Skip to content

Commit d1f2e41

Browse files
committed
pre-review feedback
1 parent 19dc2bf commit d1f2e41

7 files changed

+29
-60
lines changed

articles/defender-for-iot/organizations/alert-engine-messages.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,6 @@ ms.topic: how-to
99

1010
This article provides information on the alert types, descriptions, and severity that may be generated from the Defender for IoT engines. This information can be used to help map alerts into playbooks, define Forwarding rules, Exclusion rules, and custom alerts and define the appropriate rules within a SIEM. Alerts appear in the Alerts window, which allows you to manage the alert event.
1111

12-
> [!NOTE]
13-
> This article contains references to the term *slave*, a term that Microsoft no longer uses. When the term is removed from the software, it will be removed from this article.
14-
1512
### Alert news
1613

1714
New alerts may be added and existing alerts may be updated or disabled. Certain disabled alerts can be re-enabled from the Support page of the sensor console. Alerts tht can be re-enabled are marked with an asterisk (*) in the tables below.

articles/defender-for-iot/organizations/how-to-configure-windows-endpoint-monitoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Before you begin scanning, create a firewall rule that allows outgoing traffic f
2424

2525
1. In Defender for Cloud select **System Settings**.
2626
1. Under **Network monitoring**, select **Windows Endpoint Monitoring (WMI)**
27-
1. In the **Windows Endpoing Monitoring (WMI) dialog, select **Add ranges**. You can also import and export ranges.
27+
1. In the **Windows Endpoint Monitoring (WMI) dialog, select **Add ranges**. You can also import and export ranges.
2828
1. Specify the IP address range you want to scan. You can add multiple ranges.
2929
1. Add your user name and password, and ensure that **Enable** is toggled on.
3030
1. In **Scan will run**, specify when you want the automatic scan to run. You can set an hourly interval between scans, or a specific scan time.

articles/defender-for-iot/organizations/how-to-create-trends-and-statistics-reports.md

Lines changed: 18 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -7,67 +7,39 @@ ms.topic: how-to
77

88
# Create trends and statistics dashboards
99

10-
You can create dashboards to get insight into network trends and statistics.
11-
12-
## Dashboards
13-
14-
Dashboard | Details
15-
--- | ---
16-
Channels Bandwidth |
17-
Traffic by Port
18-
Top Traffic by Port
19-
Total Bandwidth
20-
New devices
21-
Modbus Traffic by Function
22-
SRTP Traffic by Service Code
23-
SRTP Erros By Day
24-
DNP3 Traffic By Function
25-
Busy Devices
26-
S7 Traffic by Control Function
27-
S7 Traffic by Sub-Function
28-
OPC-UA Traffic By Service
29-
Active TCP Connections
30-
Incidents By Type
31-
MMS Traffic By Service
32-
IEC-60870 Traffic By ASDU
33-
Devices By Vendor
34-
Devices By OT Protocols
35-
EtherNet/IP Traffic By CIP Service
36-
EtherNet/IP Traffic By CIP Class
37-
EtherNet/IP Traffic By Command
38-
Disconnected Devices
39-
Devices By Operating System
40-
Database Tables Access
41-
42-
10+
This article describes how to create dashboards on your sensor console to get insight into network trends and statistics.
4311

4412

4513
## Before you start
4614

4715
You need Administrator or Security Analyst permissions to create dashboards.
4816

49-
T
17+
## Create dashboards
5018

51-
> [!NOTE]
52-
> The time in the widgets is set according to the sensor time.
19+
You can create many different types of dashboard. Based on traffic, device state, alerts, connectivity, and protocol.
5320

54-
## Create dashboards
21+
1. On your Defender for IoT sensor console, select **Trends & Statistics** > **Create Dashboard**.
5522

56-
You can create many different types of dashboard. Based on traffic, device state, alerts, connectivity, and protocol.
23+
1. In the **Create Dashboard** pane that appears on the right:
5724

58-
1. In Defender for IoT, select **Trends & Statistics**.
59-
1. Select **Create Dashboard**.
60-
1. In the **Create Dashboard** dialog, type in a dashboard name, and in the **Dashboard widget type** dropdown menu, select a dashboard type. Each dashboard type has a description, and indicates whether it focuses on operations, security, or traffic.
61-
1. After selecting a dashboard type, by results are displayed for detections over the last seven days. You can use filter tools change this range.
25+
- In the **Dashboard name** field, enter a meaningful name for your dashboard.
26+
- (Optional) Filter the widgets displayed by selecting a category or protocol from the **Dashboard widget type** menu.
27+
- Scroll down as needed and select the widget you want to add. Each widget has a short description and indicates whether it focuses on operations, security, or traffic.
28+
- Select **Save** to start your new dashboard.
6229

63-
Each dashboard widget you create contains specific information about traffic, device state, alert information, connectivity status, or protocols. A message indicates if there's no data available for a widget. After setting you a dashboard, you can edit the dashboard name if needed, and add/remove types from the dashboard.
30+
1. Your widget is added to the new dashboard. Use the toolbar at the top of page to continue modifying your dashboard.
6431

32+
By default, results are displayed for detections for over the last seven days. Select the **Filter** button at the top left of each widget to change this range.
33+
34+
> [!NOTE]
35+
> The time shown in the widget is set according to the sensor machine's time.
36+
>
6537
66-
## Examples
38+
## Sample widgets
6739

68-
This table summarizes examples of use cases for some common widgets.
40+
The following table summarizes common use cases for dashboard widgets.
6941

70-
Widget | Details
42+
Widget name | Sample use case
7143
--- | ---
7244
Busy devices | Lists the five busiest devices. In **Edit** mode, you can filter by known protocols.
7345
Total bandwidth | Tracks the bandwidth in Mbps (megabits per second). The bandwidth is indicated on the y-axis, with the date appearing on the x-axis. **Edit** mode allows you to filter results.

articles/defender-for-iot/organizations/how-to-import-device-information.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99

1010
Sensors monitor and analyze device traffic. In some cases, because of network policies, some information might not be transmitted. In this case, you can import data and add it to device information that's already detected. You have two options for import:
1111

12-
- **Import from the device map*: Import device names, type, group, or Purdue layer to the device map.
12+
- **Import from the device map**: Import device names, type, group, or Purdue layer to the device map.
1313
- **Import from import settings**: Import device IP address, operating system, patch level, or authorization status to the device map.
1414

1515
## Import from the device map
@@ -41,7 +41,7 @@ Import data as follows:
4141
### Import authorization status:**
4242

4343
1. Download the [Authorization file](https://download.microsoft.com/download/8/2/3/823c55c4-7659-4236-bfda-cc2427be2cee/CSS/authorized_devices%20-%20example.csv) and save as a CSV file.
44-
1. IIn the authorized_devices sheet, specify the device IP address.
44+
1. In the authorized_devices sheet, specify the device IP address.
4545
1. Specify the authorized device name. Make sure that names are accurate. Names given to the devices in the imported list overwrite names shown in the device map.
4646
1. In **System settings**, under **Import settings**, select **Authorized devices** to import. Select **Add** and upload the CSV file that you prepared.
4747

articles/defender-for-iot/organizations/how-to-install-software.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -986,7 +986,7 @@ The following procedure describes how to configure the Nuvo 5006LP BIOS. Make su
986986

987987
1. Navigate to **Power** and change Power On after Power Failure to S0-Power On.
988988

989-
:::image type="content" source="media/tutorial-install-components/nuvo-power-on.png" alt-text="Change you Nuvo 5006 to power on after a power failure..":::
989+
:::image type="content" source="media/tutorial-install-components/nuvo-power-on.png" alt-text="Change your Nuvo 5006 to power on after a power failure.":::
990990

991991
1. Navigate to **Boot** and ensure that **PXE Boot to LAN** is set to **Disabled**.
992992

articles/defender-for-iot/organizations/how-to-troubleshoot-the-sensor-and-on-premises-management-console.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ When signing into a preconfigured sensor for the first time, you'll need to perf
3131

3232
1. Enter the unique identifier that you received on the **Password recovery** screen and select **Recover**. The `password_recovery.zip` file is downloaded.
3333

34-
:::image type="content" source="media/how-to-create-and-manage-users/enter-identifier.png" alt-text="Screenshot of the enter the unique identifier and then select recover.":::
34+
:::image type="content" source="media/how-to-create-and-manage-users/enter-identifier.png" alt-text="Screenshot of the Recover dialog box.":::
3535

3636
> [!NOTE]
3737
> Don't alter the password recovery file. It's a signed file and won't work if you tamper with it.

articles/defender-for-iot/organizations/references-work-with-defender-for-iot-apis.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1843,7 +1843,7 @@ Array of JSON objects that represent devices.
18431843
| Name | Type | Nullable | List of values |
18441844
|--|--|--|--|
18451845
| **Name** | String | No | |
1846-
| **Addresses** | JSON array | Yes | Master, or numeric values |
1846+
| **Addresses** | JSON array | Yes | `Master`, or numeric values |
18471847

18481848
#### Firmware fields
18491849

@@ -2125,7 +2125,7 @@ Array of JSON objects that represent devices.
21252125
| Name | Type | Nullable | List of values |
21262126
|--|--|--|--|
21272127
| Name | String | No | - |
2128-
| Addresses | JSON array | Yes | Master, or numeric values |
2128+
| Addresses | JSON array | Yes | `Master`, or numeric values |
21292129

21302130
#### Firmware fields
21312131

@@ -2724,7 +2724,7 @@ The below API's can be used with the ServiceNow integration via the ServiceNow's
27242724
-**timestamp**” – the time from which updates are required, only later updates will be returned.
27252725

27262726
- Query parameters:
2727-
-**sensorId**” - use this parameter to get only devices seen by a specific sensor. The Id should be taken from the results of the Sensors API.
2727+
-**sensorId**” - use this parameter to get only devices seen by a specific sensor. The ID should be taken from the results of the Sensors API.
27282728
-**notificationType**” - should be a number, from the following mapping:
27292729
- 0 – both updated and new devices (default).
27302730
- 1 – only new devices.
@@ -2757,8 +2757,8 @@ The below API's can be used with the ServiceNow integration via the ServiceNow's
27572757
- Structure:
27582758
-**u_count**” - amount of object in the full result sets, including all pages.
27592759
-**u_connections**” - array of
2760-
-**u_src_device_id**” - the Id of the source device.
2761-
-**u_dest_device_id**” - the Id of the destination device.
2760+
-**u_src_device_id**” - the ID of the source device.
2761+
-**u_dest_device_id**” - the ID of the destination device.
27622762
-**u_connection_type**” - one of the following:
27632763
-**One Way**
27642764
-**Two Way**
@@ -2771,7 +2771,7 @@ The below API's can be used with the ServiceNow integration via the ServiceNow's
27712771
- Path: “/device/{deviceId}”
27722772
- Method type: GET
27732773
- Path parameters:
2774-
-**deviceId**” – the Id of the requested device.
2774+
-**deviceId**” – the ID of the requested device.
27752775

27762776
#### Response
27772777

0 commit comments

Comments
 (0)