Skip to content

Commit d8df438

Browse files
authored
Merge pull request #2063 from MicrosoftDocs/main
Published main to live, Monday 5:00 PM IST, 12/02
2 parents ed4c15e + 63951dd commit d8df438

File tree

2 files changed

+70
-68
lines changed

2 files changed

+70
-68
lines changed

defender-endpoint/machines-view-overview.md

Lines changed: 69 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -129,12 +129,12 @@ The available device properties to use as filters vary based on the device inven
129129

130130
|Property|Tabs|Description|
131131
|---|---|---|
132-
|**Antivirus status**|<ul><li>**All devices**</li><li>**Computers & mobile**</li></ul>|The antivirus status of the device. The available values are: <ul><li>**Disabled**</li><li>**Not updated**</li><li>**Unknown**</li></ul>|
133132
|**Cloud platforms**|<ul><li>**All devices**</li><li>**Computers & mobile**</li></ul>|The cloud platform that the device belongs to. The available values are: <ul><li>**Azure**</li><li>**AWS**</li><li>**GCP**</li><li>**Arc**</li><li>**None**</li></ul>|
134133
|**Criticality level**|<ul><li>**All devices**</li><li>**Computers & mobile**</li></ul>|The assigned criticality level of the device (how critical a device is for your organization). The available values are: <ul><li>**Very high**: The device is considered a business critical asset</li><li>**High**</li><li>**Medium**</li><li>**Low**</li><li>**None**</li></ul> <br/> For more information, see [Overview of critical asset management](/security-exposure-management/critical-asset-management).|
135134
|**Device category**|**All devices**|The category value assigned to the device. Enter a value or select from the available values: <ul><li>**BMS**</li><li>**Computers and Mobile**</li><li>**IoT**</li><li>**Medical**</li><li>**Network Device**</li><li>**OT**</li><li>**Unknown**</li></ul>|
136135
|**Device subtype**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The subtype value assigned to the device. Enter a value or select an available value (for example, **Video conference**).|
137136
|**Device type**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The type value assigned to the device. Enter a value or select an available value (for example, **Audio and Video**).|
137+
|**Device role**|All|The specific role of the device within the organization. For detailed descriptions of each role, see [Predefined classifications](/security-exposure-management/predefined-classification-rules-and-levels).|
138138
|**Device value**|All|The assigned value of the device. The available values are **High** and **Low**.|
139139
|**Discovery sources**|All|The source reporting on the device.|
140140
|**Exclusion state**|All|The available values are **Not excluded** and **Excluded**. For more information, see [Exclude devices](exclude-devices.md).|
@@ -158,115 +158,117 @@ The available device properties to use as filters vary based on the device inven
158158

159159
## Use columns to customize the device inventory views
160160

161-
You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
161+
You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (*):
162162

163163
- **All devices** tab:
164-
- **Name**<sup\*</sup>
165-
- **IP**<sup\*</sup>
164+
- **Name***
165+
- **IP***
166166
- **MAC address**
167-
- **Criticality level**<sup\*</sup>
168-
- **Device category**<sup\*</sup>
169-
- **Device type**<sup\*</sup>
167+
- **Criticality level***
168+
- **Device category***
169+
- **Device role**
170+
- **Device type***
170171
- **Device subtype**
171172
- **Vendor**
172173
- **Model**
173-
- **Domain**<sup\*</sup>
174-
- **Device AAD id**<sup\*</sup>
175-
- **Risk level**<sup\*</sup>
176-
- **Exposure level**<sup\*</sup>
177-
- **OS platform**<sup\*</sup>
174+
- **Domain***
175+
- **Device AAD id***
176+
- **Risk level***
177+
- **Exposure level***
178+
- **OS platform***
178179
- **OS distribution**
179-
- **OS version**<sup\*</sup>
180-
- **Sensor health state**<sup\*</sup>
181-
- **Onboarding status**<sup\*</sup>
180+
- **OS version***
181+
- **Sensor health state***
182+
- **Onboarding status***
182183
- **Discovery sources**
183184
- **First seen**
184-
- **Last device update**<sup\*</sup>
185-
- **Tags**<sup\*</sup>
185+
- **Last device update***
186+
- **Tags***
186187
- **Exclusion state**
187-
- **Managed by**<sup\*</sup>
188-
- **Managed by status**<sup\*</sup>
189-
- **Mitigation status**<sup\*</sup>
190-
- **Cloud platforms**<sup\*</sup>
188+
- **Managed by***
189+
- **Managed by status***
190+
- **Mitigation status***
191+
- **Cloud platforms***
191192

192193
Firmware information for OT devices is displayed in the **OS version** and **Model** columns.
193194

194195
- **Computers & mobile** tab:
195-
- **Name**<sup\*</sup>
196-
- **Domain**<sup\*</sup>
197-
- **Device AAD id**<sup\*</sup>
196+
- **Name***
197+
- **Domain***
198+
- **Device AAD id***
199+
- **Device role**
198200
- **Device type**
199201
- **Device subtype**
200-
- **Risk level**<sup\*</sup>
201-
- **Exposure level**<sup\*</sup>
202-
- **OS platform**<sup\*</sup>
202+
- **Risk level***
203+
- **Exposure level***
204+
- **OS platform***
203205
- **OS distribution**
204-
- **Windows version**<sup\*</sup>
206+
- **Windows version***
205207
- **MAC address**
206-
- **Criticality level**<sup\*</sup>
207-
- **Sensor health state**<sup\*</sup>
208-
- **Onboarding status**<sup\*</sup>
208+
- **Criticality level***
209+
- **Sensor health state***
210+
- **Onboarding status***
209211
- **Discovery sources**
210-
- **Last device update**<sup\*</sup>
212+
- **Last device update***
211213
- **First seen**
212-
- **Tags**<sup\*</sup>
214+
- **Tags***
213215
- **Exclusion state**
214-
- **Managed by**<sup\*</sup>
215-
- **Managed by status**<sup\*</sup>
216-
- **Mitigation status**<sup\*</sup>
217-
- **Cloud platforms**<sup\*</sup>
216+
- **Managed by***
217+
- **Managed by status***
218+
- **Mitigation status***
219+
- **Cloud platforms***
218220

219221
- **Network devices** tab
220-
- **IP**<sup>\*</sup>
222+
- **IP***
221223
- **MAC address**
222-
- **Vendor**<sup>\*</sup>
223-
- **Model**<sup>\*</sup>
224-
- **Name**<sup>\*</sup>
224+
- **Vendor***
225+
- **Model***
226+
- **Name***
225227
- **Discovery sources**
226228
- **Domain**
227229
- **Device type**
228230
- **Device subtype**
229-
- **Risk level**<sup>\*</sup>
230-
- **Exposure level**<sup>\*</sup>
231-
- **OS distribution**<sup>\*</sup>
232-
- **OS version**<sup>\*</sup>
233-
- **Last device update**<sup>\*</sup>
231+
- **Risk level***
232+
- **Exposure level***
233+
- **OS distribution***
234+
- **OS version***
235+
- **Last device update***
234236
- **First seen**
235-
- **Tags**<sup>\*</sup>
237+
- **Tags***
236238
- **Exclusion state**
237239

238240
- **IoT/OT devices** tab
239-
- **IP**<sup>\*</sup>
240-
- **MAC address**<sup>\*</sup>
241-
- **Name**<sup>\*</sup>
242-
- **Device type**<sup>\*</sup>
243-
- **Device subtype**<sup>\*</sup>
244-
- **Vendor**<sup>\*</sup>
245-
- **Model**<sup>\*</sup>
246-
- **Risk level**<sup>\*</sup>
247-
- **Exposure level**<sup>\*</sup>
241+
- **IP***
242+
- **MAC address***
243+
- **Name***
244+
- **Device type***
245+
- **Device subtype***
246+
- **Vendor***
247+
- **Model***
248+
- **Risk level***
249+
- **Exposure level***
248250
- **Discovery sources**
249-
- **OS distribution**<sup>\*</sup>
250-
- **OS version**<sup>\*</sup>
251+
- **OS distribution***
252+
- **OS version***
251253
- **First seen**
252-
- **Last device update**<sup>\*</sup>
254+
- **Last device update***
253255
- **Domain**
254-
- **Tags**<sup>\*</sup>
256+
- **Tags***
255257
- **Exclusion state**
256258

257259
- **Uncategorized devices** tab:
258-
- **Name**<sup>\*</sup>
259-
- **Vendor**<sup>\*</sup>
260-
- **IP**<sup>\*</sup>
260+
- **Name***
261+
- **Vendor***
262+
- **IP***
261263
- **Discovery sources**
262264
- **MAC address**
263265
- **Risk level**
264266
- **Exposure level**
265-
- **OS distribution**<sup>\*</sup>
266-
- **OS version**<sup>\*</sup>
267-
- **Last device update**<sup>\*</sup>
267+
- **OS distribution***
268+
- **OS version***
269+
- **Last device update***
268270
- **First seen**
269-
- **Tags**<sup>\*</sup>
271+
- **Tags***
270272
- **Exclusion state**
271273

272274
> [!TIP]

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,5 +108,5 @@ Current asset types are:
108108
| Azure Virtual Machine with High Availability and Performance | Cloud resource | Low | This rule applies to Azure virtual machines that use premium Azure storage and are configured with an availability set. Premium storage is used for machines with high performance requirements, such as production workloads. Availability sets improve resilience and are often indicated for business critical VMs that need high availability. |
109109
| Immutable Azure Storage | Cloud resource | Medium | This rule applies to Azure storage accounts that have immutability support enabled. Immutability stores business data in a write once read many (WORM) state, and usually indicates that the storage account holds critical or sensitive data that must be protected from modification. |
110110
| Immutable and Locked Azure Storage | Cloud resource | High | This rule applies to Azure storage accounts that have immutability support enabled with a locked policy. Immutability stores business data in a write once read many (WORM). Data protection is increased with a locked policy to ensure that data can’t be deleted or its retention time shortened. These settings usually indicate that the storage account holds critical or sensitive data that must be protected from modification or deletion. Data might also need to align with compliance policies for data protection. |
111-
| Azure Virtual Machine with a Critical User Signed-in | Cloud resource | High | This rule applies to virtual machines protected by Defender for Endpoint, where a user with a high or very high criticality level is signed in. The signed-in user can be through a joined or registered device, an active browser session, or other means. |
111+
| Azure Virtual Machine with a Critical User Signed In | Cloud resource | High | This rule applies to virtual machines protected by Defender for Endpoint, where a user with a high or very high criticality level is signed in. The signed-in user can be through a joined or registered device, an active browser session, or other means. |
112112
| Azure Key Vaults with Many Connected Identities | Cloud resource | High | This rule identifies Key Vaults that can be accessed by a large number of identities, compared to other Key Vaults. This often indicates that the Key Vault is used by critical workloads, such as production services. |

0 commit comments

Comments
 (0)