Skip to content

Commit f6a8b13

Browse files
committed
redirects4 acro
1 parent 6ee41c5 commit f6a8b13

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

articles/defender-for-iot/device-builders/concept-threadx-security-alerts-recommendations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Defender-IoT-micro-agent for Eclipse ThreadX continuously analyzes your IoT solu
1111

1212
A Defender-IoT-micro-agent for Eclipse ThreadX alert acts as an indicator of potential compromise, and should be investigated and remediated. A Defender-IoT-micro-agent for Eclipse ThreadX recommendation identifies weak security posture to be remediated and updated.
1313

14-
In this article, you'll find a list of built-in alerts and recommendations that are triggered based on the default ranges, and customizable with your own values, based on expected or baseline behavior.
14+
In this article, you find a list of built-in alerts and recommendations that are triggered based on the default ranges, and customizable with your own values, based on expected or baseline behavior.
1515

1616
For more information on how alert customization works in the Defender for IoT service, see [customizable alerts](concept-customizable-security-alerts.md). The specific alerts and recommendations available for customization when using the Defender-IoT-micro-agent for Eclipse ThreadX are detailed in the following tables.
1717

@@ -44,8 +44,8 @@ For more information on how alert customization works in the Defender for IoT se
4444

4545
|Device related activity |Alert name |
4646
|---------|---------|
47-
|Active connections|Number of active connections is not in the allowed range|
48-
|Cloud to device messages in **MQTT** protocol|Number of cloud to device messages in **MQTT** protocol is not in the allowed range|
47+
|Active connections|Number of active connections isn't in the allowed range|
48+
|Cloud to device messages in **MQTT** protocol|Number of cloud to device messages in **MQTT** protocol isn't in the allowed range|
4949
|Outbound connection| Outbound connection to an IP that isn't allowed|
5050

5151
### Hub related customizable alerts

articles/defender-for-iot/device-builders/how-to-threadx-security-module.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,16 +31,16 @@ The default behavior of each configuration is provided in the following tables:
3131

3232
| Name | Type | Default | Details |
3333
| - | - | - | - |
34-
| ASC_SECURITY_MODULE_ID | String | defender-iot-micro-agent | The unique identifier of the device. |
34+
| ASC_SECURITY_MODULE_ID | String | defender-iot-micro-agent | The unique identifier of the device. |
3535
| SECURITY_MODULE_VERSION_(MAJOR)(MINOR)(PATCH) | Number | 3.2.1 | The version. |
36-
| ASC_SECURITY_MODULE_SEND_MESSAGE_RETRY_TIME | Number | 3 | The amount of time the Defender-IoT-micro-agent will take to send the security message after a fail. (in seconds) |
37-
| ASC_SECURITY_MODULE_PENDING_TIME | Number | 300 | The Defender-IoT-micro-agent pending time (in seconds). The state will change to suspend, if the time is exceeded. |
36+
| ASC_SECURITY_MODULE_SEND_MESSAGE_RETRY_TIME | Number | 3 | The amount of time the Defender-IoT-micro-agent will take to send the security message after a fail (in seconds). |
37+
| ASC_SECURITY_MODULE_PENDING_TIME | Number | 300 | The Defender-IoT-micro-agent pending time (in seconds). The state changes to suspend, if the time is exceeded. |
3838

3939
## Collection configuration
4040

4141
| Name | Type | Default | Details |
4242
| - | - | - | - |
43-
| ASC_FIRST_COLLECTION_INTERVAL | Number | 30 | The Collector's startup collection interval offset. During startup, the value will be added to the collection of the system in order to avoid sending messages from multiple devices simultaneously. |
43+
| ASC_FIRST_COLLECTION_INTERVAL | Number | 30 | The Collector's startup collection interval offset. During startup, the value is added to the collection of the system in order to avoid sending messages from multiple devices simultaneously. |
4444
| ASC_HIGH_PRIORITY_INTERVAL | Number | 10 | The collector's high priority group interval (in seconds). |
4545
| ASC_MEDIUM_PRIORITY_INTERVAL | Number | 30 | The collector's medium priority group interval (in seconds). |
4646
| ASC_LOW_PRIORITY_INTERVAL | Number | 145,440 | The collector's low priority group interval (in seconds). |
@@ -54,7 +54,7 @@ To customize your collector network activity configuration, use the following:
5454
| ASC_COLLECTOR_NETWORK_ACTIVITY_TCP_DISABLED | Boolean | false | Filters the `TCP` network activity. |
5555
| ASC_COLLECTOR_NETWORK_ACTIVITY_UDP_DISABLED | Boolean | false | Filters the `UDP` network activity events. |
5656
| ASC_COLLECTOR_NETWORK_ACTIVITY_ICMP_DISABLED | Boolean | false | Filters the `ICMP` network activity events. |
57-
| ASC_COLLECTOR_NETWORK_ACTIVITY_CAPTURE_UNICAST_ONLY | Boolean | true | Captures the unicast incoming packets only. When set to false, it will also capture both Broadcast, and Multicast. |
57+
| ASC_COLLECTOR_NETWORK_ACTIVITY_CAPTURE_UNICAST_ONLY | Boolean | true | Captures the unicast incoming packets only. When set to false, it captures both Broadcast, and Multicast. |
5858
| ASC_COLLECTOR_NETWORK_ACTIVITY_SEND_EMPTY_EVENTS | Boolean | false | Sends an empty events of collector. |
5959
| ASC_COLLECTOR_NETWORK_ACTIVITY_MAX_IPV4_OBJECTS_IN_CACHE | Number | 64 | The maximum number of IPv4 network events to store in memory. |
6060
| ASC_COLLECTOR_NETWORK_ACTIVITY_MAX_IPV6_OBJECTS_IN_CACHE | Number | 64 | The maximum number of IPv6 network events to store in memory. |
@@ -64,7 +64,7 @@ To customize your collector network activity configuration, use the following:
6464
| - | - | - | - |
6565
| ASC_COLLECTOR_HEARTBEAT_ENABLED | Boolean | ON | Enables the heartbeat collector. |
6666
| ASC_COLLECTOR_NETWORK_ACTIVITY_ENABLED | Boolean | ON | Enables the network activity collector. |
67-
| ASC_COLLECTOR_SYSTEM_INFORMATION_ENABLED | Boolean | ON | Enables the system information collector. |
67+
| ASC_COLLECTOR_SYSTEM_INFORMATION_ENABLED | Boolean | ON | Enables the system information collector. |
6868

6969
Other configurations flags are advanced, and have unsupported features. Contact support to change this, or for more information.
7070

@@ -80,4 +80,4 @@ You can enable and configure Log Analytics to investigate device events and acti
8080

8181

8282
- Review and customize Defender-IoT-micro-agent for Eclipse ThreadX [security alerts and recommendations](concept-threadx-security-alerts-recommendations.md)
83-
- Refer to the [Defender-IoT-micro-agent for Eclipse ThreadX API](azure-threadx-security-module-api.md) as needed.
83+
- Refer to the [Defender-IoT-micro-agent for Eclipse ThreadX API](threadx-security-module-api.md) as needed.

articles/defender-for-iot/device-builders/threadx-security-module-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,4 +80,4 @@ Threads
8080

8181
To learn more about how to get started with Eclipse ThreadX Defender-IoT-micro-agent, see the following articles:
8282

83-
- Review the Defender for IoT Eclipse ThreadX Defender-IoT-micro-agent [overview](iot-security-xthread.md).
83+
- Review the Defender for IoT Eclipse ThreadX Defender-IoT-micro-agent [overview](iot-security-threadx.md).

0 commit comments

Comments
 (0)