Skip to content

Commit b0fe5fe

Browse files
Merge pull request #229903 from yoninalmsft/patch-25
Update device-inventory.md
2 parents d7f8363 + 305435b commit b0fe5fe

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/defender-for-iot/organizations/device-inventory.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,12 @@ For example:
2323

2424
The Defender for IoT device inventory is available in the Azure portal, OT network sensor consoles, and the on-premises management console.
2525

26-
While you can view device details from any of these locations, each location also offers extra device inventory support. The following table describes the device inventory visible supported for each location and the extra actions available from that location only:
26+
While you can view device details from any of these locations, each location also offers extra device inventory support. The following table describes the device inventory support for each location and the extra actions available from that location only:
2727

2828
|Location |Description | Extra inventory support |
2929
|---------|---------|---------|
3030
|**Azure portal** | Devices detected from all cloud-connected OT sensors and Enterprise IoT sensors. <br><br> | - If you have an [Enterprise IoT plan](eiot-defender-for-endpoint.md) on your Azure subscription, the device inventory also includes devices detected by Microsoft Defender for Endpoint agents. <br><br>- If you also use [Microsoft Sentinel](iot-solution.md), incidents in Microsoft Sentinel are linked to related devices in Defender for IoT. <br><br>- Use Defender for IoT [workbooks](workbooks.md) for visibility into all cloud-connected device inventory, including related alerts and vulnerabilities. |
31-
|**OT network sensor consoles** | Devices detected by that OT sensor | - View all detected devices across a network device map<br>- View related events on the **Event timeline** |
31+
|**OT network sensor consoles** | Devices detected by that OT sensor | - View all detected devices across a network device map<br><br>- View related events on the **Event timeline** |
3232
|**An on-premises management console** | Devices detected across all connected OT sensors | Enhance device data by importing data manually or via script |
3333

3434
For more information, see:
@@ -51,7 +51,7 @@ Defender for IoT's device inventory supports device types across a variety of in
5151
|Devices |For example ... |
5252
|---------|---------|
5353
|**Manufacturing**| Industrial and operational devices, such as pneumatic devices, packaging systems, industrial packaging systems, industrial robots |
54-
|**Building** | Access panels, surveillance devices, HVAC systems, elevators , smart lighting systems |
54+
|**Building** | Access panels, surveillance devices, HVAC systems, elevators, smart lighting systems |
5555
|**Health care** | Glucose meters, monitors |
5656
|**Transportation / Utilities** | Turnstiles, people counters, motion sensors, fire and safety systems, intercoms |
5757
|**Energy and resources** | DCS controllers, PLCs, historian devices, HMIs |
@@ -70,7 +70,7 @@ When you're first working with Defender for IoT, during the learning period just
7070

7171
After the learning period is over, any new devices detected are considered to be *unauthorized* and *new* devices. We recommend checking these devices carefully for risks and vulnerabilities. For example, in the Azure portal, filter the device inventory for `Authorization == **Unauthorized**`. On the device details page, drill down and check for related vulnerabilities, alerts, and recommendations.
7272

73-
The *new* status is removed as soon as you edit any of the device details move the device on an OT sensor device map. In contrast, the *unauthorized* label remains until you manually edit the device details and mark it as *authorized*.
73+
The *new* status is removed as soon as you edit any of the device details or move the device on an OT sensor device map. In contrast, the *unauthorized* label remains until you manually edit the device details and mark it as *authorized*.
7474

7575
On an OT sensor, unauthorized devices are also included in the following reports:
7676

@@ -84,7 +84,7 @@ Mark OT devices as *important* to highlight them for extra tracking. On an OT se
8484

8585
- [Attack vector reports](how-to-create-attack-vector-reports.md): Devices marked as *important* are included in an attack vector simulation as possible attack targets.
8686

87-
- [Risk assessment reports](how-to-create-risk-assessment-reports.md): Devices marked as *important* are counted in risk assessment reports when calculating security scores
87+
- [Risk assessment reports](how-to-create-risk-assessment-reports.md): Devices marked as *important* are counted in risk assessment reports when calculating security scores.
8888

8989
## Device inventory column data
9090

@@ -97,7 +97,7 @@ The following table lists the columns available in the Defender for IoT device i
9797
| **Class** | Editable. The device's class. <br>Default: `IoT` |
9898
|**Data source** | The source of the data, such as a micro agent, OT sensor, or Microsoft Defender for Endpoint. <br>Default: `MicroAgent`|
9999
|**Description** * | Editable. The device's description. |
100-
| **Device Id** | The device's Azure-assigned ID number|
100+
| **Device Id** | The device's Azure-assigned ID number. |
101101
| **Firmware model** | The device's firmware model.|
102102
| **Firmware vendor** | Editable. The vendor of the device's firmware. |
103103
| **Firmware version** * |Editable. The device's firmware version. |

0 commit comments

Comments
 (0)