Skip to content

Commit 1c6eb79

Browse files
authored
Merge pull request #207680 from batamig/root-trust
adding root of trust statement
2 parents 375f204 + 23812ea commit 1c6eb79

16 files changed

+65
-10
lines changed

articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-on-premises-management-console.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@ After you sign in for the first time, you need to activate the on-premises manag
4444

4545
The on-premises management console can be associated to one or more subscriptions. The activation file is associated with all the selected subscriptions and the number of committed devices at the time of download.
4646

47+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
48+
4749
:::image type="content" source="media/how-to-manage-sensors-from-the-on-premises-management-console/multiple-subscriptions.png" alt-text="Screenshot that shows selecting multiple subscriptions." lightbox="media/how-to-manage-sensors-from-the-on-premises-management-console/multiple-subscriptions.png":::
4850

4951
If you haven't already onboarded Defender for IoT to a subscription, see [Onboard a Defender for IoT plan for OT networks](how-to-manage-subscriptions.md#onboard-a-defender-for-iot-plan-for-ot-networks).

articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-sensor.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,11 @@ Before signing in to the sensor console, administrator users should have access
3333

3434
- The activation file associated with this sensor. The file was generated and downloaded during sensor onboarding by Defender for IoT.
3535

36+
3637
- An SSL/TLS CA-signed certificate that your company requires.
3738

39+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
40+
3841
### About activation files
3942

4043
Your sensor was onboarded to Microsoft Defender for IoT in a specific management mode:

articles/defender-for-iot/organizations/how-to-create-and-manage-users.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -259,6 +259,8 @@ You can recover the password for the on-premises management console or the senso
259259

260260
:::image type="content" source="media/how-to-create-and-manage-users/enter-identifier.png" alt-text="Screenshot of entering enter the unique identifier and then selecting recover." lightbox="media/how-to-create-and-manage-users/enter-identifier.png":::
261261

262+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
263+
262264
1. On the Password recovery screen, select **Upload**. **The Upload Password Recovery File** window will open.
263265

264266
1. Select **Browse** to locate your `password_recovery.zip` file, or drag the `password_recovery.zip` to the window.

articles/defender-for-iot/organizations/how-to-install-software.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ Mount the ISO file using one of the following options:
2121

2222
- **Virtual mount** – use iLO for HPE appliances, or iDRAC for Dell appliances to boot the ISO file.
2323

24+
2425
## Pre-installation configuration
2526

2627
Each appliance type comes with its own set of instructions that are required before installing Defender for IoT software.

articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -51,15 +51,17 @@ You might need to upload a new activation file for an onboarded sensor when:
5151
1. Use the search bar to find the sensor you just added, and select it.
5252
1. Select the three dots (...) on the row and select **Download activation file**.
5353

54-
6. Save the file.
54+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
5555

56-
7. Sign in to the Defender for IoT sensor console.
56+
1. Save the file.
5757

58-
8. Select **System Settings** > **Sensor management** > **Subscription & Activation Mode**.
58+
1. Sign in to the Defender for IoT sensor console.
59+
60+
1. Select **System Settings** > **Sensor management** > **Subscription & Activation Mode**.
5961

60-
9. Select **Upload** and select the file that you saved.
62+
1. Select **Upload** and select the file that you saved.
6163

62-
10. Select **Activate**.
64+
1. Select **Activate**.
6365

6466
### Troubleshoot activation file upload
6567

@@ -355,6 +357,8 @@ This feature is supported for the following sensor versions:
355357
- **22.1.1** - Download a diagnostic log from the sensor console
356358
- **22.1.3** - For locally-managed sensors, [upload a diagnostics log](how-to-manage-sensors-on-the-cloud.md#upload-a-diagnostics-log-for-support-public-preview) from the **Sites and sensors** page in the Azure portal. This file is automatically sent to support when you open a ticket on a cloud-connected sensor.
357359

360+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
361+
358362
**To download a diagnostics log**:
359363

360364
1. On the sensor console, select **System settings** > **Backup & Restore** > **Backup**.

articles/defender-for-iot/organizations/how-to-manage-sensors-from-the-on-premises-management-console.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,12 @@ You can define the following sensor system settings from the management console:
5757

5858
## Update threat intelligence packages
5959

60-
The data package for threat intelligence is provided with each new Defender for IoT version, or if needed between releases. The package contains signatures (including malware signatures), CVEs, and other security content.
60+
The data package for threat intelligence is provided with each new Defender for IoT version, or if needed between releases. The package contains signatures (including malware signatures), CVEs, and other security content.
61+
62+
You can manually upload this file in the Azure portal and automatically update it to sensors.
63+
64+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
6165

62-
You can manually upload this file in the Azure portal and automatically update it to sensors.
6366

6467
**To update the threat intelligence data:**
6568

articles/defender-for-iot/organizations/how-to-manage-subscriptions.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,11 @@ Once you've onboarded a plan for Enterprise IoT networks from Defender for Endpo
105105

106106
### About Defender for IoT trials
107107

108-
If you would like to evaluate Defender for IoT, you can use a trial commitment. The trial is valid for 30 days and supports 1000 committed devices. Using the trial lets you deploy one or more Defender for IoT sensors on your network. Use the sensors to monitor traffic, analyze data, generate alerts, learn about network risks and vulnerabilities, and more. The trial also allows you to download an on-premises management console to view aggregated information generated by sensors.
108+
If you would like to evaluate Defender for IoT, you can use a trial commitment.
109+
110+
The trial is valid for 30 days and supports 1000 committed devices. Using the trial lets you deploy one or more Defender for IoT sensors on your network to monitor traffic, analyze data, generate alerts, learn about network risks and vulnerabilities, and more.
111+
112+
The trial also allows you to install an on-premises management console to view aggregated information generated by sensors.
109113

110114
## Edit a plan for OT networks
111115

articles/defender-for-iot/organizations/how-to-manage-the-on-premises-management-console.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ You may need to download software for your on-premises management console if you
2323

2424
:::image type="content" source="media/update-ot-software/on-premises-download.png" alt-text="Screenshot of the Download option for the on-premises management console." lightbox="media/update-ot-software/on-premises-download.png":::
2525

26+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
27+
2628
## Upload an activation file
2729

2830
When you first sign in, an activation file for the on-premises management console is downloaded. This file contains the aggregate committed devices that are defined during the onboarding process. The list includes sensors associated with multiple subscriptions.
@@ -36,10 +38,13 @@ After initial activation, the number of monitored devices might exceed the numbe
3638

3739
:::image type="content" source="media/how-to-manage-sensors-from-the-on-premises-management-console/cloud_download_opm_activation_file.png" alt-text="Download the activation file.":::
3840

41+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
42+
3943
1. Select **System Settings** from the management console.
4044
1. Select **Activation**.
4145
1. Select **Choose a File** and select the file that you saved.
4246

47+
4348
## Manage certificates
4449

4550
Following on-premises management console installation, a local self-signed certificate is generated and used to access the web application. When logging in to the on-premises management console for the first time, Administrator users are prompted to provide an SSL/TLS certificate.

articles/defender-for-iot/organizations/how-to-set-up-snmp-mib-monitoring.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ Supported SNMP versions are SNMP version 2 and version 3. The SNMP protocol util
1515

1616
Download the SNMP MIB file from Defender for IoT in the Azure portal. Select **Sites and sensors > More actions > Download SNMP MIB file**.
1717

18+
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
19+
20+
1821
## Sensor OIDs
1922

2023
| Management console and sensor | OID | Format | Description |

articles/defender-for-iot/organizations/how-to-view-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ You can generate the following alert reports:
159159
1. Select **View full details**.
160160
1. Select **Download Full PCAP** or **Download Filtered PCAP**.
161161

162-
PCAP files provide more detailed information about the network traffic that occurred at the time of the alert event.
162+
PCAP files provide more detailed information about the network traffic that occurred at the time of the alert event.
163163

164164
## View alerts in the Defender for IoT portal
165165

0 commit comments

Comments
 (0)