Skip to content

Commit 8db2dc3

Browse files
authored
Merge pull request #199811 from v-dmankowitz/swivel
grammar
2 parents eae37b5 + 7a40719 commit 8db2dc3

7 files changed

+15
-15
lines changed

articles/defender-for-iot/organizations/how-to-analyze-programming-details-changes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,9 +80,9 @@ This section describes how to view programming files and compare versions. Searc
8080
|Programming timeline type | Description |
8181
|--|--|
8282
| Programmed Device | Provides details about the device that was programmed, including the hostname and file. |
83-
| Recent Events | Displays the 50 most recent events detected by the sensor. <br />To highlight an event, hover over it and click the star. :::image type="icon" source="media/how-to-work-with-maps/star.png" border="false"::: <br /> The last 50 events can be viewed. |
83+
| Recent Events | Displays the 50 most recent events detected by the sensor. <br />To highlight an event, hover over it and select the star. :::image type="icon" source="media/how-to-work-with-maps/star.png" border="false"::: <br /> The last 50 events can be viewed. |
8484
| Files | Displays the files detected for the chosen date and the file size on the programmed device. <br /> By default, the maximum number of files available for display per device is 300. <br /> By default, the maximum file size for each file is 15 MB. |
85-
| File status :::image type="icon" source="media/how-to-work-with-maps/status-v2.png" border="false"::: | File labels indicate the status of the file on the device, including: <br /> **Added**: the file was added to the endpoint on the date or time selected. <br /> **Updated**: The file was updated on the date or time selected. <br /> **Deleted**: This file was removed. <br /> **No label**: The file was not changed. |
85+
| File status :::image type="icon" source="media/how-to-work-with-maps/status-v2.png" border="false"::: | File labels indicate the status of the file on the device, including: <br /> **Added**: the file was added to the endpoint on the date or time selected. <br /> **Updated**: The file was updated on the date or time selected. <br /> **Deleted**: This file was removed. <br /> **No label**: The file wasn't changed. |
8686
| Programming Device | The device that made the programming change. Multiple devices may have carried out programming changes on one programmed device. The hostname, date, or time of change and logged in user are displayed. |
8787
| :::image type="icon" source="media/how-to-work-with-maps/current.png" border="false"::: | Displays the current file installed on the programmed device. |
8888
| :::image type="icon" source="media/how-to-work-with-maps/download-text.png" border="false"::: | Download a text file of the code displayed. |

articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ ms.topic: how-to
77

88
# Run data mining queries
99

10-
Using data mining queries to get dynamic, granular information about your network devices, including for specific time periods, internet connectivity, ports and protocols, firmware vrsions, programming commands, and device state. You can use data mining queries for:
10+
Using data mining queries to get dynamic, granular information about your network devices, including for specific time periods, internet connectivity, ports and protocols, firmware versions, programming commands, and device state. You can use data mining queries for:
1111

1212
- **SOC incident response**: Generate a report in real time to help deal with immediate incident response. For example, Data Mining can generate a report for a list of devices that might require patching.
1313
- **Forensics**: Generate a report based on historical data for investigative reports.
1414
- **Network security**: Generate a report that helps improve overall network security. For example, generate a report can be generated that lists devices with weak authentication credentials.
1515
- **Visibility**: Generate a report that covers all query items to view all baseline parameters of your network.
16-
- **PLC security** Improve security by detecting PLCs in unsecure states for example Program and Remote states.
16+
- **PLC security** Improve security by detecting PLCs in unsecure states, for example, Program and Remote states.
1717

1818
Data mining information is saved and stored continuously, except for when a device is deleted. Data mining results can be exported and stored externally to a secure server. In addition, the sensor performs automatic daily backups to ensure system continuity and preservation of data.
1919

@@ -26,7 +26,7 @@ The following predefined reports are available. These queries are generated in r
2626
- **Internet activity**: Devices that are connected to the internet.
2727
- **CVEs**: A list of devices detected with known vulnerabilities, along with CVSSv2 risk scores.
2828
- **Excluded CVEs**: A list of all the CVEs that were manually excluded. It is possible to customize the CVE list manually so that the VA reports and attack vectors more accurately reflect your network by excluding or including particular CVEs and updating the CVSSv2 score accordingly.
29-
- **Nonactive devices**: Devices that have not communicated for the past seven days.
29+
- **Nonactive devices**: Devices that haven't communicated for the past seven days.
3030
- **Active devices**: Active network devices within the last 24 hours.
3131

3232
Find these reports in **Analyze** > **Data Mining**. Reports are available for users with Administrator and Security Analyst permissions. Read only users can't access these reports.

articles/defender-for-iot/organizations/how-to-gain-insight-into-global-regional-and-local-threats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99

1010
The site map in the on-premises management console helps you achieve full security coverage by dividing your network into geographical and logical segments that reflect your business topology:
1111

12-
- **Geographical facility level**: A site reflects a number of devices grouped according to a geographical location presented on the map. By default, Microsoft Defender for IoT provides you with a world map. You update the map to reflect your organizational or business structure. For example, use a map that reflects sites across a specific country, city, or industrial campus. When the site color changes on the map, it provides the SOC team with an indication of critical system status in the facility.
12+
- **Geographical facility level**: A site reflects many devices grouped according to a geographical location presented on the map. By default, Microsoft Defender for IoT provides you with a world map. You update the map to reflect your organizational or business structure. For example, use a map that reflects sites across a specific country, city, or industrial campus. When the site color changes on the map, it provides the SOC team with an indication of critical system status in the facility.
1313

1414
The map is interactive and enables opening each site and delving into this site's information.
1515

articles/defender-for-iot/organizations/how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,13 @@ The following table describes the table columns in the device inventory.
3131
| **MAC Address** | The MAC address of the device. |
3232
| **Protocols** | The protocols that the device uses. |
3333
| **Unacknowledged Alerts** | The number of unhandled alerts associated with this device. |
34-
| **Is Authorized** | The authorization status of the device:<br />- **True**: The device has been authorized.<br />- **False**: The device has not been authorized. |
34+
| **Is Authorized** | The authorization status of the device:<br />- **True**: The device has been authorized.<br />- **False**: The device hasn't been authorized. |
3535
| **Is Known as Scanner** | Whether this device performs scanning-like activities in the network. |
36-
| **Is Programming Device** | Whether this is a programming device:<br />- **True**: The device performs programming activities for PLCs, RTUs, and controllers, which are relevant to engineering stations.<br />- **False**: The device is not a programming device. |
36+
| **Is Programming Device** | Whether this is a programming device:<br />- **True**: The device performs programming activities for PLCs, RTUs, and controllers, which are relevant to engineering stations.<br />- **False**: The device isn't a programming device. |
3737
| **Groups** | Groups in which this device participates. |
3838
| **Last Activity** | The last activity that the device performed. |
3939
| **Discovered** | When this device was first seen in the network. |
40-
| **PLC mode (preview)** | The PLC operating mode includes the Key state (physical) and run state (logical). Possible **Key** states include, Run, Program, Remote, Stop, Invalid, Programming Disabled.Possible Run. The possible **Run** states are Run, Program, Stop, Paused, Exception, Halted, Trapped, Idle, Offline. if both states are the same, only oe state is presented. |
40+
| **PLC mode (preview)** | The PLC operating mode includes the Key state (physical) and run state (logical). Possible **Key** states include, Run, Program, Remote, Stop, Invalid, Programming Disabled.Possible Run. The possible **Run** states are Run, Program, Stop, Paused, Exception, Halted, Trapped, Idle, Offline. if both states are the same, only one state is presented. |
4141

4242
## What is an Inventory device?
4343

articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ You can continue to work with Defender for IoT features even if the activation f
2727

2828
### About activation files for cloud-connected sensors
2929

30-
Sensors that are cloud connected are not limited by time periods for their activation file. The activation file for cloud-connected sensors is used to ensure the connection to Defender for IoT.
30+
Sensors that are cloud connected aren't limited by time periods for their activation file. The activation file for cloud-connected sensors is used to ensure the connection to Defender for IoT.
3131

3232
### Upload new activation files
3333

@@ -65,9 +65,9 @@ You might need to upload a new activation file for an onboarded sensor when:
6565

6666
### Troubleshoot activation file upload
6767

68-
You'll receive an error message if the activation file could not be uploaded. The following events might have occurred:
68+
You'll receive an error message if the activation file couldn't be uploaded. The following events might have occurred:
6969

70-
- **For locally connected sensors**: The activation file is not valid. If the file is not valid, go to [Defender for IoT in the Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started). On the **Sensor Management** page, select the sensor with the invalid file, and download a new activation file.
70+
- **For locally connected sensors**: The activation file isn't valid. If the file isn't valid, go to [Defender for IoT in the Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started). On the **Sensor Management** page, select the sensor with the invalid file, and download a new activation file.
7171

7272
- **For cloud-connected sensors**: The sensor can't connect to the internet. Check the sensor's network configuration. If your sensor needs to connect through a web proxy to access the internet, verify that your proxy server is configured correctly on the **Sensor Network Configuration** screen. Verify that \*.azure-devices.net:443 is allowed in the firewall and/or proxy. If wildcards are not supported or you want more control, the FQDN for your specific endpoint (either a sensor, or for legacy connections, an IoT hub) should be opened in your firewall and/or proxy. For more information, see [Reference - IoT Hub endpoints](../../iot-hub/iot-hub-devguide-endpoints.md).
7373

articles/defender-for-iot/organizations/how-to-view-information-per-zone.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The following tools are available for viewing devices and device information fro
5151

5252
To view alerts associated with a specific zone:
5353

54-
- Select the alert icon form the **Zone** window.
54+
- Select the alert icon from the **Zone** window.
5555

5656
:::image type="content" source="media/how-to-work-with-asset-inventory-information/business-unit-view-v2.png" alt-text="The default Business Unit view with examples.":::
5757

@@ -77,7 +77,7 @@ The following additional zone information is available:
7777

7878
- **Connectivity status**: If a sensor is disconnected, connect from the sensor. See [Connect sensors to the on-premises management console](how-to-activate-and-set-up-your-on-premises-management-console.md#connect-sensors-to-the-on-premises-management-console).
7979

80-
- **Update progress**: If the connected sensor is being upgraded, upgrade statuses will appear. During upgrade, the on-premises management console does not receive device information from the sensor.
80+
- **Update progress**: If the connected sensor is being upgraded, upgrade statuses will appear. During upgrade, the on-premises management console doesn't receive device information from the sensor.
8181

8282
## Next steps
8383

articles/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ This option is available for both *cloud connected* and *locally managed* sensor
102102

103103
## Review package update status on the sensor ##
104104

105-
The package update status and version information is displayed in the sensor **System Settings**, **Threat Intelligence** section.
105+
The package update status and version information are displayed in the sensor **System Settings**, **Threat Intelligence** section.
106106

107107
## Review package information for cloud connected sensors ##
108108

0 commit comments

Comments
 (0)