You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/alert-engine-messages.md
+24-17Lines changed: 24 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,24 +1,31 @@
1
1
---
2
2
title: Alert types and descriptions
3
3
description: Review Defender for IoT Alert descriptions.
4
-
ms.date: 11/09/2021
4
+
ms.date: 12/13/2021
5
5
ms.topic: how-to
6
6
---
7
7
8
8
# Alert types and descriptions
9
9
10
-
This article provides information on the alert types, descriptions, and severity that may be generated from the Defender for IoT engines. This information can be used to help map alerts into playbooks, define forwarding rules, exclusion rules, and custom alerts as well as define the appropriate rules within a SIEM. Alerts appear in the Alerts window, which allows you to manage the alert event.
10
+
This article provides information on the alert types, descriptions, and severity that may be generated from the Defender for IoT engines. This information can be used to help map alerts into playbooks, define Forwarding rules, Exclusion rules, and custom alerts as well as define the appropriate rules within a SIEM. Alerts appear in the Alerts window, which allows you to manage the alert event.
11
+
12
+
> [!NOTE]
13
+
> This article contains references to the term *slave*, a term that Microsoft no longer uses. When the term is removed from the software, it will be removed from this article.
14
+
15
+
### Alert news
16
+
17
+
New alerts may be added and existing alerts may be updated or disabled. Certain disabled alerts can be re-enabled from the Support page of the sensor console. Alerts tht can be re-enabled are marked with an asterisk (*) in the tables below.
18
+
19
+
You may have configured newly disabled alerts in your Forwarding rules. If this is the case, you may need to update related Defender for IoT Exclusion rules, or update SIEM rules and playbooks where relevant.
20
+
21
+
See [What's new in Microsoft Defender for IoT?](release-notes.md#whats-new-in-microsoft-defender-for-iot) for detailed information about changes made to alerts.
11
22
12
23
## Policy engine alerts
13
24
14
25
Policy engine alerts describe detected deviations from learned baseline behavior.
15
26
16
-
>[!NOTE]
17
-
> This article contains references to the term *slave*, a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
18
-
19
27
| Title | Description | Severity |
20
28
|--|--|--|
21
-
| Abnormal usage of MAC Addresses | A new source device was detected on the network but has not been authorized. | Minor |
22
29
| Beckhoff Software Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
23
30
| Database Login Failed | A failed login attempt was detected from a source device to a destination server. This might be the result of human error, but could also indicate a malicious attempt to compromise the server or data on it. | Major |
24
31
| Emerson ROC Firmware Version Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
| Function Code Raised Unauthorized Exception | A source device (slave) returned an exception to a destination device (master). | Major |
32
39
| GOOSE Message Type Settings | Message (identified by protocol ID) settings were changed on a source device. | Warning |
33
40
| Honeywell Firmware Version Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
34
-
| Illegal HTTP Communication | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
41
+
|* Illegal HTTP Communication | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
35
42
| Internet Access Detected | A source device defined as part of your network is communicating with Internet addresses. The source is not authorized to communicate with Internet addresses. | Major |
36
43
| Mitsubishi Firmware Version Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
37
44
| Modbus Address Range Violation | A master device requested access to a new slave memory address. | Major |
| New Activity Detected - Unauthorized DeltaV Message Type | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
53
60
| New Activity Detected - Unauthorized DeltaV ROC Operation | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
54
61
| New Activity Detected - Unauthorized RPC Message Type | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
55
-
| New Activity Detected - Unauthorized RPC Procedure Invocation | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
56
62
| New Activity Detected - Using AMS Protocol Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
57
63
| New Activity Detected - Using Siemens SICAM Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
58
64
| New Activity Detected - Using Suitelink Protocol command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
59
65
| New Activity Detected - Using Suitelink Protocol sessions | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
60
66
| New Activity Detected - Using Yokogawa VNetIP Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
61
-
| New Asset Detected | A new source device was detected on the network but has not been authorized. | Major |
67
+
| New Asset Detected | A new source device was detected on the network but has not been authorized. (Note that this alert applies to devices discovered in OT subnets. New devices discoverd in IT subnets do not trigger an alert.) | Major |
62
68
| New LLDP Device Configuration | A new source device was detected on the network but has not been authorized. | Major |
63
69
| Omron FINS Unauthorized Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
64
70
| S7 Plus PLC Firmware Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
| Unauthorized GE SRTP Protocol Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
80
86
| Unauthorized GE SRTP System Memory Operation | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
81
87
| Unauthorized HTTP Activity | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
82
-
| Unauthorized HTTP Server | An unauthorized application was detected on a source device. The application has not been authorized as a learned application on your network. | Major |
83
-
| Unauthorized HTTP SOAP Action | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
84
-
| Unauthorized HTTP User Agent | An unauthorized application was detected on a source device. The application has not been authorized as a learned application on your network. | Major |
88
+
| * Unauthorized HTTP SOAP Action | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
89
+
| * Unauthorized HTTP User Agent | An unauthorized application was detected on a source device. The application has not been authorized as a learned application on your network. | Major |
85
90
| Unauthorized Internet Connectivity Detected | A source device defined as part of your network is communicating with Internet addresses. The source is not authorized to communicate with Internet addresses. | Critical |
86
91
| Unauthorized Mitsubishi MELSEC Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
87
92
| Unauthorized MMS Program Access | A source device attempted to access a resource on another device. An access attempt to this resource between these two devices has not been authorized as learned traffic on your network. | Major |
| Abnormal Exception Pattern in Slave | An excessive number of errors were detected on a source device. This may be the result of an operational issue. | Minor |
123
-
| Abnormal HTTP Header Length | The source device sent an abnormal message. This may indicate an attempt to attack the destination device. | Critical |
124
-
| Abnormal Number of Parameters in HTTP Header | The source device sent an abnormal message. This may indicate an attempt to attack the destination device. | Critical |
128
+
|* Abnormal HTTP Header Length | The source device sent an abnormal message. This may indicate an attempt to attack the destination device. | Critical |
129
+
|* Abnormal Number of Parameters in HTTP Header | The source device sent an abnormal message. This may indicate an attempt to attack the destination device. | Critical |
125
130
| Abnormal Periodic Behavior In Communication Channel | A change in the frequency of communication between the source and destination devices was detected. | Minor |
126
131
| Abnormal Termination of Applications | An excessive number of stop commands were detected on a source device. This may be the result of an operational issue or an attempt to manipulate the device. | Major |
127
132
| Abnormal Traffic Bandwidth | Abnormal bandwidth was detected on a channel. Bandwidth appears to be significantly lower/higher than previously detected. For details, work with the Total Bandwidth widget. | Warning |
| Excessive Restart Rate of an Outstation | An excessive number of restart commands were detected on a source device. This may be the result of an operational issue or an attempt to manipulate the device. | Major |
136
141
| Excessive SMB login attempts | A source device was seen performing excessive login attempts to a destination server. This may be a brute force attack. The server may be compromised by a malicious actor. | Critical |
137
142
| ICMP Flooding | An abnormal quantity of packets was detected in the network. This could indicate an attack, for example, an ARP spoofing or ICMP flooding attack. | Warning |
138
-
| Illegal HTTP Header Content | The source device initiated an invalid request. | Critical |
143
+
|* Illegal HTTP Header Content | The source device initiated an invalid request. | Critical |
139
144
| Inactive Communication Channel | A communication channel between two devices was inactive during a period in which activity is usually seen. This might indicate that the program generating this traffic was changed, or the program might be unavailable. It is recommended to review the configuration of installed program and verify it is configured properly. | Warning |
140
145
| Long Duration Address Scan Detected | A source device was detected scanning network devices. This device has not been authorized as a network scanning device. | Critical |
141
146
| Password Guessing Attempt Detected | A source device was seen performing excessive login attempts to a destination server. This may be a brute force attack. The server may be compromised by a malicious actor. | Critical |
| GOOSE Control Block Requires Further Configuration | A source device sent a GOOSE message indicating that the device needs commissioning. This means the GOOSE control block requires further configuration and GOOSE messages are partially or completely non-operational. | Major |
233
238
| GOOSE Dataset Configuration was Changed | A message (identified by protocol ID) dataset was changed on a source device. This means the device will report a different dataset for this message. | Warning |
234
239
| Honeywell Controller Unexpected Status | A Honeywell Controller sent an unexpected diagnostic message indicating a status change. | Warning |
235
-
| HTTP Client Error | The source device initiated an invalid request. | Warning |
240
+
|* HTTP Client Error | The source device initiated an invalid request. | Warning |
236
241
| Illegal IP Address | System detected traffic between a source device and IP address which is an invalid address. This may indicate wrong configuration or an attempt to generate illegal traffic. | Minor |
237
242
| Master-Slave Authentication Error | The authentication process between a DNP3 source device (master) and a destination device (outstation) failed. | Minor |
238
243
| MMS Service Request Failed | A server returned an error code. This indicates a server error or an invalid request by a client. | Major |
| Outstation's Corrupted Configuration Detected | This DNP3 source device (outstation) reported a corrupted configuration. | Major |
246
251
| Profinet DCP Command Failed | A server returned an error code. This indicates a server error or an invalid request by a client. | Major |
247
252
| Profinet Device Factory Reset | A source device sent a factory reset command to a Profinet destination device. The reset command clears Profinet device configurations and stops its operation. | Warning |
248
-
| RPC Operation Failed | A server returned an error code. This indicates a server error or an invalid request by a client. | Major |
253
+
|* RPC Operation Failed | A server returned an error code. This indicates a server error or an invalid request by a client. | Major |
249
254
| Sampled Values Message Dataset Configuration was Changed | A message (identified by protocol ID) dataset was changed on a source device. This means the device will report a different dataset for this message. | Warning |
250
255
| Slave Device Unrecoverable Failure | An unrecoverable condition error was detected on a source device. This kind of error usually indicates a hardware failure or failure to perform a specific command. | Major |
251
256
| Suspicion of Hardware Problems in Outstation | An unrecoverable condition error was detected on a source device. This kind of error usually indicates a hardware failure or failure to perform a specific command. | Major |
252
257
| Suspicion of Unresponsive MODBUS Device | A source device did not respond to a command sent to it. It may have been disconnected when the command was sent. | Minor |
253
258
| Traffic Detected on Sensor Interface | A sensor resumed detecting network traffic on a network interface. | Warning |
254
259
260
+
\* The alert is disabled by default, but can be enabled again. To enable the alert, navigate to the Support page, find the alert and select **Enable**.You need administrative level permissions to access the Support page.
261
+
255
262
## Next steps
256
263
257
264
You can [Manage alert events](how-to-manage-the-alert-event.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/release-notes.md
+62-1Lines changed: 62 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://az
15
15
16
16
## Versioning and support for Defender for IoT
17
17
18
-
Listed below are the support, breaking change policies for Defender for IoT, and the versions of Defender for IoT that are currently available.
18
+
Listed below are the support, breaking change policies for Microsoft Defender for IoT, and the versions of Microsoft Defender for IoT that are currently available.
19
19
20
20
### Servicing information and timelines
21
21
@@ -29,6 +29,67 @@ Microsoft plans to release updates for Defender for IoT no less than once per qu
29
29
| 10.3 | 04/2021 | 01/2022 |
30
30
| 10.5.2 | 10/2021 | 07/2022 |
31
31
| 10.5.3 | 10/2021 | 07/2022 |
32
+
| 10.5.4 | 12/2021 | 09/2022 |
33
+
34
+
## December 2021
35
+
36
+
Version 10.5.4 of Microsoft Defender for IoT delivers important alert enhancements:
37
+
38
+
- Alerts for certain minor events or edge-cases are now disabled.
39
+
- For certain scenarios, similar alert are minimized in a single alert message.
40
+
41
+
These changes reduce alert volume and enable more efficient targeting and analysis of security and operational events.
42
+
43
+
### Alerts permanently disabled
44
+
45
+
The alerts listed below are permanently disabled with version 10.5.4. Detection and monitoring are still supported for traffic associated with the alerts.
46
+
47
+
**Policy engine alerts**
48
+
49
+
- RPC Procedure Invocations
50
+
- Unauthorized HTTP Server
51
+
- Abnormal usage of MAC Addresses
52
+
53
+
### Alerts disabled by default
54
+
55
+
The alerts listed below are disabled by default with version 10.5.4. You can re-enable the alerts from the Support page of the sensor console, if required.
56
+
57
+
**Anomaly engine alert**
58
+
- Abnormal Number of Parameters in HTTP Header
59
+
- Abnormal HTTP Header Length
60
+
- Illegal HTTP Header Content
61
+
62
+
**Operational engine alerts**
63
+
- HTTP Client Error
64
+
- RPC Operation Failed
65
+
66
+
**Policy engine alerts**
67
+
68
+
Disabling these alerts also disables monitoring of related traffic. Specifically, this traffic will not be reported in Data Mining reports.
69
+
70
+
- Illegal HTTP Communication alert and HTTP Connections Data Mining traffic
71
+
- Unauthorized HTTP User Agent alert and HTTP User Agents Data Mining traffic
72
+
- Unauthorized HTTP SOAP Action and HTTP SOAP Actions Data Mining traffic
73
+
74
+
### Updated Alert Functionality
75
+
76
+
**Unauthorized Database Operation alert**
77
+
Previously, this alert covered DDL and DML alerting and Data Mining reporting. Now:
78
+
- DDL traffic: alerting and monitoring are supported.
79
+
- DML traffic: Monitoring is supported. Alerting is not supported.
80
+
81
+
**New Asset Detected alert**
82
+
This alert is disabled for new devices detected in IT subnets. The New Asset Detected alert is still triggered for new devices discovered in OT subnets. OT subnets are detected automatically and can be updated by users if required.
83
+
84
+
### Minimized Alerting
85
+
86
+
Alert triggering for specific scenarios has been minimized to help reduce alert volume and simplify alert investigation. In these scenarios, if a device performs repeated activity on targets, an alert is triggered once. Previously, a new alert was triggered each time the same activity was carried out.
87
+
88
+
This new functionality is available on the following alerts:
89
+
90
+
- Port Scan Detected alerts, based on activity of the source device (generated by the Anomaly engine)
91
+
- Malware alerts, based on activity of the source device. (generated by the Malware engine).
92
+
- Suspicion of Denial of Service Attack alerts, based on activity of the destination device (generated by the Malware engine)
0 commit comments