Skip to content

Commit bbd7069

Browse files
authored
Merge pull request #199908 from v-dmankowitz/trends
Trends
2 parents 02c52ee + 2a445f4 commit bbd7069

File tree

5 files changed

+11
-11
lines changed

5 files changed

+11
-11
lines changed

articles/defender-for-iot/organizations/how-to-create-trends-and-statistics-reports.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Protocol dissection | Displays a pie chart that provides you with a look at the
5050
Active TCP connections | Displays a chart that shows the number of active TCP connections in the system.
5151
Incident by type | Displays a pie chart that shows the number of incidents by type. This is the number of alerts generated by each engine over a predefined time period.
5252
Devices by vendor | Displays a pie chart that shows the number of devices by vendor. The number of devices for a specific vendor is proportional to the size of that device’s vendor part of the disk relative to other device vendors.
53-
Number of devices per VLAN | Displays a pie chart that shows the number of discovered devices per VLAN. The size of each slice of the pie is proportional to the number of discovered devices relative to the other slices. Each VLAN appears with the VLAN tag assigned by the sensor or name that you have manually added.
53+
Number of devices per VLAN | Displays a pie chart that shows the number of discovered devices per VLAN. The size of each slice of the pie is proportional to the number of discovered devices relative to the other slices. Each VLAN appears with the VLAN tag assigned by the sensor or name that you've manually added.
5454
Top bandwidth by VLAN | Displays the bandwidth consumption by VLAN. By default, the widget shows five VLANs with the highest bandwidth usage. You can filter the data by the period presented in the widget. Select the down arrow to show more results.
5555

5656

articles/defender-for-iot/organizations/how-to-install-software.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ This procedure describes how to add a secondary NIC if you've already installed
185185

186186
### Find your port
187187

188-
If you are having trouble locating the physical port on your device, you can use the following command to find your port:
188+
If you're having trouble locating the physical port on your device, you can use the following command to find your port:
189189
190190
```bash
191191
sudo ethtool -p <port value> <time-in-seconds>

articles/defender-for-iot/organizations/how-to-manage-subscriptions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,15 @@ ms.topic: how-to
99

1010
Your Defender for IoT deployment is managed through your Microsoft Defender for IoT account subscriptions. You can onboard, edit, and offboard your subscriptions to Defender for IoT in the [Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started).
1111

12-
For each subscription, you will be asked to define a number of *committed devices*. Committed devices are the approximate number of devices that will be monitored in your enterprise.
12+
For each subscription, you'll be asked to define a number of *committed devices*. Committed devices are the approximate number of devices that will be monitored in your enterprise.
1313

1414
> [!NOTE]
1515
> If you've come to this page because you are a [former CyberX customer](https://blogs.microsoft.com/blog/2020/06/22/microsoft-acquires-cyberx-to-accelerate-and-secure-customers-iot-deployments) and have questions about your account, reach out to your account manager for guidance.
1616
1717

1818
## Subscription billing
1919

20-
You are billed based on the number of committed devices associated with each subscription.
20+
You're billed based on the number of committed devices associated with each subscription.
2121

2222
The billing cycle for Microsoft Defender for IoT follows a calendar month. Changes you make to committed devices during the month are implemented one hour after confirming your update, and are reflected in your monthly bill. Subscription *offboarding* also takes effect one hour after confirming the offboard.
2323

@@ -76,11 +76,11 @@ This section describes how to onboard a subscription.
7676

7777
1. Select **Subscribe**.
7878
1. Confirm your subscription.
79-
1. If you have not done so already, onboard a sensor or Set up a sensor.
79+
1. If you haven't done so already, onboard a sensor or Set up a sensor.
8080

8181
## Update committed devices in a subscription
8282

83-
You may need to update your subscription with more committed devices, or more fewer committed devices. More devices may require monitoring if, for example, you are increasing existing site coverage, discovered more devices than expected or there are network changes such as adding switches.
83+
You may need to update your subscription with more committed devices, or fewer committed devices. More devices may require monitoring if, for example, you are increasing existing site coverage, discovered more devices than expected or there are network changes such as adding switches.
8484

8585
**To update a subscription:**
8686
1. Go to [Defender for IoT: Getting started](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started) in the Azure portal.

articles/defender-for-iot/organizations/how-to-manage-the-alert-event.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -209,8 +209,8 @@ Users working with alerts on the Defender for IoT portal on Azure should underst
209209
Parameter | Description
210210
|--|--|
211211
| **Alert Exclusion rules**| Alert *Exclusion rules* defined in the on-premises management console impact the alerts triggered by managed sensors. As a result, the alerts excluded by these rules also won't be displayed in the Alerts page on the portal. For more information, see [Create alert exclusion rules](how-to-work-with-alerts-on-premises-management-console.md#create-alert-exclusion-rules).
212-
| **Managing alerts on your sensor** | If you change the status of an alert, or learn or mute an alert on a sensor, the changes are not updated in the Defender for IoT Alerts page on the portal. This means that this alert will stay open on the portal. However another alert won't be triggered from sensor for this activity.
213-
| **Managing alerts in the portal Alerts page** | Changing the status of an alert on the Azure portal, Alerts page or changing the alert severity on the portal, does not impact the alert status or severity in on-premises sensors.
212+
| **Managing alerts on your sensor** | If you change the status of an alert, or learn or mute an alert on a sensor, the changes are not updated in the Defender for IoT Alerts page on the portal. This means that this alert will stay open on the portal. However another alert won't be triggered from the sensor for this activity.
213+
| **Managing alerts in the portal Alerts page** | Changing the status of an alert on the Azure portal, Alerts page or changing the alert severity on the portal, doesn't impact the alert status or severity in on-premises sensors.
214214

215215
## Next steps
216216

articles/defender-for-iot/organizations/how-to-set-up-snmp-mib-monitoring.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Set up SNMP MIB monitoring
33
description: You can perform sensor health monitoring by using SNMP. The sensor responds to SNMP queries sent from an authorized monitoring server.
4-
ms.date: 01/31/2022
4+
ms.date: 05/31/2022
55
ms.topic: how-to
66
---
77

@@ -35,7 +35,7 @@ Note that:
3535

3636
## Prerequisites for AES and 3-DES Encryption Support for SNMP Version 3
3737
- The network management station (NMS) must support Simple Network Management Protocol (SNMP) Version 3 to be able to use this feature.
38-
- It is important to understand the SNMP architecture and the terminology of the architecture to understand the security model used and how the security model interacts with the other subsystems in the architecture.
38+
- It's important to understand the SNMP architecture and the terminology of the architecture to understand the security model used and how the security model interacts with the other subsystems in the architecture.
3939
- Before you begin configuring SNMP monitoring, you need to open the port UDP 161 in the firewall.
4040

4141

@@ -50,7 +50,7 @@ Note that:
5050

5151
| Parameter | Description |
5252
|--|--|
53-
| **Username** | The SNMP username can contain up to 32 characters and include any combination of alphanumeric characters (uppercase letters, lowercase letters, and numbers). Spaces are not allowed. <br /> <br />The username for the SNMP v3 authentication must be configured on the system and on the SNMP server. |
53+
| **Username** | The SNMP username can contain up to 32 characters and include any combination of alphanumeric characters (uppercase letters, lowercase letters, and numbers). Spaces aren't allowed. <br /> <br />The username for the SNMP v3 authentication must be configured on the system and on the SNMP server. |
5454
| **Password** | Enter a case-sensitive authentication password. The authentication password can contain 8 to 12 characters and include any combination of alphanumeric characters (uppercase letters, lowercase letters, and numbers). <br /> <br/>The username for the SNMP v3 authentication must be configured on the system and on the SNMP server. |
5555
| **Auth Type** | Select MD5 or SHA-1. |
5656
| **Encryption** | Select DES (56 bit key size)<sup>[1](#1)</sup> or AES (AES 128 bits supported)<sup>[2](#2)</sup>. |

0 commit comments

Comments
 (0)