Skip to content

Commit ac8e4b8

Browse files
committed
sample methods text
1 parent 17d34d5 commit ac8e4b8

File tree

1 file changed

+3
-9
lines changed

1 file changed

+3
-9
lines changed

articles/defender-for-iot/organizations/best-practices/sample-connectivity-models.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,22 +17,16 @@ The following diagram shows an example of a ring network topology, in which each
1717

1818
## Sample: Linear bus and star topology
1919

20-
In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. In the following example, lower switches aren't monitored, and traffic that remains local to these switches won't be seen. Devices might be identified based on ARP messages, but connection information will be missing.
20+
In a star network such as the one shown in the diagram below, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. In the following example, lower switches aren't monitored, and traffic that remains local to these switches won't be seen. Devices might be identified based on ARP messages, but connection information will be missing.
2121

2222
:::image type="content" source="../media/how-to-set-up-your-network/linear-bus-star-topology.png" alt-text="Diagram of the linear bus and star topology." border="false" lightbox="../media/how-to-set-up-your-network/linear-bus-star-topology.png":::
2323

2424
## Sample: Multi-layer, multi-tenant network
2525

26-
The following diagram is a general abstraction of a multilayer, multitenant network, with an expansive cybersecurity ecosystem typically operated by an SOC and MSSP.
27-
28-
Typically, NTA sensors are deployed in layers 0 to 3 of the OSI model.
26+
The following diagram is a general abstraction of a multilayer, multi-tenant network, with an expansive cybersecurity ecosystem typically operated by an security operations center (SOC) and managed security service provider (MSSP). Defender for IoT sensors are typically deployed in layers 0 to 3 of the OSI model.
2927

3028
:::image type="content" source="../media/how-to-set-up-your-network/osi-model.png" alt-text="Diagram of the OSI model." lightbox="../media/how-to-set-up-your-network/osi-model.png" border="false":::
3129

3230
## Next steps
3331

34-
After you've [understood your own network's OT architecture](understand-network-architecture.md) and [planned out your deployment](plan-network-monitoring.md), learn more about methods for traffic mirroring and passive or active monitoring.
35-
36-
For more information, see:
37-
38-
- [Traffic mirroring methods for OT monitoring](traffic-mirroring-methods.md)
32+
For more information, see [Traffic mirroring methods for OT monitoring](traffic-mirroring-methods.md).

0 commit comments

Comments
 (0)