Skip to content

Commit bb3223e

Browse files
authored
Update how-to-accelerate-alert-incident-response.md
Add details about the subnet condition for the suppressions rules feature
1 parent f77a2d9 commit bb3223e

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,7 @@ This section describes how to create an alert suppression rule on the Azure port
8080
1. In the **Alert name** dropdown list, select one or more alerts for your rule. Selecting the name of an alert engine instead of a specific rule name applies the rule to all existing and future alerts associated with that engine.
8181

8282
1. Optionally filter your rule further by defining additional conditions, such as for traffic coming from specific sources, to specific destinations, or on specific subnets.
83+
When specifying subnets as conditions, note that it refer to both the source and destination devices.
8384

8485
1. When you're finished configuring your rule conditions, select **Next**.
8586

0 commit comments

Comments
 (0)