You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-analyze-programming-details-changes.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,21 +30,7 @@ To perform the procedures in this article, make sure that you have:
30
30
31
31
## Access programming data
32
32
33
-
The **Programming Timeline** tab can be accessed from unauthorized programming alerts, and the **Device map**, **Device inventory**, and **Event timeline** pages in the sensor console.
34
-
35
-
### Access programming data from an alert
36
-
37
-
Unauthorized programming alerts are triggered when unauthorized programming devices carry out programming activities.
38
-
39
-
**To access the programming timeline from an alert**:
40
-
41
-
1. Sign into the sensor console and go to **Alerts**.
42
-
43
-
1. Filter the alerts to find the alert you want to analyze.
44
-
45
-
1. Select the alert to open the alert details pane on the right.
46
-
47
-
1. Select **Programming** to open the **Programming timeline**.
33
+
The **Programming Timeline** tab can be accessed from unauthorized programming alerts, the **Device map**, the **Device inventory**, and the **Event timeline** in the sensor console.
48
34
49
35
### Access programming data from the device map
50
36
@@ -72,15 +58,29 @@ Unauthorized programming alerts are triggered when unauthorized programming devi
72
58
73
59
:::image type="content" source="media/analyze-programming/programming-timeline-window-device-inventory.png" alt-text="Screenshot of programming timeline tab on device details page." lightbox="media/analyze-programming/programming-timeline-window-device-inventory.png":::
74
60
75
-
### Access programming data from an event timeline
61
+
### Access programming data from an alert
62
+
63
+
Unauthorized programming alerts are triggered when unauthorized programming devices carry out programming activities.
64
+
65
+
**To access the programming timeline from an alert**:
66
+
67
+
1. Sign into the sensor console and go to **Alerts**.
68
+
69
+
1. Filter the alerts to find the alert you want to analyze.
70
+
71
+
1. Select the alert to open the alert details pane on the right.
72
+
73
+
1. Select **Programming** to open the **Programming timeline**.
74
+
75
+
### Access programming data from the event timeline
76
76
77
77
Use the event timeline to display a timeline of events in which programming changes were detected.
78
78
79
79
1. Sign into the OT sensor console and select **Event timeline**.
80
80
81
81
1. Filter the event timeline for devices using text based programming protocols, such as **DeltaV**.
82
82
83
-
1. Select the event you want to analyze to open the event details pane on the right, and then select **View programming**.
83
+
1. Select the event you want to analyze to open the event details pane on the right, and then select **Programming timeline**.
0 commit comments