Skip to content

Commit f6e8acc

Browse files
committed
fix fix
1 parent a683430 commit f6e8acc

File tree

4 files changed

+3
-3
lines changed

4 files changed

+3
-3
lines changed

defender-for-iot/enterprise-iot-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Enterprise IoT security improves the monitoring and protection of the IoT device
1515

1616
In this article you will learn how to add enterprise IoT to your Microsoft Defender portal and use the IoT specific security features to protect your IoT environment.
1717

18-
[!INCLUDE [defender-iot-preview](../includes//defender-iot-defender-public-preview.md)]
18+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
1919

2020
## Prerequisites
2121

defender-for-iot/enterprise-iot-licenses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: overview
1313

1414
Enterprise IoT security improves the monitoring and protection of the IoT devices in your network, such as printers, smart TVs, Voice over Internet Protocol (VoIP) devices, conferencing systems and purpose-built, proprietary devices. The security monitoring includes IoT related alerts, vulnerabilities, and recommendations that are integrated with your existing Microsoft Defender for Endpoint data.
1515

16-
[!INCLUDE [defender-iot-preview](../includes//defender-iot-defender-public-preview.md)]
16+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
1717

1818
## Enterprise IoT licenses
1919

defender-for-iot/enterprise-iot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ The number of IoT devices continues to grow exponentially across enterprise netw
1515

1616
While the number of IoT devices continues to grow, they often lack the security safeguards that are common on managed endpoints like laptops and mobile phones. To bad actors, these unmanaged devices can be used as a point of entry for lateral movement or evasion, and too often, the use of such tactics leads to the exfiltration of sensitive information.
1717

18-
[!INCLUDE [defender-iot-preview](../includes//defender-iot-defender-public-preview.md)]
18+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
1919

2020
## Enterprise IoT monitoring in the Defender portal
2121

File renamed without changes.

0 commit comments

Comments
 (0)