, which determine the data and actions they can access from the Azure portal, including in Defender for IoT.
1515

1616
Use the [portal](/azure/role-based-access-control/quickstart-assign-role-user-portal) or [PowerShell](/azure/role-based-access-control/tutorial-role-assignments-group-powershell) to assign your Azure subscription users with the specific roles they'll need to view data and take action, such as whether they'll be viewing alert or device data, or managing pricing plans and sensors.
1717

@@ -21,7 +21,7 @@ For more information, see [Azure user roles for OT and Enterprise IoT monitoring
2121

2222
When working with OT networks, Defender for IoT services and data is available also from on-premises OT network sensors and the on-premises sensor management console, in addition to the Azure portal.
2323

24-
You'll need to define on-premises users on both your OT network sensors and the on-premises management console, in addition to Azure. Both the OT sensors and the on-premises management console are installed with a set of default, privileged users, which you can use to define additional administrators and other users.
24+
You'll need to define on-premises users on both your OT network sensors and the on-premises management console, in addition to Azure. Both the OT sensors and the on-premises management console are installed with a set of default, privileged users, which you can use to define other administrators and users.
2525

2626
Sign into the OT sensors to [define sensor users](manage-users-sensor.md), and sign into the on-premises management console to [define on-premises management console users](manage-users-on-premises-management-console.md).
2727

articles/defender-for-iot/organizations/manage-users-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Microsoft Defender for IoT provides tools both in the Azure portal and on-premis
1111

1212
In the Azure portal, user management is managed at the *subscription* level with [Azure Active Directory](/azure/active-directory/) and [Azure role-based access control (RBAC)](/azure/role-based-access-control/overview). Assign Azure Active Directory users with Azure roles at the subscription level so that they can add or update Defender for IoT pricing plans and access device data, manage sensors, and access device data across Defender for IoT.
1313

14-
For OT network monitoring, Defender for IoT has the additional *site* level, which you can use to add granularity to your user management. For example, assign roles at the site level to apply different permissions for the same users across different sites.
14+
For OT network monitoring, Defender for IoT has the extra *site* level, which you can use to add granularity to your user management. For example, assign roles at the site level to apply different permissions for the same users across different sites.
1515

1616
> [!NOTE]
1717
> Site-based access control is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -33,7 +33,7 @@ Define user roles per site to add a level of granularity and apply different use
3333
- View current role assignments on the site, including role assignments that have been denied specific actions on the site
3434
- View a full list of roles available for the site
3535

36-
Sites and site-based access control is relevant only for OT monitoring sites, and is not supported for default sites or Enterprise IoT monitoring.
36+
Sites and site-based access control is relevant only for OT monitoring sites, and isn't supported for default sites or Enterprise IoT monitoring.
3737

3838
**To manage site-based access control**:
3939

0 commit comments

Comments
 (0)