Skip to content

Commit dc91823

Browse files
authored
changed next steps
1 parent 72cba17 commit dc91823

File tree

1 file changed

+1
-5
lines changed

1 file changed

+1
-5
lines changed

articles/defender-for-iot/organizations/how-to-create-risk-assessment-reports.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,6 @@ ms.topic: how-to
99

1010
Risk assessment reports, generated by Defender for IoT OT network sensors and on-premises management consoles, provide details about security scores, vulnerabilities, and operational issues on detected devices as well as risks coming from imported firewall rules.
1111

12-
## Risk mitigation
13-
14-
Take action based on the recommendations provided in the risk assessment reports to improve your overall network security score. For example, you might install the latest security or firmware updates, or investigate any PLCs that are currently in unsecure states.
15-
1612
Each sensor has access to reports generated for that sensor, while the on-premises management console allows you view reports from all connected sensors from the same page. The on-premises management console also supports customizations for the logo that appears in your report.
1713

1814
## Prerequisites
@@ -91,4 +87,4 @@ Risk assessment reports include the following details:
9187

9288
## Next steps
9389

94-
For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md).
90+
Take action based on the recommendations provided in the risk assessment reports to improve your overall network security score. For example, you might install the latest security or firmware updates, or investigate any PLCs that are currently in unsecure states. For more information, see [Enhance security posture with security recommendations](recommendations.md).

0 commit comments

Comments
 (0)