Skip to content

Commit 05c60a0

Browse files
Merge pull request #233863 from Shereen-Bhar/sensor-version-22.3.8-release
sensor version 22.3.8 release
2 parents 2660cd1 + ab1be94 commit 05c60a0

11 files changed

+74
-36
lines changed

articles/defender-for-iot/organizations/concept-supported-protocols.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,15 +17,14 @@ OT network sensors can detect the following protocols when identifying assets an
1717
|Brand / Vendor |Protocols |
1818
|---------|---------|
1919
|**ABB** | ABB 800xA DCS (IEC61850 MMS including ABB extension)<br> CNCP<br> RNRP<br> ABB IAC<br> ABB Totalflow |
20-
|**Samsung** | Samsung TV |
2120
|**ASHRAE** | BACnet<br> BACnet BACapp<br> BACnet BVLC |
2221
|**Beckhoff** | AMS (ADS)<br> Twincat |
2322
|**Cisco** | CAPWAP Control<br> CAPWAP Data<br> CDP<br> LWAPP |
2423
|**DNP. org** | DNP3 |
2524
|**Emerson** | DeltaV<br> DeltaV - Discovery<br> Emerson OpenBSI/BSAP<br> Ovation DCS ADMD<br>Ovation DCS DPUSTAT<br> Ovation DCS SSRPC |
2625
|**Emerson Fischer** | ROC |
2726
|**Eurocontrol** | ASTERIX |
28-
|**GE** | Bentley Nevada (System 1 / BN3500)<br> EGD<br> GSM (GE MarkVI and MarkVIe)<br> SRTP (GE)<br> GE_CMP |
27+
|**GE** | Bentley Nevada (System 1 / BN3500)<br>ClassicSDI (MarkVle) <br> EGD<br> GSM (GE MarkVI and MarkVIe)<br> InterSite<br> SDI (MarkVle) <br> SRTP (GE)<br> GE_CMP |
2928
|**Generic Applications** | Active Directory<br> RDP<br> Teamviewer<br> VNC<br> |
3029
|**Honeywell** | ENAP<br> Experion DCS CDA<br> Experion DCS FDA<br> Honeywell EUCN <br> Honeywell Discovery |
3130
|**IEC** | Codesys V3<br>IEC 60870-5-7 (IEC 62351-3 + IEC 62351-5)<br> IEC 60870-5-101 (encapsulated serial)<br> IEC 60870-5-103 (encapsulated serial)<br> IEC 60870-5-104<br> IEC 60870-5-104 ASDU_APCI<br> IEC 60870 ICCP TASE.2<br> IEC 61850 GOOSE<br> IEC 61850 MMS<br> IEC 61850 SMV (SAMPLED-VALUES)<br> LonTalk (LonWorks) |
@@ -38,12 +37,13 @@ OT network sensors can detect the following protocols when identifying assets an
3837
|**Omron** | FINS |
3938
|**OPC** | UA |
4039
|**Oracle** | TDS<br> TNS |
41-
|**Rockwell Automation** | ENIP<br> EtherNet/IP CIP (including Rockwell extension)<br> EtherNet/IP CIP FW version 27 and above |
40+
|**Rockwell Automation** | CSP2<br> ENIP<br> EtherNet/IP CIP (including Rockwell extension)<br> EtherNet/IP CIP FW version 27 and above |
41+
|**Samsung** | Samsung TV |
4242
|**Schneider Electric** | Modbus/TCP<br> Modbus TCP–Schneider Unity Extensions<br> OASYS (Schneider Electric Telvant)<br> Schneider TSAA |
4343
|**Schneider Electric / Invensys** | Foxboro Evo<br> Foxboro I/A<br> Trident<br> TriGP<br> TriStation |
4444
|**Schneider Electric / Modicon** | Modbus RTU |
4545
|**Schneider Electric / Wonderware** | Wonderware Suitelink |
46-
|**Siemens** | CAMP<br> PCS7<br> PCS7 WinCC – Historian<br> Profinet DCP<br> Profinet Realtime<br> Siemens PHD<br> Siemens S7<br> Siemens S7-Plus<br> Siemens SICAM<br> Siemens WinCC |
46+
|**Siemens** | CAMP<br> PCS7<br> PCS7 WinCC – Historian<br> Profinet DCP<br> Profinet I/O<br> Profinet Realtime<br> Siemens PHD<br> Siemens S7<br> Siemens S7 - Firmware and model extraction<br> Siemens S7 – key state<br> Siemens S7-Plus<br> Siemens SICAM<br> Siemens WinCC |
4747
|**Toshiba** |Toshiba Computer Link |
4848
|**Yokogawa** | Centum ODEQ (Centum / ProSafe DCS)<br> HIS Equalize<br> FA-M3<br> Vnet/IP |
4949

@@ -70,7 +70,7 @@ Enterprise IoT network sensors can detect the following protocols when identifyi
7070

7171
Asset vendors, partners, or platform owners can use Defender for IoT's Horizon Protocol SDK to secure any OT protocol used in IoT and ICS environments that's not isn't already supported by default.
7272

73-
Horizon helps you to write plugins for OT sensors that enable Deep Packet Inspection (DPI) on the traffic and detect threats in realtime. Customize your plugins localize and customize text for alerts, events, and protocol parameters.
73+
Horizon helps you to write plugins for OT sensors that enable Deep Packet Inspection (DPI) on the traffic and detect threats in real-time. Customize your plugins localize and customize text for alerts, events, and protocol parameters.
7474

7575
Horizon provides:
7676

articles/defender-for-iot/organizations/configure-windows-endpoint-monitoring.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,7 @@ If you'll be using a non-admin account to run your WEM scans, this procedure is
177177

178178
For more information, see:
179179

180+
- [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md)
180181
- [View your device inventory from a sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md)
181182
- [View your device inventory from the Azure portal](how-to-manage-device-inventory-for-organizations.md)
182183
- [Configure active monitoring for OT networks](configure-active-monitoring.md)

articles/defender-for-iot/organizations/detect-windows-endpoints-script.md

Lines changed: 27 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The script described in this article returns the following details about each de
2020
- Installed programs
2121
- Last knowledge base update
2222

23-
If an OT network sensor has already learned the device, running the script outlined in this article retrieves the device's information and enrichment data.
23+
If an OT network sensor has already detected the device, running the script outlined in this article retrieves the device's information and enrichment data.
2424

2525
## Prerequisites
2626

@@ -43,15 +43,17 @@ The script described in this article is supported for the following Windows oper
4343
- Windows 10
4444
- Windows Server 2003/2008/2012/2016/2019
4545

46-
## Run the script
46+
## Download and run the script
4747

48-
This procedure describes how to obtain, deploy, and run the script on the Windows workstation and servers that you want to monitor in Defender for IoT.
48+
This procedure describes how to deploy and run a script on the Windows workstation and servers that you want to monitor in Defender for IoT.
4949

50-
The script you run to detect enriched Windows data is run as a utility and not as an installed program. Running the script doesn't affect the endpoint.
50+
The script detects enriched Windows data, and is run as a utility and not an installed program. Running the script doesn't affect the endpoint. You may want to deploy the script once, or using ongoing automation, using standard automated deployment methods and tools.
5151

52-
1. To acquire the script, [contact customer support](mailto:support.microsoft.com).
52+
1. Sign into your OT sensor console, and select **System Settings** > **Import Settings** > **Windows Information**.
53+
54+
1. Select **Download script**. For example:
5355

54-
1. Deploy the script once, or using ongoing automation, using standard automated deployment methods and tools.
56+
:::image type="content" source="media/detect-windows-endpoints-script/download-wmi-script.png" alt-text="Screenshot of where to download WMI script." lightbox="media/detect-windows-endpoints-script/download-wmi-script.png":::
5557

5658
1. Copy the script to a local drive and unzip it. The following files appear:
5759

@@ -62,17 +64,17 @@ The script you run to detect enriched Windows data is run as a utility and not a
6264

6365
1. Run the `run.bat` file.
6466

65-
After the script runs to probe the registry, a CX-snapshot file appears with the registry information. The filename indicates the system name, date, and time of the snapshot with the following syntax: `CX-snaphot_SystemName_Month_Year_Time`
67+
After the script runs to probe the registry, a CX-snapshot file appears with the registry information. The filename indicates the machine name and the current date and time of the snapshot with the following syntax: `cx_snapshot_[machinename]_[current date time]`.
6668

67-
Files generated by the script:
69+
Files generated by the script include:
6870

6971
- Remain on the local drive until you delete them.
7072
- Must remain in the same location. Don't separate the generated files.
7173
- Are overwritten if you run the script again.
7274

7375
## Import device details
7476

75-
After having run the script as described [earlier](#run-the-script), import the generated data to your sensor to view the device details in the **Device inventory**.
77+
After having run the script as described [earlier](#download-and-run-the-script), import the generated data to your sensor to view the device details in the **Device inventory**.
7678

7779
**To import device details to your sensor**:
7880

@@ -84,11 +86,24 @@ After having run the script as described [earlier](#run-the-script), import the
8486

8587
1. Select **Import File**, and then select all the files (Ctrl+A).
8688

87-
1. Select **Close**. The device registry information is imported and a successful confirmation message is shown.
89+
:::image type="content" source="media/detect-windows-endpoints-script/import-wmi-script.png" alt-text="Screenshot of where to import WMI script." lightbox="media/detect-windows-endpoints-script/import-wmi-script.png":::
90+
91+
## View devices applications report
92+
93+
After [downloading and running](#download-and-run-the-script) the script, then [importing](#import-device-details) the generated data to your sensor, you can view your devices applications with a custom data mining report.
94+
95+
**To view the devices applications:**
8896

89-
If there's a problem uploading one of the files, you'll be informed which file upload failed.
97+
1. Sign into your OT sensor console, and select **Data mining**.
98+
99+
1. Select **+ Create report** to [create a custom report](how-to-create-data-mining-queries.md#create-an-ot-sensor-custom-data-mining-report). In the **Choose Category** field, select **Devices Applications**. For example:
100+
101+
:::image type="content" source="media/detect-windows-endpoints-script/devices-applications-report.png" alt-text="Screenshot of creating devices applications custom report." lightbox="media/detect-windows-endpoints-script/devices-applications-report.png":::
102+
103+
1. Your devices applications report is shown in the **My reports** area.
104+
105+
Based on this information, the Windows device installed applications CVE list will be displayed in Azure if the sensor is cloud-connected.
90106

91107
## Next steps
92108

93109
For more information, see [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md) and [Import extra data for detected OT devices](how-to-import-device-information.md).
94-

articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,9 @@ The following procedures describe how to deploy updated SSL/TLS certificates, su
143143

144144
If an upload fails, contact your security or IT administrator. For more information, see [SSL/TLS certificate requirements for on-premises resources](best-practices/certificate-requirements.md) and [Create SSL/TLS certificates for OT appliances](ot-deploy/create-ssl-certificates.md).
145145

146-
1. In the **Validation for on-premises management console certificates** area, select **Required** if SSL/TLS certificate validation is required. Otherwise, select **None**.
146+
1. In the **Validation of on-premises management console certificate** area, select **Mandatory** if SSL/TLS certificate validation is required. Otherwise, select **None**.
147147

148-
If you've selected **Required** and validation fails, communication between relevant components is halted, and a validation error is shown on the sensor. For more information, see [CRT file requirements](best-practices/certificate-requirements.md#crt-file-requirements).
148+
If you've selected **Mandatory** and validation fails, communication between relevant components is halted, and a validation error is shown on the sensor. For more information, see [CRT file requirements](best-practices/certificate-requirements.md#crt-file-requirements).
149149

150150
1. Select **Save** to save your certificate settings.
151151

@@ -177,7 +177,7 @@ When you're done, use the following procedures to validate your certificate file
177177

178178
1. Select the **Confirm** option to confirm the warning.
179179

180-
1. In the **Validation for on-premises management console certificates** area, select **Required** if SSL/TLS certificate validation is required. Otherwise, select **None**.
180+
1. In the **Validation of on-premises management console certificate** area, select **Mandatory** if SSL/TLS certificate validation is required. Otherwise, select **None**.
181181

182182
If this option is toggled on and validation fails, communication between relevant components is halted, and a validation error is shown on the sensor. For more information, see [CRT file requirements](best-practices/certificate-requirements.md#crt-file-requirements).
183183

articles/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map.md

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To view devices across multiple sensors in a zone, you'll also need an on-premis
3131
- Starred devices are those that had been marked as important
3232
- Devices with no alerts are shown in black, or grey in the zoomed-in connections view
3333

34-
For example:
34+
For example:
3535

3636
:::image type="content" source="media/how-to-work-with-maps/device-map-default.png" alt-text="Screenshot of a default view of an OT sensor's device map." lightbox="media/how-to-work-with-maps/device-map-default.png":::
3737

@@ -45,7 +45,7 @@ To view devices across multiple sensors in a zone, you'll also need an on-premis
4545
- The number of devices grouped in a subnet in an IT network, if relevant. This number of devices is shown in a black circle.
4646
- Whether the device is newly detected or unauthorized.
4747

48-
1. Right-click a specific device and select **View properties** to drill down further to the **Map View** tab on the device's [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
48+
1. Right-click a specific device and select **View properties** to drill down further to the **Map View** tab on the device's [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
4949

5050
### Modify the OT sensor map display
5151

@@ -73,7 +73,6 @@ To see device details, select a device and expand the device details pane on the
7373
- Select **Event Timeline** to jump to the device's [event timeline](how-to-track-sensor-activity.md)
7474
- Select **Device Details** to jump to a full [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
7575

76-
7776
### View IT subnets from an OT sensor device map
7877

7978
By default, IT devices are automatically aggregated by [subnet](how-to-control-what-traffic-is-monitored.md#define-ot-and-iot-subnets), so that the map focuses on your local OT and IoT networks.
@@ -94,7 +93,6 @@ By default, IT devices are automatically aggregated by [subnet](how-to-control-w
9493
1. Sign into your OT sensor and select **Device map**.
9594
1. Select one or more expanded subnets and then select **Collapse All**.
9695

97-
9896
## Create a custom device group
9997

10098
In addition to OT sensor's [built-in device groups](#built-in-device-map-groups), create new custom groups as needed to use when highlighting or filtering devices on the map.
@@ -103,7 +101,7 @@ In addition to OT sensor's [built-in device groups](#built-in-device-map-groups)
103101

104102
1. In the **Add custom group** pane:
105103

106-
- In the **Name** field, enter a meaningful name for your group, with up to 30 characters.
104+
- In the **Name** field, enter a meaningful name for your group, with up to 30 characters.
107105
- From the **Copy from groups** menu, select any groups you want to copy devices from.
108106
- From the **Devices** menu, select any extra devices to add to your group.
109107

@@ -113,12 +111,11 @@ Use one of the following options to import and export device data:
113111

114112
- **Import Devices**. Select to import devices from a pre-configured .CSV file.
115113
- **Export Devices**. Select to export all currently displayed devices, with full details, to a .CSV file.
116-
- **Export Device Summary**. Select to export a high level summary of all currently displayed devices to a .CSV file.
117-
114+
- **Export Device Summary**. Select to export a high level summary of all currently displayed devices to a .CSV file.
118115

119116
## Edit devices
120117

121-
1. Sign into an OT sensor and select **Device map**.
118+
1. Sign into an OT sensor and select **Device map**.
122119

123120
1. Right-click a device to open the device options menu, and then select any of the following options:
124121

@@ -142,13 +139,12 @@ You can only merge [authorized devices](device-inventory.md#unauthorized-devices
142139

143140
> [!IMPORTANT]
144141
> You can't undo a device merge. If you mistakenly merged two devices, delete the devices and then wait for the sensor to rediscover both.
145-
>
146142
147143
**To merge multiple devices**:
148144

149145
1. Sign into your OT sensor and select **Device map**.
150146

151-
1. Select the authorized devices you want to merge by using the SHIFT key to select more than one device, and then right-click and select **Merge**.
147+
1. Select the authorized devices you want to merge by using the SHIFT key to select more than one device, and then right-click and select **Merge**.
152148

153149
1. At the prompt, select **Confirm** to confirm that you want to merge the devices.
154150

@@ -189,7 +185,6 @@ You may have situations where you'd want to handle multiple notifications togeth
189185

190186
When you handle multiple notifications together, you may still have remaining notifications that need to be handled manually, such as for new IP addresses or no subnets detected.
191187

192-
193188
### Device notification responses
194189

195190
The following table lists available responses for each notification, and when we recommend using each one:
@@ -198,7 +193,7 @@ The following table lists available responses for each notification, and when we
198193
|--|--|--|--|
199194
| **New IP detected** | A new IP address is associated with the device. This may occur in the following scenarios: <br><br>- A new or additional IP address was associated with a device already detected, with an existing MAC address.<br><br> - A new IP address was detected for a device that's using a NetBIOS name. <br /><br /> - An IP address was detected as the management interface for a device associated with a MAC address. <br /><br /> - A new IP address was detected for a device that's using a virtual IP address. | - **Set Additional IP to Device**: Merge the devices <br />- **Replace Existing IP**: Replaces any existing IP address with the new address <br /> - **Dismiss**: Remove the notification. |**Dismiss** |
200195
| **No subnets configured** | No subnets are currently configured in your network. <br /><br /> We recommend configuring subnets for the ability to differentiate between OT and IT devices on the map. | - **Open Subnet Configuration** and [configure subnets](how-to-control-what-traffic-is-monitored.md#define-ot-and-iot-subnets). <br />- **Dismiss**: Remove the notification. |**Dismiss** |
201-
| **Operating system changes** | One or more new operating systems have been associated with the device. | - Select the name of the new OS that you want to associate with the device.<br /> - **Dismiss**: Remove the notification. |No automatic handling|
196+
| **Operating system changes** | One or more new operating systems have been associated with the device. | - Select the name of the new OS that you want to associate with the device.<br /> - **Dismiss**: Remove the notification. | Set with new operating system only if not already configured manually. <br><br>If the operating system has already been configured: **Dismiss**. |
202197
| **New subnets** | New subnets were discovered. |- **Learn**: Automatically add the subnet.<br />- **Open Subnet Configuration**: Add all missing subnet information.<br />- **Dismiss**: <br />Remove the notification. |**Dismiss** |
203198
| **Device type changes** | A new device type has been associated with the device. | - **Set as {…}**: Associate the new type with the device.<br />- **Dismiss**: Remove the notification. |No automatic handling|
204199

@@ -233,7 +228,6 @@ On the on-premises management console, zone maps show all network elements relat
233228

234229
1. Right-click a device shown in red and select **View alerts** to jump to the **Alerts page**, with alerts filtered only for the selected device.
235230

236-
237231
## Built-in device map groups
238232

239233
The following table lists the device groups available out-of-the-box on the OT sensor **Device map** page. [Create extra, custom groups](#create-a-custom-device-group) as needed for your organization.
@@ -257,4 +251,3 @@ The following table lists the device groups available out-of-the-box on the OT s
257251
## Next steps
258252

259253
For more information, see [Investigate sensor detections in a Device Inventory](how-to-investigate-sensor-detections-in-a-device-inventory.md).
260-
147 KB
Loading
135 KB
Loading
135 KB
Loading
489 Bytes
Loading

0 commit comments

Comments
 (0)