Skip to content

Commit 07d33fc

Browse files
authored
Merge pull request #8 from batamig/patch-312
adding dns allowlist
2 parents dc0bb42 + f0f7536 commit 07d33fc

File tree

1 file changed

+27
-9
lines changed

1 file changed

+27
-9
lines changed

articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md

Lines changed: 27 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,10 @@ This article describes the following methods for reducing OT network alert fatig
2020

2121
## Prerequisites
2222

23-
- To create alert comments or custom alert rules on an OT network sensor, you must have:
23+
- To create alert comments or custom alert rules on an OT network sensor, you must have an OT network sensor installed and access to the sensor as an **Admin** user.
2424

25-
- An OT network sensor installed
26-
- Access to the sensor as an **Admin** user.
27-
28-
- To create alert exclusion rules on an on-premises management console, you must have:
29-
30-
- An on-premises management console installed
31-
- Access to the on-premises management console as an **Admin** user.
25+
- To create a DNS allowlist on an OT sensor, you must have an OT network sensor installed and access to the sensor as a **Support** user.
26+
- To create alert exclusion rules on an on-premises management console, you must have an on-premises management console installed and access to the on-premises management console as an **Admin** user.
3227

3328
For more information, see [Install OT agentless monitoring software](how-to-install-software.md) and [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
3429

@@ -89,6 +84,29 @@ Disable custom alert rules to prevent them from running without deleting them al
8984

9085
In the **Custom alert rules** page, select one or more rules, and then select **Disable**, **Enable**, or **Delete** in the toolbar as needed.
9186

87+
## Learn DNS traffic on an OT sensor
88+
89+
*Learn* unauthorized internet alerts in bulk by creating an allowlist of domain names on your OT sensor.
90+
91+
When a DNS allowlist is configured, the sensor checks each unauthorized internet connectivity attempt against the list. If the domain's FQDN is included in the allowlist, the sensor learns the traffic automatically, without triggering an alert.
92+
93+
**To define a DNS allowlist:**
94+
95+
1. Sign into your OT sensor as the *support* user and select the **Support** page.
96+
97+
1. In the search box, search for **DNS** and then locate the engine with the **Internet Domain Allowlist** description.
98+
99+
1. Select **Edit** :::image type="icon" source="media/how-to-generate-reports/manage-icon.png" border="false"::: for the **Internet Domain Allowlist** row. For example:
100+
101+
:::image type="content" source="media/how-to-manage-individual-sensors/dns-edit-configuration.png" alt-text="Screenshot of how to edit configurations for DNS in the sensor console." lightbox="media/how-to-manage-individual-sensors/dns-edit-configuration.png":::
102+
103+
1. In the **Edit configuration** pane > **Fqdn allowlist** field, enter one or more domain names. Separate multiple domain names with commas. Your sensor won't generate alerts for unauthorized internet connectivity attempts on the configured domains.
104+
105+
1. Select **Submit** to save your changes.
106+
107+
> [!TIP]
108+
> All OT sensor users can view the currently configured list of domains in a data mining report, including the FQDNs and resolved IP addresses, and the last resolution time. For more information, see [Create data mining queries](how-to-create-data-mining-queries.md).
109+
92110
## Create alert exclusion rules on an on-premises management console
93111

94112
Create alert exclusion rules to instruct your sensors to ignore specific traffic on your network that would otherwise trigger an alert.
@@ -146,4 +164,4 @@ For more information, see
146164
> [View and manage alerts on the the on-premises management console](how-to-work-with-alerts-on-premises-management-console.md)
147165
148166
> [!div class="nextstepaction"]
149-
> [Microsoft Defender for IoT alerts](alerts.md)
167+
> [Microsoft Defender for IoT alerts](alerts.md)

0 commit comments

Comments
 (0)