You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/machines-view-overview.md
+69-67Lines changed: 69 additions & 67 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,12 +129,12 @@ The available device properties to use as filters vary based on the device inven
129
129
130
130
|Property|Tabs|Description|
131
131
|---|---|---|
132
-
|**Antivirus status**|<ul><li>**All devices**</li><li>**Computers & mobile**</li></ul>|The antivirus status of the device. The available values are: <ul><li>**Disabled**</li><li>**Not updated**</li><li>**Unknown**</li></ul>|
133
132
|**Cloud platforms**|<ul><li>**All devices**</li><li>**Computers & mobile**</li></ul>|The cloud platform that the device belongs to. The available values are: <ul><li>**Azure**</li><li>**AWS**</li><li>**GCP**</li><li>**Arc**</li><li>**None**</li></ul>|
134
133
|**Criticality level**|<ul><li>**All devices**</li><li>**Computers & mobile**</li></ul>|The assigned criticality level of the device (how critical a device is for your organization). The available values are: <ul><li>**Very high**: The device is considered a business critical asset</li><li>**High**</li><li>**Medium**</li><li>**Low**</li><li>**None**</li></ul> <br/> For more information, see [Overview of critical asset management](/security-exposure-management/critical-asset-management).|
135
134
|**Device category**|**All devices**|The category value assigned to the device. Enter a value or select from the available values: <ul><li>**BMS**</li><li>**Computers and Mobile**</li><li>**IoT**</li><li>**Medical**</li><li>**Network Device**</li><li>**OT**</li><li>**Unknown**</li></ul>|
136
135
|**Device subtype**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The subtype value assigned to the device. Enter a value or select an available value (for example, **Video conference**).|
137
136
|**Device type**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The type value assigned to the device. Enter a value or select an available value (for example, **Audio and Video**).|
137
+
|**Device role**|All|The specific role of the device within the organization. For detailed descriptions of each role, see [Predefined classifications](/security-exposure-management/predefined-classification-rules-and-levels).|
138
138
|**Device value**|All|The assigned value of the device. The available values are **High** and **Low**.|
139
139
|**Discovery sources**|All|The source reporting on the device.|
140
140
|**Exclusion state**|All|The available values are **Not excluded** and **Excluded**. For more information, see [Exclude devices](exclude-devices.md).|
@@ -158,115 +158,117 @@ The available device properties to use as filters vary based on the device inven
158
158
159
159
## Use columns to customize the device inventory views
160
160
161
-
You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
161
+
You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (*):
162
162
163
163
-**All devices** tab:
164
-
-**Name**<sup\*</sup>
165
-
-**IP**<sup\*</sup>
164
+
-**Name***
165
+
-**IP***
166
166
-**MAC address**
167
-
-**Criticality level**<sup\*</sup>
168
-
-**Device category**<sup\*</sup>
169
-
-**Device type**<sup\*</sup>
167
+
-**Criticality level***
168
+
-**Device category***
169
+
-**Device role**
170
+
-**Device type***
170
171
-**Device subtype**
171
172
-**Vendor**
172
173
-**Model**
173
-
-**Domain**<sup\*</sup>
174
-
-**Device AAD id**<sup\*</sup>
175
-
-**Risk level**<sup\*</sup>
176
-
-**Exposure level**<sup\*</sup>
177
-
-**OS platform**<sup\*</sup>
174
+
-**Domain***
175
+
-**Device AAD id***
176
+
-**Risk level***
177
+
-**Exposure level***
178
+
-**OS platform***
178
179
-**OS distribution**
179
-
-**OS version**<sup\*</sup>
180
-
-**Sensor health state**<sup\*</sup>
181
-
-**Onboarding status**<sup\*</sup>
180
+
-**OS version***
181
+
-**Sensor health state***
182
+
-**Onboarding status***
182
183
-**Discovery sources**
183
184
-**First seen**
184
-
-**Last device update**<sup\*</sup>
185
-
-**Tags**<sup\*</sup>
185
+
-**Last device update***
186
+
-**Tags***
186
187
-**Exclusion state**
187
-
-**Managed by**<sup\*</sup>
188
-
-**Managed by status**<sup\*</sup>
189
-
-**Mitigation status**<sup\*</sup>
190
-
-**Cloud platforms**<sup\*</sup>
188
+
-**Managed by***
189
+
-**Managed by status***
190
+
-**Mitigation status***
191
+
-**Cloud platforms***
191
192
192
193
Firmware information for OT devices is displayed in the **OS version** and **Model** columns.
Copy file name to clipboardExpand all lines: exposure-management/predefined-classification-rules-and-levels.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,5 +108,5 @@ Current asset types are:
108
108
| Azure Virtual Machine with High Availability and Performance | Cloud resource | Low | This rule applies to Azure virtual machines that use premium Azure storage and are configured with an availability set. Premium storage is used for machines with high performance requirements, such as production workloads. Availability sets improve resilience and are often indicated for business critical VMs that need high availability. |
109
109
| Immutable Azure Storage | Cloud resource | Medium | This rule applies to Azure storage accounts that have immutability support enabled. Immutability stores business data in a write once read many (WORM) state, and usually indicates that the storage account holds critical or sensitive data that must be protected from modification. |
110
110
| Immutable and Locked Azure Storage | Cloud resource | High | This rule applies to Azure storage accounts that have immutability support enabled with a locked policy. Immutability stores business data in a write once read many (WORM). Data protection is increased with a locked policy to ensure that data can’t be deleted or its retention time shortened. These settings usually indicate that the storage account holds critical or sensitive data that must be protected from modification or deletion. Data might also need to align with compliance policies for data protection. |
111
-
| Azure Virtual Machine with a Critical User Signed-in| Cloud resource | High | This rule applies to virtual machines protected by Defender for Endpoint, where a user with a high or very high criticality level is signed in. The signed-in user can be through a joined or registered device, an active browser session, or other means. |
111
+
| Azure Virtual Machine with a Critical User Signed In| Cloud resource | High | This rule applies to virtual machines protected by Defender for Endpoint, where a user with a high or very high criticality level is signed in. The signed-in user can be through a joined or registered device, an active browser session, or other means. |
112
112
| Azure Key Vaults with Many Connected Identities | Cloud resource | High | This rule identifies Key Vaults that can be accessed by a large number of identities, compared to other Key Vaults. This often indicates that the Key Vault is used by critical workloads, such as production services. |
0 commit comments