Skip to content

Commit d96f6f5

Browse files
committed
edits violations
1 parent b54475a commit d96f6f5

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

articles/defender-for-iot/organizations/alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,9 @@ For more information, see:
5050

5151
Alert options also differ depending on your location and user role. For more information, see [Azure user roles and permissions](roles-azure.md) and [On-premises users and roles](roles-on-premises.md).
5252

53-
## Aggregating alerts
53+
## Aggregating alert violations
5454

55-
Alert fatigue caused by a high number of identical alerts could lead to your team failing to see or remediate vital alerts. Aggregating alerts reduces the number of alerts reported by listing identical alert types, with the same parameter settings, as one alert. The matching parameters differ depending on the alert type. For example, the *Unpermitted Usage of Modbus Function Code* alert needs to have the same source and destination IP addresses to produce an aggregated alert violation. The aggregated alert could include alerts with different alert codes, such as read and write codes.
55+
Alert fatigue caused by a high number of identical alerts could lead to your team failing to see or remediate vital alerts. Each alert listed in the Alerts page is a result of a network violation, for example the *Unpermitted Usage of Modbus Function Code*. Aggregating violations with the same parameters and remediation requirements into one single alert listing, reduces the number of alerts displayed on the Alerts page. The matching parameters differ depending on the alert type. For example, the *Unpermitted Usage of Modbus Function Code* alert needs to have the same source and destination IP addresses to produce an aggregated alert violation. The aggregated alert could include alerts with different violation codes, such as read and write codes.
5656

5757
You download the aggregated alert violation data, that lists each alert with the relevant parameters and functions, as a CSV file in the **Violations** tab of the alert details. This data can help teams to identify patterns, assess impact and prioritize responses more effectively based on the remediation suggestions in the **Take action** tab. Only alerts that have the same remediation process are aggregated into a single alert. However, individual violation events can still be viewed separately within their respective devices, providing additional clarity.
5858

articles/defender-for-iot/organizations/how-to-manage-cloud-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ You might want to export a selection of alerts to a CSV file for offline sharing
145145

146146
The file is generated, and you're prompted to save it locally.
147147

148-
## Remediate aggregated alerts
148+
## Remediate aggregated alert violations
149149

150150
To reduce alert fatigue, multiple versions of the same alert with identical parameters are listed as one item in the Alerts page. As you investigate alerts, an aggregated alert is identified by the *Multiple violations* message that appears under the Source device IP. Use the **Violations** tab to investigate further and the **Take action** tab to remediate the alerts.
151151

articles/defender-for-iot/organizations/how-to-view-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ If your admin has [created custom comments](how-to-accelerate-alert-incident-res
177177

178178
For more information, see [Accelerating OT alert workflows](alerts.md#accelerating-ot-alert-workflows).
179179

180-
## Remediate aggregated alerts
180+
## Remediate aggregated alert violations
181181

182182
To reduce alert fatigue, multiple versions of the same alert with identical parameters are listed as one item in the Alerts page. As you investigate alerts, an aggregated alert is identified by the *Multiple violations* message that appears under the Source device IP. Use the **Violations** tab to investigate further and the **Take action** tab to remediate the alerts.
183183

0 commit comments

Comments
 (0)