Skip to content

Commit b0f064b

Browse files
committed
edits
1 parent 2100b39 commit b0f064b

File tree

4 files changed

+8
-7
lines changed

4 files changed

+8
-7
lines changed

articles/defender-for-iot/organizations/best-practices/certificate-requirements.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ Use the content below to learn about the requirements for [creating SSL/TLS cert
1616
Defender for IoT uses SSL/TLS certificates to secure communication between the following system components:
1717

1818
- Between users and the OT sensor
19+
- Between an OT sensor and a high availability (HA) server, if configured
1920
- Between OT sensors and partners servers defined in [alert forwarding rules](../how-to-forward-alert-information-to-partners.md)
2021

2122
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors, and will block encrypted communication between Defender for IoT components.

articles/defender-for-iot/organizations/tutorial-cyberark.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,11 +77,11 @@ CyberArk must be configured to allow communication with Defender for IoT. This c
7777

7878
## Enable the integration in Defender for IoT
7979

80-
In order to enable the integration, Syslog Server needs to be enabled in the Defender for IoT on-premises management console. By default, the Syslog Server listens to the IP address of the system using port 514 UDP.
80+
In order to enable the integration, Syslog Server needs to be enabled in the OT sensor. By default, the Syslog Server listens to the IP address of the system using port 514 UDP.
8181

8282
**To configure Defender for IoT**:
8383

84-
1. Sign into your Defender for IoT on-premises management console, then navigate to **System Settings**.
84+
1. Sign into your OT sensor, then navigate to **System Settings**.
8585

8686
1. Toggle the Syslog Server to **On**.
8787

@@ -101,7 +101,7 @@ Whenever the Defender for IoT platform identifies remote sessions that haven't b
101101

102102
**To view alerts**:
103103

104-
1. Sign into your on-premises management console, then select **Alerts**.
104+
1. Sign into your OT sensor, then select **Alerts**.
105105

106106
1. From the list of alerts, select the alert titled **Unauthorized Remote Session**.
107107

@@ -131,7 +131,7 @@ At any point in time, you can stop the integration from communicating.
131131

132132
**To stop the integration**:
133133

134-
1. In the Defender for IoT on-premises management console, navigate to **System Settings**.
134+
1. In the OT sensor, navigate to **System Settings**.
135135

136136
1. Toggle the Syslog Server option to **Off** .
137137

articles/defender-for-iot/organizations/tutorial-fortinet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ The source of suspicious alerts can be blocked in order to prevent further occur
125125

126126
**To block the source of suspicious alerts**:
127127

128-
1. Sign in to the on-premises management console, then select **Alerts**.
128+
1. Sign in to the OT sensor, then select **Alerts**.
129129

130130
1. Select the alert related to Fortinet integration.
131131

articles/defender-for-iot/organizations/tutorial-qradar.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ A **QID** is a QRadar event identifier. Since all Defender for IoT reports are t
6666

6767
## Create QRadar forwarding rules
6868

69-
Create a forwarding rule from your on-premises management console to forward alerts to QRadar.
69+
Create a forwarding rule from your OT sensor to forward alerts to QRadar.
7070

7171
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. The rule doesn't affect any alerts already in the system from before the forwarding rule was created.
7272

@@ -129,7 +129,7 @@ For example:
129129
```
130130

131131
> [!NOTE]
132-
> The forwarding rule you create for QRadar uses the `UUID` API from the on-premises management console. For more information, see [UUID (Manage alerts based on the UUID)](api/management-alert-apis.md#uuid-manage-alerts-based-on-the-uuid).
132+
> The forwarding rule you create for QRadar uses the `UUID` API from the OT sensor. For more information, see [UUID (Manage alerts based on the UUID)](api/management-alert-apis.md#uuid-manage-alerts-based-on-the-uuid).
133133
134134
## Add custom fields to the alerts
135135

0 commit comments

Comments
 (0)