Skip to content

Commit 01a62b6

Browse files
prmerger-automator[bot]bmansheim
authored andcommitted
Merge pull request #228847 from yoninalmsft/22.3.6-sensor
22.3.6 sensor device inventory updates
2 parents d12460d + cb12fcb commit 01a62b6

8 files changed

+104
-108
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -804,6 +804,11 @@
804804
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers.md",
805805
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-servers",
806806
"redirect_document_id": true
807+
},
808+
{
809+
"source_path_from_root": "/articles/defender-for-cloud/faq-azure-monitor-logs.yml",
810+
"redirect_url": "/azure/defender-for-cloud/faq-data-collection-agents",
811+
"redirect_document_id": true
807812
}
808813
]
809814
}

articles/defender-for-cloud/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,6 @@
2323
href: faq-data-collection-agents.yml
2424
- name: Azure Virtual Machines questions
2525
href: faq-vms.yml
26-
- name: Azure Log Analytics questions
27-
href: faq-azure-monitor-logs.yml
2826

2927
- name: Quickstarts
3028
items:

articles/defender-for-cloud/faq-azure-monitor-logs.yml

Lines changed: 0 additions & 47 deletions
This file was deleted.

articles/defender-for-cloud/faq-data-collection-agents.yml

Lines changed: 69 additions & 37 deletions
Large diffs are not rendered by default.

articles/defender-for-cloud/faq-defender-for-servers.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
ms.service: defender-for-cloud
77
author: bmansheim
88
ms.author: benmansheim
9-
ms.date: 11/29/2022
9+
ms.date: 03/05/2023
1010
title: Frequently asked questions for Defender for Servers
1111
summary: Get answers to common questions about Microsoft Defender for Servers.
1212

@@ -17,7 +17,7 @@ sections:
1717
- question: |
1818
Can I enable Defender for Servers on a subset of machines in a subscription?
1919
answer: |
20-
No. When you enable Microsoft Defender for Servers on an Azure subscription or on a connected AWS account or GCP project, all connected machines are protected by Defender for Servers. This includes servers that don't have the Log Analytics agent or Azure Monitor agent installed.
20+
No. When you enable Microsoft Defender for Servers on an Azure subscription or on a connected AWS account or GCP project, all connected machines are protected by Defender for Servers. Servers that don't have the Log Analytics agent or Azure Monitor agent installed are also protected.
2121
2222
- question: |
2323
Can I get a discount if I already have a Microsoft Defender for Endpoint license?
@@ -58,7 +58,7 @@ sections:
5858
- question: |
5959
Do I need to enable Defender for Servers on the subscription and on the workspace?
6060
answer: |
61-
Defender for Servers Plan 1 does not depend on Log Analytics. When you enable Defender for Servers Plan 2 at the subscription level, Defender for Cloud automatically enables the plan on your default Log Analytics workspaces. If you use a custom workspace, make sure you enable the plan on the workspace. Here's more information:
61+
Defender for Servers Plan 1 doesn't depend on Log Analytics. When you enable Defender for Servers Plan 2 at the subscription level, Defender for Cloud automatically enables the plan on your default Log Analytics workspaces. If you use a custom workspace, make sure you enable the plan on the workspace. Here's more information:
6262
6363
- If you turn on Defender for Servers for a subscription and for a connected custom workspace, you aren't charged for both. The system identifies unique VMs.
6464
- If you enable Defender for Servers on cross-subscription workspaces:
@@ -67,11 +67,11 @@ sections:
6767
6868
6969
- question: |
70-
Is the free allowance applied per workspace or per machine?
70+
Is the 500 MB of free data ingestion allowance applied per workspace or per machine?
7171
answer: |
72-
For every VM that's connected to the workspace, you get 500 MB of free data ingestion per day. The allowance is specifically for the security data types that are directly collected by Defender for Cloud.
72+
When you have [Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md) enabled, you get 500 MB of free data ingestion per day. The allowance is specifically for the security data types that are directly collected by Defender for Cloud.
7373
74-
This allowance is a daily rate that's averaged across all nodes. Your total daily free limit is equal to \[number of machines\] × 500 MB. Even if some machines send 100 MB and others send 800 MB, if the total doesn't exceed your total daily free limit, you aren't charged extra.
74+
This allowance is a daily rate that's averaged across all nodes. Your total daily free limit is equal to \[number of machines\] × 500 MB. You aren't charged extra if the total doesn't exceed your total daily free limit, even if some machines send 100 MB and others send 800 MB.
7575
7676
- question: |
7777
What data types are included in the daily allowance?
@@ -93,7 +93,7 @@ sections:
9393
- question: |
9494
Am I charged for machines that don't have Log Analytics installed?
9595
answer: |
96-
Yes. When you enable Defender for Servers on an Azure subscription, connected AWS account, or connected GCP project, you're charged for all machines that are connected to your Azure subscription or your AWS account. The term *machines* includes Azure virtual machines, instances of Azure Virtual Machine Scale Sets, and Azure Arc-enabled servers. Machines that don't have Log Analytics installed are covered by protections that don't depend on the Log Analytics agent.
96+
Yes. You are charged for all machines that are protected by Defender for Servers in Azure subscriptions, connected AWS accounts, or connected GCP projects. The term *machines* includes Azure virtual machines, instances of Azure Virtual Machine Scale Sets, and Azure Arc-enabled servers. Machines that don't have Log Analytics installed are covered by protections that don't depend on the Log Analytics agent.
9797
9898
- question: |
9999
If an agent reports to multiple workspaces, am I charged twice?

articles/defender-for-cloud/monitoring-components.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The following use cases explain how deployment of the Log Analytics agent works
9898
- **A pre-existing VM extension is present**:
9999
- When the Monitoring Agent is installed as an extension, the extension configuration allows reporting to only a single workspace. Defender for Cloud doesn't override existing connections to user workspaces. Defender for Cloud will store security data from the VM in the workspace already connected, if the "Security" or "SecurityCenterFree" solution has been installed on it. Defender for Cloud may upgrade the extension version to the latest version in this process.
100100
- To see to which workspace the existing extension is sending data to, run the test to [Validate connectivity with Microsoft Defender for Cloud](/archive/blogs/yuridiogenes/validating-connectivity-with-azure-security-center). Alternatively, you can open Log Analytics workspaces, select a workspace, select the VM, and look at the Log Analytics agent connection.
101-
- If you have an environment where the Log Analytics agent is installed on client workstations and reporting to an existing Log Analytics workspace, review the list of [operating systems supported by Microsoft Defender for Cloud](security-center-os-coverage.md) to make sure your operating system is supported. For more information, see [Existing log analytics customers](./faq-azure-monitor-logs.yml).
101+
- If you have an environment where the Log Analytics agent is installed on client workstations and reporting to an existing Log Analytics workspace, review the list of [operating systems supported by Microsoft Defender for Cloud](security-center-os-coverage.md) to make sure your operating system is supported.
102102

103103
Learn more about [working with the Log Analytics agent](working-with-log-analytics-agent.md).
104104

articles/defender-for-iot/organizations/how-to-investigate-sensor-detections-in-a-device-inventory.md

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Manage your OT device inventory from a sensor console
33
description: Learn how to view and manage OT devices (assets) from the Device inventory page on a sensor console.
4-
ms.date: 07/21/2022
4+
ms.date: 02/28/2023
55
ms.topic: how-to
66
---
77

@@ -49,7 +49,13 @@ If you're working with a cloud-connected sensor, any edits you make in the senso
4949

5050
**To edit device details**:
5151

52-
1. Select one or more devices in the grid, and then select **View full details** in the pane on the right.
52+
1. Select a device in the grid, and then select **Edit** in the toolbar at the top of the page.
53+
54+
1. In the **Edit** pane on the right, modify the device fields as needed, and then select **Save** when you're done.
55+
56+
You can also open the edit pane from the device details page:
57+
58+
1. Select a device in the grid, and then select **View full details** in the pane on the right.
5359

5460
1. In the device details page, select **Edit Properties**.
5561

@@ -61,8 +67,9 @@ Editable fields include:
6167
- Device name
6268
- Device type
6369
- OS
64-
- Purdue layer
70+
- Purdue level
6571
- Description
72+
- Scanner or programming device
6673

6774
For more information, see [Device inventory column reference](#device-inventory-column-reference).
6875

@@ -91,11 +98,9 @@ For example, if you merge two devices, each with an IP address, both IP addresse
9198

9299
**To merge devices from the device inventory:**
93100

94-
1. Use the SHIFT key to select two devices from the inventory, and then right-click one of them.
101+
In the device inventory grid, select the devices you want to merge, and then select **Merge** in the toolbar at the top of the page.
95102

96-
1. Select **Merge** to merge the devices. This can take up to 2 minutes to complete.
97-
98-
1. When the **Set merge device attributes** dialog appears, enter a meaningful name for your merged device, and then select **Save**.
103+
The devices are merged, and a confirmation message appears at the top right.
99104

100105
## View inactive devices
101106

@@ -120,14 +125,17 @@ You may want to delete devices from your device inventory, such as if they've be
120125

121126
Deleted devices are removed from the **Device map** and the device inventories on the Azure portal and on-premises management console, and aren't calculated when generating reports, such as Data Mining, Risk Assessment, or Attack Vector reports.
122127

123-
**To delete a single device**:
128+
**To delete one or more devices**:
129+
130+
You can delete a device when it's been inactive for more than 10 minutes.
131+
132+
1. In the **Device inventory** page, select the device or devices you want to delete, and then select **Delete** :::image type="icon" source="media/how-to-manage-device-inventory-on-the-cloud/delete-device.png" border="false"::: in the toolbar at the top of the page.
124133

125-
You can delete a single device when they’ve been inactive for more than 10 minutes.
134+
1. At the prompt, select **Confirm** to confirm that you want to delete the device from Defender for IoT.
126135

127-
1. In the **Device inventory** page, select the device you want to delete, and then select **Delete** :::image type="icon" source="media/how-to-manage-device-inventory-on-the-cloud/delete-device.png" border="false"::: in the toolbar at the top of the page.
128-
1. At the prompt, select **Yes** to confirm that you want to delete the device from Defender for IoT.
136+
A confirmation message appears at the top right.
129137

130-
**To delete all inactive devices**
138+
**To delete all inactive devices**:
131139

132140
This procedure is supported for the *cyberx* and admin users only.
133141

articles/defender-for-iot/organizations/references-data-retention.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ The following table lists how long device data is stored in each Defender for Io
1818
| Storage type | Details |
1919
|---------|---------|
2020
| **Azure portal** | 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your device inventory from the Azure portal](how-to-manage-device-inventory-for-organizations.md). |
21-
| **OT network sensor** | The retention of device inventory data isn't limited by time. <br><br> For more information, see [Manage your OT device inventory from a sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md). |
22-
| **On-premises management console** | The retention of device inventory data isn't limited by time. <br><br> For more information, see [Manage your OT device inventory from an on-premises management console](how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md). |
21+
| **OT network sensor** | 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your OT device inventory from a sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md). |
22+
| **On-premises management console** | 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your OT device inventory from an on-premises management console](how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md). |
2323

2424
## Alert data retention
2525

0 commit comments

Comments
 (0)