Skip to content

Commit 507b93e

Browse files
committed
amit
1 parent 32f62ce commit 507b93e

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

defender-for-iot/investigate-threats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Defender for IoT generates its own unique alert.
6161
|----|----|
6262
|**Possible operational impact due to a compromised device** |A compromised device communicated with an operational technology (OT) asset. An attacker might be attempting to control or disrupt physical operations. |
6363

64-
## Advanced hunting site property
64+
## Advanced hunting
6565

6666
Use the **Site** property listed in the **DeviceInfo** table to write queries for advanced hunting. This allows you to filter devices according to a specific site, for example, all devices that communicated with malicious devices at a specific site.
6767

defender-for-iot/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ This article describes features available in Microsoft Defender for IoT in the D
2424

2525
### New Site property added DeviceInfo schema
2626

27-
In the advanced hunting tables, the **Site** property is added to the **DeviceInfo** schema. For more information, see[investigate threats](investigate-threats.md#advanced-hunting-site-property).
27+
In the advanced hunting tables, the **Site** property is added to the **DeviceInfo** schema. For more information, see [investigate threats](investigate-threats.md#advanced-hunting-site-property).
2828

2929
## Next steps
3030

0 commit comments

Comments
 (0)