Skip to content

Commit 0e1493b

Browse files
authored
Merge pull request #183015 from shhazam-ms/Fastlane--10.5.4
Fastlane 10.5.4
2 parents a1d19b0 + 253b716 commit 0e1493b

File tree

4 files changed

+87
-19
lines changed

4 files changed

+87
-19
lines changed

articles/defender-for-iot/organizations/alert-engine-messages.md

Lines changed: 24 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,31 @@
11
---
22
title: Alert types and descriptions
33
description: Review Defender for IoT Alert descriptions.
4-
ms.date: 11/09/2021
4+
ms.date: 12/13/2021
55
ms.topic: how-to
66
---
77

88
# Alert types and descriptions
99

10-
This article provides information on the alert types, descriptions, and severity that may be generated from the Defender for IoT engines. This information can be used to help map alerts into playbooks, define forwarding rules, exclusion rules, and custom alerts as well as define the appropriate rules within a SIEM. Alerts appear in the Alerts window, which allows you to manage the alert event.
10+
This article provides information on the alert types, descriptions, and severity that may be generated from the Defender for IoT engines. This information can be used to help map alerts into playbooks, define Forwarding rules, Exclusion rules, and custom alerts as well as define the appropriate rules within a SIEM. Alerts appear in the Alerts window, which allows you to manage the alert event.
11+
12+
> [!NOTE]
13+
> This article contains references to the term *slave*, a term that Microsoft no longer uses. When the term is removed from the software, it will be removed from this article.
14+
15+
### Alert news
16+
17+
New alerts may be added and existing alerts may be updated or disabled. Certain disabled alerts can be re-enabled from the Support page of the sensor console. Alerts tht can be re-enabled are marked with an asterisk (*) in the tables below.
18+
19+
You may have configured newly disabled alerts in your Forwarding rules. If this is the case, you may need to update related Defender for IoT Exclusion rules, or update SIEM rules and playbooks where relevant.
20+
21+
See [What's new in Microsoft Defender for IoT?](release-notes.md#whats-new-in-microsoft-defender-for-iot) for detailed information about changes made to alerts.
1122

1223
## Policy engine alerts
1324

1425
Policy engine alerts describe detected deviations from learned baseline behavior.
1526

16-
>[!NOTE]
17-
> This article contains references to the term *slave*, a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
18-
1927
| Title | Description | Severity |
2028
|--|--|--|
21-
| Abnormal usage of MAC Addresses | A new source device was detected on the network but has not been authorized. | Minor |
2229
| Beckhoff Software Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
2330
| Database Login Failed | A failed login attempt was detected from a source device to a destination server. This might be the result of human error, but could also indicate a malicious attempt to compromise the server or data on it. | Major |
2431
| Emerson ROC Firmware Version Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
@@ -31,7 +38,7 @@ Policy engine alerts describe detected deviations from learned baseline behavior
3138
| Function Code Raised Unauthorized Exception | A source device (slave) returned an exception to a destination device (master). | Major |
3239
| GOOSE Message Type Settings | Message (identified by protocol ID) settings were changed on a source device. | Warning |
3340
| Honeywell Firmware Version Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
34-
| Illegal HTTP Communication | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
41+
| * Illegal HTTP Communication | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
3542
| Internet Access Detected | A source device defined as part of your network is communicating with Internet addresses. The source is not authorized to communicate with Internet addresses. | Major |
3643
| Mitsubishi Firmware Version Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
3744
| Modbus Address Range Violation | A master device requested access to a new slave memory address. | Major |
@@ -52,13 +59,12 @@ Policy engine alerts describe detected deviations from learned baseline behavior
5259
| New Activity Detected - Unauthorized DeltaV Message Type | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
5360
| New Activity Detected - Unauthorized DeltaV ROC Operation | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
5461
| New Activity Detected - Unauthorized RPC Message Type | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
55-
| New Activity Detected - Unauthorized RPC Procedure Invocation | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
5662
| New Activity Detected - Using AMS Protocol Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
5763
| New Activity Detected - Using Siemens SICAM Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
5864
| New Activity Detected - Using Suitelink Protocol command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
5965
| New Activity Detected - Using Suitelink Protocol sessions | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
6066
| New Activity Detected - Using Yokogawa VNetIP Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
61-
| New Asset Detected | A new source device was detected on the network but has not been authorized. | Major |
67+
| New Asset Detected | A new source device was detected on the network but has not been authorized. (Note that this alert applies to devices discovered in OT subnets. New devices discoverd in IT subnets do not trigger an alert.) | Major |
6268
| New LLDP Device Configuration | A new source device was detected on the network but has not been authorized. | Major |
6369
| Omron FINS Unauthorized Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
6470
| S7 Plus PLC Firmware Changed | Firmware was updated on a source device. This may be authorized activity, for example a planned maintenance procedure. | Major |
@@ -79,9 +85,8 @@ Policy engine alerts describe detected deviations from learned baseline behavior
7985
| Unauthorized GE SRTP Protocol Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
8086
| Unauthorized GE SRTP System Memory Operation | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
8187
| Unauthorized HTTP Activity | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
82-
| Unauthorized HTTP Server | An unauthorized application was detected on a source device. The application has not been authorized as a learned application on your network. | Major |
83-
| Unauthorized HTTP SOAP Action | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
84-
| Unauthorized HTTP User Agent | An unauthorized application was detected on a source device. The application has not been authorized as a learned application on your network. | Major |
88+
| * Unauthorized HTTP SOAP Action | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
89+
| * Unauthorized HTTP User Agent | An unauthorized application was detected on a source device. The application has not been authorized as a learned application on your network. | Major |
8590
| Unauthorized Internet Connectivity Detected | A source device defined as part of your network is communicating with Internet addresses. The source is not authorized to communicate with Internet addresses. | Critical |
8691
| Unauthorized Mitsubishi MELSEC Command | New traffic parameters were detected. This parameter combination has not been authorized as learned traffic on your network. The following combination is unauthorized. | Major |
8792
| Unauthorized MMS Program Access | A source device attempted to access a resource on another device. An access attempt to this resource between these two devices has not been authorized as learned traffic on your network. | Major |
@@ -120,8 +125,8 @@ Anomaly engine alerts describe detected anomalies in network activity.
120125
| Title | Description | Severity |
121126
|--|--|--|
122127
| Abnormal Exception Pattern in Slave | An excessive number of errors were detected on a source device. This may be the result of an operational issue. | Minor |
123-
| Abnormal HTTP Header Length | The source device sent an abnormal message. This may indicate an attempt to attack the destination device. | Critical |
124-
| Abnormal Number of Parameters in HTTP Header | The source device sent an abnormal message. This may indicate an attempt to attack the destination device. | Critical |
128+
| * Abnormal HTTP Header Length | The source device sent an abnormal message. This may indicate an attempt to attack the destination device. | Critical |
129+
| * Abnormal Number of Parameters in HTTP Header | The source device sent an abnormal message. This may indicate an attempt to attack the destination device. | Critical |
125130
| Abnormal Periodic Behavior In Communication Channel | A change in the frequency of communication between the source and destination devices was detected. | Minor |
126131
| Abnormal Termination of Applications | An excessive number of stop commands were detected on a source device. This may be the result of an operational issue or an attempt to manipulate the device. | Major |
127132
| Abnormal Traffic Bandwidth | Abnormal bandwidth was detected on a channel. Bandwidth appears to be significantly lower/higher than previously detected. For details, work with the Total Bandwidth widget. | Warning |
@@ -135,7 +140,7 @@ Anomaly engine alerts describe detected anomalies in network activity.
135140
| Excessive Restart Rate of an Outstation | An excessive number of restart commands were detected on a source device. This may be the result of an operational issue or an attempt to manipulate the device. | Major |
136141
| Excessive SMB login attempts | A source device was seen performing excessive login attempts to a destination server. This may be a brute force attack. The server may be compromised by a malicious actor. | Critical |
137142
| ICMP Flooding | An abnormal quantity of packets was detected in the network. This could indicate an attack, for example, an ARP spoofing or ICMP flooding attack. | Warning |
138-
| Illegal HTTP Header Content | The source device initiated an invalid request. | Critical |
143+
|* Illegal HTTP Header Content | The source device initiated an invalid request. | Critical |
139144
| Inactive Communication Channel | A communication channel between two devices was inactive during a period in which activity is usually seen. This might indicate that the program generating this traffic was changed, or the program might be unavailable. It is recommended to review the configuration of installed program and verify it is configured properly. | Warning |
140145
| Long Duration Address Scan Detected | A source device was detected scanning network devices. This device has not been authorized as a network scanning device. | Critical |
141146
| Password Guessing Attempt Detected | A source device was seen performing excessive login attempts to a destination server. This may be a brute force attack. The server may be compromised by a malicious actor. | Critical |
@@ -232,7 +237,7 @@ Operational engine alerts describe detected operational incidents, or malfunctio
232237
| GOOSE Control Block Requires Further Configuration | A source device sent a GOOSE message indicating that the device needs commissioning. This means the GOOSE control block requires further configuration and GOOSE messages are partially or completely non-operational. | Major |
233238
| GOOSE Dataset Configuration was Changed | A message (identified by protocol ID) dataset was changed on a source device. This means the device will report a different dataset for this message. | Warning |
234239
| Honeywell Controller Unexpected Status | A Honeywell Controller sent an unexpected diagnostic message indicating a status change. | Warning |
235-
| HTTP Client Error | The source device initiated an invalid request. | Warning |
240+
|* HTTP Client Error | The source device initiated an invalid request. | Warning |
236241
| Illegal IP Address | System detected traffic between a source device and IP address which is an invalid address. This may indicate wrong configuration or an attempt to generate illegal traffic. | Minor |
237242
| Master-Slave Authentication Error | The authentication process between a DNP3 source device (master) and a destination device (outstation) failed. | Minor |
238243
| MMS Service Request Failed | A server returned an error code. This indicates a server error or an invalid request by a client. | Major |
@@ -245,13 +250,15 @@ Operational engine alerts describe detected operational incidents, or malfunctio
245250
| Outstation's Corrupted Configuration Detected | This DNP3 source device (outstation) reported a corrupted configuration. | Major |
246251
| Profinet DCP Command Failed | A server returned an error code. This indicates a server error or an invalid request by a client. | Major |
247252
| Profinet Device Factory Reset | A source device sent a factory reset command to a Profinet destination device. The reset command clears Profinet device configurations and stops its operation. | Warning |
248-
| RPC Operation Failed | A server returned an error code. This indicates a server error or an invalid request by a client. | Major |
253+
| * RPC Operation Failed | A server returned an error code. This indicates a server error or an invalid request by a client. | Major |
249254
| Sampled Values Message Dataset Configuration was Changed | A message (identified by protocol ID) dataset was changed on a source device. This means the device will report a different dataset for this message. | Warning |
250255
| Slave Device Unrecoverable Failure | An unrecoverable condition error was detected on a source device. This kind of error usually indicates a hardware failure or failure to perform a specific command. | Major |
251256
| Suspicion of Hardware Problems in Outstation | An unrecoverable condition error was detected on a source device. This kind of error usually indicates a hardware failure or failure to perform a specific command. | Major |
252257
| Suspicion of Unresponsive MODBUS Device | A source device did not respond to a command sent to it. It may have been disconnected when the command was sent. | Minor |
253258
| Traffic Detected on Sensor Interface | A sensor resumed detecting network traffic on a network interface. | Warning |
254259

260+
\* The alert is disabled by default, but can be enabled again. To enable the alert, navigate to the Support page, find the alert and select **Enable**.You need administrative level permissions to access the Support page.
261+
255262
## Next steps
256263

257264
You can [Manage alert events](how-to-manage-the-alert-event.md).

articles/defender-for-iot/organizations/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ metadata:
1313
author: elazark
1414
ms.author: v-ekrieg
1515
manager: raynew
16-
ms.date: 11/09/2021
16+
ms.date: 11/29/2021
1717

1818
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
1919

328 KB
Loading

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 62 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://az
1515

1616
## Versioning and support for Defender for IoT
1717

18-
Listed below are the support, breaking change policies for Defender for IoT, and the versions of Defender for IoT that are currently available.
18+
Listed below are the support, breaking change policies for Microsoft Defender for IoT, and the versions of Microsoft Defender for IoT that are currently available.
1919

2020
### Servicing information and timelines
2121

@@ -29,6 +29,67 @@ Microsoft plans to release updates for Defender for IoT no less than once per qu
2929
| 10.3 | 04/2021 | 01/2022 |
3030
| 10.5.2 | 10/2021 | 07/2022 |
3131
| 10.5.3 | 10/2021 | 07/2022 |
32+
| 10.5.4 | 12/2021 | 09/2022 |
33+
34+
## December 2021
35+
36+
Version 10.5.4 of Microsoft Defender for IoT delivers important alert enhancements:
37+
38+
- Alerts for certain minor events or edge-cases are now disabled.
39+
- For certain scenarios, similar alert are minimized in a single alert message.
40+
41+
These changes reduce alert volume and enable more efficient targeting and analysis of security and operational events.
42+
43+
### Alerts permanently disabled
44+
45+
The alerts listed below are permanently disabled with version 10.5.4. Detection and monitoring are still supported for traffic associated with the alerts.
46+
47+
**Policy engine alerts**
48+
49+
- RPC Procedure Invocations
50+
- Unauthorized HTTP Server
51+
- Abnormal usage of MAC Addresses
52+
53+
### Alerts disabled by default
54+
55+
The alerts listed below are disabled by default with version 10.5.4. You can re-enable the alerts from the Support page of the sensor console, if required.
56+
57+
**Anomaly engine alert**
58+
- Abnormal Number of Parameters in HTTP Header
59+
- Abnormal HTTP Header Length
60+
- Illegal HTTP Header Content
61+
62+
**Operational engine alerts**
63+
- HTTP Client Error
64+
- RPC Operation Failed
65+
66+
**Policy engine alerts**
67+
68+
Disabling these alerts also disables monitoring of related traffic. Specifically, this traffic will not be reported in Data Mining reports.
69+
70+
- Illegal HTTP Communication alert and HTTP Connections Data Mining traffic
71+
- Unauthorized HTTP User Agent alert and HTTP User Agents Data Mining traffic
72+
- Unauthorized HTTP SOAP Action and HTTP SOAP Actions Data Mining traffic
73+
74+
### Updated Alert Functionality
75+
76+
**Unauthorized Database Operation alert**
77+
Previously, this alert covered DDL and DML alerting and Data Mining reporting. Now:
78+
- DDL traffic: alerting and monitoring are supported.
79+
- DML traffic: Monitoring is supported. Alerting is not supported.
80+
81+
**New Asset Detected alert**
82+
This alert is disabled for new devices detected in IT subnets. The New Asset Detected alert is still triggered for new devices discovered in OT subnets. OT subnets are detected automatically and can be updated by users if required.
83+
84+
### Minimized Alerting
85+
86+
Alert triggering for specific scenarios has been minimized to help reduce alert volume and simplify alert investigation. In these scenarios, if a device performs repeated activity on targets, an alert is triggered once. Previously, a new alert was triggered each time the same activity was carried out.
87+
88+
This new functionality is available on the following alerts:
89+
90+
- Port Scan Detected alerts, based on activity of the source device (generated by the Anomaly engine)
91+
- Malware alerts, based on activity of the source device. (generated by the Malware engine).
92+
- Suspicion of Denial of Service Attack alerts, based on activity of the destination device (generated by the Malware engine)
3293

3394
## November 2021
3495

0 commit comments

Comments
 (0)