You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/integrations/arcsight.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,8 @@ For more information, see the [ArcSight SmartConnectors Documentation](https://w
28
28
29
29
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to ArcSight.
30
30
31
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
32
+
31
33
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
32
34
33
35
1. Sign in to your OT sensor console and select **Forwarding** on the left.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/integrations/logrhythm.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,8 @@ Before you begin, make sure that you have the following prerequisites:
19
19
20
20
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to LogRhythm.
21
21
22
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
23
+
22
24
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
23
25
24
26
1. Sign in to your OT sensor console and select **Forwarding** on the left.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/integrations/netwitness.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,8 @@ Before you begin, make sure that you have the following prerequisites:
21
21
22
22
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to NetWitness.
23
23
24
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
25
+
24
26
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
25
27
26
28
1. Sign in to your OT sensor console and select **Forwarding** on the left.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/integrations/service-now-legacy.md
+19-15Lines changed: 19 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,45 +7,47 @@ ms.date: 08/11/2022
7
7
8
8
# Tutorial: Integrate ServiceNow with Microsoft Defender for IoT (legacy)
9
9
10
-
> [!Note]
10
+
> [!NOTE]
11
11
> A new [Operational Technology Manager](https://store.servicenow.com/sn_appstore_store.do#!/store/application/31eed0f72337201039e2cb0a56bf65ef/1.1.2?referer=%2Fstore%2Fsearch%3Flistingtype%3Dallintegrations%25253Bancillary_app%25253Bcertified_apps%25253Bcontent%25253Bindustry_solution%25253Boem%25253Butility%25253Btemplate%26q%3Doperational%2520technology%2520manager&sl=sh) integration is now available from the ServiceNow store. The new integration streamlines Microsoft Defender for IoT sensor appliances, OT assets, network connections, and vulnerabilities to ServiceNow’s Operational Technology (OT) data model.
12
12
>
13
13
>Please read the ServiceNow’s supporting links and docs for the ServiceNow's terms of service.
14
14
>
15
15
>Microsoft Defender for IoT's legacy integration with ServiceNow is not affected by the new integrations and Microsoft will continue supporting it.
16
16
>
17
17
> For more information, see the new [ServiceNow integrations](../tutorial-servicenow.md), and the ServiceNow documentation on the ServiceNow store:
This tutorial will help you learn how to integrate, and use ServiceNow with Microsoft Defender for IoT.
22
23
23
24
The Defender for IoT integration with ServiceNow provides a new level of centralized visibility, monitoring, and control for the IoT and OT landscape. These bridged platforms enable automated device visibility and threat management to previously unreachable ICS & IoT devices.
24
25
25
-
The ServiceNow Configuration Management Database (CMDB) is enriched, and supplemented with a rich set of device attributes that are pushed by the Defender for IoT platform. This ensures a comprehensive, and continuous visibility into the device landscape. This visibility lets you monitor, and respond from a single-pane-of-glass.
26
+
The ServiceNow Configuration Management Database (CMDB) is enriched, and supplemented with a rich set of device attributes that are pushed by the Defender for IoT platform. This ensures a comprehensive, and continuous visibility into the device landscape. This visibility lets you monitor, and respond from a single-pane-of-glass.
26
27
27
28
In this tutorial, you learn how to:
28
29
29
30
> [!div class="checklist"]
30
-
> * Download the Defender for IoT application in ServiceNow
31
-
> * Set up Defender for IoT to communicate with ServiceNow
32
-
> * Create access tokens in ServiceNow
33
-
> * Send Defender for IoT device attributes to ServiceNow
34
-
> * Set up the integration using an HTTPS proxy
35
-
> * View Defender for IoT detections in ServiceNow
36
-
> * View connected devices
31
+
>
32
+
> - Download the Defender for IoT application in ServiceNow
33
+
> - Set up Defender for IoT to communicate with ServiceNow
34
+
> - Create access tokens in ServiceNow
35
+
> - Send Defender for IoT device attributes to ServiceNow
36
+
> - Set up the integration using an HTTPS proxy
37
+
> - View Defender for IoT detections in ServiceNow
38
+
> - View connected devices
37
39
38
40
## Prerequisites
39
41
40
42
### Software requirements
41
43
42
-
Access to ServiceNow and Defender for IoT
44
+
Access to ServiceNow and Defender for IoT
43
45
44
46
- ServiceNow Service Management version 3.0.2.
45
47
46
48
- Defender for IoT patch 2.8.11.1 or above.
47
49
48
-
> [!Note]
50
+
> [!NOTE]
49
51
>If you are already working with a Defender for IoT and ServiceNow integration and upgrade using the on-premises management console. In that case, the previous data from Defender for IoT sensors should be cleared from ServiceNow.
50
52
51
53
### Architecture
@@ -58,7 +60,7 @@ Access to ServiceNow and Defender for IoT
58
60
59
61
## Download the Defender for IoT application in ServiceNow
60
62
61
-
To access the Defender for IoT application within ServiceNow, you will need to download the application from the ServiceNow application store.
63
+
To access the Defender for IoT application within ServiceNow, you will need to download the application from the ServiceNow application store.
62
64
63
65
**To access the Defender for IoT application in ServiceNow**:
64
66
@@ -82,6 +84,8 @@ To access the Defender for IoT application within ServiceNow, you will need to d
82
84
83
85
Configure Defender for IoT to push alert information to the ServiceNow tables. Defender for IoT alerts will appear in ServiceNow as security incidents. This can be done by defining a Defender for IoT forwarding rule to send alert information to ServiceNow.
84
86
87
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
88
+
85
89
**To push alert information to the ServiceNow tables**:
86
90
87
91
1. Sign in to the on-premises management console.
@@ -123,7 +127,7 @@ Configure Defender for IoT to push alert information to the ServiceNow tables. D
123
127
| Client Secret | Enter the client secret string you created for Defender for IoT in the **Application Registries** page in ServiceNow. |
124
128
| Report Type |**Incidents**: Forward a list of alerts that are presented in ServiceNow with an incident ID and short description of each alert.<br /><br />**Defender for IoT Application**: Forward full alert information, including the sensor details, the engine, the source, and destination addresses. The information is forwarded to the Defender for IoT on the ServiceNow application. |
125
129
126
-
1. Select **SAVE**.
130
+
1. Select **SAVE**.
127
131
128
132
Defender for IoT alerts will now appear as incidents in ServiceNow.
129
133
@@ -189,7 +193,7 @@ Defender for IoT supports an HTTPS proxy in the ServiceNow integration by enabli
189
193
190
194
3. Select **Save and Exit**.
191
195
192
-
4. Reset the on-premises management console using the following command:
196
+
4. Reset the on-premises management console using the following command:
193
197
194
198
```bash
195
199
sudo monit restart all
@@ -227,4 +231,4 @@ There are no resources to clean up.
227
231
228
232
## Next steps
229
233
230
-
In this article, you learned how to get started with the ServiceNow integration. Continue on to learn about our [Cisco integration](../tutorial-forescout.md).
234
+
In this article, you learned how to get started with the ServiceNow integration. Continue on to learn about our [Cisco integration](../tutorial-forescout.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/tutorial-clearpass.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,7 @@ The integration allows for the following:
25
25
In this tutorial, you learn how to:
26
26
27
27
> [!div class="checklist"]
28
+
>
28
29
> - Create a ClearPass API user
29
30
> - Create a ClearPass operator profile
30
31
> - Create a ClearPass OAuth API client
@@ -151,6 +152,8 @@ To enable viewing the device inventory in ClearPass, you need to set up Defender
151
152
152
153
To enable viewing the alerts discovered by Defender for IoT in Aruba, you need to set the forwarding rule. This rule defines which information about the ICS, and SCADA security threats identified by Defender for IoT security engines is sent to ClearPass.
153
154
155
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
156
+
154
157
**To define a ClearPass forwarding rule on the Defender for IoT sensor**:
155
158
156
159
1. In the Defender for IoT sensor, select **Forwarding** and then select **Create new rule**.
@@ -166,13 +169,12 @@ To enable viewing the alerts discovered by Defender for IoT in Aruba, you need t
166
169
1. In the **Host** field, define the ClearPass server IP and port to send alert information.
167
170
1. Define which alert information you want to forward.
168
171
-**Report illegal function codes:** Protocol violations - Illegal field value violating ICS protocol specification (potential exploit).
169
-
-**Report unauthorized PLC programming and firmware updates:** Unauthorized PLC changes.
## Monitor ClearPass and Defender for IoT communication
177
179
178
180
Once the sync has started, endpoint data is populated directly into the Policy Manager EndpointDb, you can view the last update time from the integration configuration screen.
@@ -183,7 +185,6 @@ Once the sync has started, endpoint data is populated directly into the Policy M
:::image type="content" source="media/tutorial-clearpass/last-sync.png" alt-text="Screenshot of the view the time and date of your last sync.":::
188
189
189
190
If Sync is not working, or shows an error, then it’s likely you’ve missed capturing some of the information. Recheck the data recorded, additionally you can view the API calls between Defender for IoT and ClearPass from **Guest** > **Administration** > **Support** > **Application Log**.
@@ -198,6 +199,4 @@ There are no resources to clean up.
198
199
199
200
## Next steps
200
201
201
-
In this article, you learned how to get started with the ClearPass integration. Continue on to learn about our [CyberArk integration](./tutorial-cyberark.md).
202
-
203
-
202
+
In this article, you learned how to get started with the ClearPass integration. Continue on to learn about our [CyberArk integration](./tutorial-cyberark.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/tutorial-fortinet.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,7 @@ Using a Business Services view, the complexity of managing network and security
37
37
In this tutorial, you learn how to:
38
38
39
39
> [!div class="checklist"]
40
+
>
40
41
> - Create an API key in Fortinet
41
42
> - Set a forwarding rule to block malware-related alerts
42
43
> - Block the source of suspicious alerts
@@ -96,6 +97,8 @@ When the API key is generated, save it as it will not be provided again.
96
97
97
98
The FortiGate firewall can be used to block suspicious traffic.
98
99
100
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
101
+
99
102
**To set a forwarding rule to block malware-related alerts**:
100
103
101
104
1. Sign in to the Microsoft Defender for IoT Management Console.
@@ -172,6 +175,8 @@ Each Defender for IoT alert is then parsed without any other configuration on th
172
175
173
176
You can then use Defender for IoT's Forwarding Rules to send alert information to FortiSIEM.
174
177
178
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
179
+
175
180
**To use Defender for IoT's Forwarding Rules to send alert information to FortiSIEM**:
176
181
177
182
1. From the sensor, or management console left pane, select **Forwarding**.
@@ -252,5 +257,3 @@ There are no resources to clean up.
252
257
## Next steps
253
258
254
259
In this article, you learned how to get started with the Fortinet integration. Continue on to learn about our [Palo Alto integration](./tutorial-palo-alto.md)
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/tutorial-palo-alto.md
+12-8Lines changed: 12 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,7 @@ The following integration types are available:
20
20
In this tutorial, you learn how to:
21
21
22
22
> [!div class="checklist"]
23
+
>
23
24
> - Configure immediate blocking by a specified Palo Alto firewall
24
25
> - Create Panorama blocking policies in Defender for IoT
25
26
@@ -33,7 +34,9 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
33
34
34
35
## Configure immediate blocking by a specified Palo Alto firewall
35
36
36
-
In cases, such as malware-related alerts, you can enable automatic blocking. Defender for IoT forwarding rules is utilized to send a blocking command directly to a specific Palo Alto firewall.
37
+
In cases, such as malware-related alerts, you can enable automatic blocking. Defender for IoT forwarding rules are utilized to send a blocking command directly to a specific Palo Alto firewall.
38
+
39
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
37
40
38
41
When Defender for IoT identifies a critical threat, it sends an alert that includes an option of blocking the infected source. Selecting **Block Source** in the alert’s details activates the forwarding rule, which sends the blocking command to the specified Palo Alto firewall.
39
42
@@ -106,15 +109,15 @@ The first step in creating Panorama blocking policies in Defender for IoT is to
106
109
107
110
1. In the console left pane, select **System settings** > **Network monitoring** > **DNS Reverse Lookup**.
108
111
1. Select **Add DNS server**.
109
-
1. In the **Schedule Reverse Lookup** field define the scheduling options:
112
+
1. In the **Schedule Reverse Lookup** field, define the scheduling options:
110
113
- By specific times: Specify when to perform the reverse lookup daily.
111
-
- By fixed intervals (in hours): Set the frequency for performing the reverse lookup.
112
-
1. In the **Number of Labels** field instruct Defender for IoT to automatically resolve network IP addresses to device FQDNs. <br />To configure DNS FQDN resolution, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
114
+
- By fixed intervals (in hours): Set the frequency for performing the reverse lookup.
115
+
1. In the **Number of Labels** field instruct Defender for IoT to automatically resolve network IP addresses to device FQDNs. <br />To configure DNS FQDN resolution, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
113
116
1. Add the following server details:
114
117
115
-
-**DNS Server Address**: Enter the IP address, or the FQDN of the network DNS Server.
116
-
-**DNS Server Port**: Enter the port used to query the DNS server.
117
-
-**Subnets**: Set the Dynamic IP address subnet range. The range that Defender for IoT reverses lookup their IP address in the DNS server to match their current FQDN name.
118
+
-**DNS Server Address**: Enter the IP address, or the FQDN of the network DNS Server.
119
+
-**DNS Server Port**: Enter the port used to query the DNS server.
120
+
-**Subnets**: Set the Dynamic IP address subnet range. The range that Defender for IoT reverses lookup their IP address in the DNS server to match their current FQDN name.
118
121
119
122
1. Select **Save**.
120
123
1. Turn on the **Enabled** toggle to activate the lookup.
@@ -125,6 +128,8 @@ The first step in creating Panorama blocking policies in Defender for IoT is to
125
128
126
129
Suspicious traffic will need to be blocked with the Palo Alto firewall. You can block suspicious traffic through the use forwarding rules in Defender for IoT.
127
130
131
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
132
+
128
133
**To block suspicious traffic with the Palo Alto firewall using a Defender for IoT forwarding rule**:
129
134
130
135
1. In the left pane, select **Forwarding**.
@@ -191,4 +196,3 @@ There are no resources to clean up.
191
196
## Next step
192
197
193
198
In this article, you learned how to get started with the [Palo Alto integration](./tutorial-splunk.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/tutorial-qradar.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,6 +72,8 @@ A **QID** is a QRadar event identifier. Since all Defender for IoT reports are t
72
72
73
73
Create a forwarding rule from your on-premises management console to forward alerts to QRadar.
74
74
75
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
76
+
75
77
**To create a QRadar forwarding rule**:
76
78
77
79
1. Sign in to the on-premises management console and select **Forwarding** on the left.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/tutorial-splunk.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,7 @@ The Splunk application can be installed locally ('Splunk Enterprise') or run on
24
24
In this tutorial, you learn how to:
25
25
26
26
> [!div class="checklist"]
27
+
>
27
28
> * Download the Defender for IoT application in Splunk
28
29
> * Send Defender for IoT alerts to Splunk
29
30
@@ -35,17 +36,17 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
35
36
36
37
The following versions are required for the application to run.
37
38
38
-
- Defender for IoT version 2.4 and above.
39
+
* Defender for IoT version 2.4 and above.
39
40
40
-
- Splunkbase version 11 and above.
41
+
* Splunkbase version 11 and above.
41
42
42
-
- Splunk Enterprise version 7.2 and above.
43
+
* Splunk Enterprise version 7.2 and above.
43
44
44
45
### Splunk permission requirements
45
46
46
47
The following Splunk permission is required:
47
48
48
-
- Any user with an *Admin* level user role.
49
+
* Any user with an *Admin* level user role.
49
50
50
51
## Download the Defender for IoT application in Splunk
51
52
@@ -65,15 +66,15 @@ To access the Defender for IoT application within Splunk, you will need to downl
65
66
66
67
The Defender for IoT alerts provides information about an extensive range of security events. These events include:
67
68
68
-
- Deviations from the learned baseline network activity.
69
+
* Deviations from the learned baseline network activity.
69
70
70
-
- Malware detections.
71
+
* Malware detections.
71
72
72
-
- Detections based on suspicious operational changes.
73
+
* Detections based on suspicious operational changes.
73
74
74
-
- Network anomalies.
75
+
* Network anomalies.
75
76
76
-
- Protocol deviations from protocol specifications.
77
+
* Protocol deviations from protocol specifications.
77
78
78
79
:::image type="content" source="media/tutorial-splunk/address-scan.png" alt-text="A screen capture if an Address Scan Detected alert.":::
79
80
@@ -83,6 +84,8 @@ You can also configure Defender for IoT to send alerts to the Splunk server, whe
83
84
84
85
To send alert information to the Splunk servers from Defender for IoT, you will need to create a Forwarding Rule.
85
86
87
+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
88
+
86
89
**To create the forwarding rule**:
87
90
88
91
1. Sign in to the sensor, and select **Forwarding** from the left side pane.
0 commit comments