You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-control-what-traffic-is-monitored.md
+18-39Lines changed: 18 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,7 +106,7 @@ Example scenario:
106
106
A policy violation occurs with a deviation from baseline behavior defined in learned or configured settings.
107
107
108
108
Example scenario:
109
-
*"Unauthorized HTTP User Agent"* alert. This alert indicates that an application that was not learned or approved by policy is used as an HTTP client on a device. This might be a new web browser or application on that device.
109
+
*"Unauthorized HTTP User Agent"* alert. This alert indicates that an application that wasn't learned or approved by policy is used as an HTTP client on a device. This might be a new web browser or application on that device.
110
110
111
111
### Malware engine
112
112
@@ -179,30 +179,30 @@ The host name appears in the device inventory, and device map, and in reports.
179
179
180
180
You can schedule reverse lookup resolution schedules for specific hourly intervals, such as every 12 hours. Or you can schedule a specific time.
181
181
182
-
To define DNS servers:
182
+
**To define DNS servers:**
183
183
184
-
1. Select **System Settings** and then select **DNS Settings**.
184
+
1. Select **System settings**> **Network monitoring**, then select **Reverse DNS Lookup**.
185
185
186
186
2. Select **Add DNS Server**.
187
187
188
-
:::image type="content" source="media/how-to-enrich-asset-information/dns-reverse-lookup-configuration-screen.png" alt-text="Screenshot that shows the selection of Add DNS Server.":::
189
-
190
-
3. In the **Schedule reverse DNS lookup** field, choose either:
188
+
3. In the **Schedule Reverse lookup** field, choose either:
191
189
192
190
- Intervals (per hour).
193
191
194
192
- A specific time. Use European formatting. For example, use **14:30** and not **2:30 PM**.
195
193
196
-
4. In the **DNS Server Address** field, enter the DNS IP address.
194
+
4. In the **DNS server address** field, enter the DNS IP address.
197
195
198
-
5. In the **DNS Server Port** field, enter the DNS port.
196
+
5. In the **DNS server port** field, enter the DNS port.
199
197
200
-
6. Resolve the network IP addresses to device FQDNs. In the **Number of Labels** field, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
198
+
6. Resolve the network IP addresses to device FQDNs. In the **Number of labels** field, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
201
199
202
200
7. In the **Subnets** field, enter the subnets that you want the DNS server to query.
203
201
204
202
8. Select the **Enable** toggle if you want to initiate the reverse lookup.
205
203
204
+
1. Select **Save**.
205
+
206
206
### Test the DNS configuration
207
207
208
208
By using a test device, verify that the settings you defined work properly:
@@ -213,8 +213,6 @@ By using a test device, verify that the settings you defined work properly:
213
213
214
214
3. Enter an address in **Lookup Address** for the **DNS reverse lookup test for server** dialog box.
215
215
216
-
:::image type="content" source="media/how-to-enrich-asset-information/dns-reverse-lookup-test-screen.png" alt-text="Screenshot that shows the Lookup Address area.":::
217
-
218
216
4. Select **Test**.
219
217
220
218
## Configure Windows Endpoint Monitoring
@@ -236,49 +234,30 @@ You can perform scheduled scans or manual scans. When a scan is finished, you ca
236
234
237
235
Configure a firewall rule that opens outgoing traffic from the sensor to the scanned subnet by using UDP port 135 and all TCP ports above 1024.
1. In the **Edit scan ranges configuration**section, enter the ranges you want to scan and add your username and password.
244
242
245
-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-screen-v2.png" alt-text="Screenshot that shows the selection of Windows Endpoint Monitoring.":::
246
-
247
-
3. On the **Scan Schedule** pane, configure options as follows:
243
+
3. Define how you want to run the scan:
248
244
249
245
-**By fixed intervals (in hours)**: Set the scan schedule according to intervals in hours.
250
246
251
247
-**By specific times**: Set the scan schedule according to specific times and select **Save Scan**.
252
248
253
-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/schedule-a-scan-screen-v2.png" alt-text="Screenshot that shows the Save Scan button.":::
254
-
255
-
4. To define the scan range, select **Set scan ranges**.
256
-
257
-
5. Set the IP address range and add your user and password.
258
-
259
-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/edit-scan-range-screen.png" alt-text="Screenshot that shows adding a user and password.":::
260
-
261
-
6. To exclude an IP range from a scan, select **Disable** next to the range.
262
-
263
-
7. To remove a range, select :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/remove-scan-icon.png" border="false"::: next to the range.
264
249
265
250
8. Select **Save**. The **Edit Scan Ranges Configuration** dialog box closes, and the number of ranges appears in the **Scan Ranges** pane.
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-screen-v2.png" alt-text="Screenshot that shows the Windows Endpoint Monitoring setup screen.":::
252
+
**To perform a manual scan:**
274
253
275
-
3. In the **Actions** pane, select **Start scan**. A status bar appears on the **Actions** pane and shows the progress of the scanning process.
254
+
1. Define the scan ranges.
276
255
277
-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/started-scan-screen-v2.png" alt-text="Screenshot that shows the Start scan button.":::
256
+
3. Select **Save** and **Apply changes** and then select **Manually scan**.
278
257
279
-
To view scan results:
258
+
**To view scan results:**
280
259
281
-
1. When the scan is finished, on the **Actions** pane, select **View Scan Results**. The CSV file with the scan results is downloaded to your computer.
260
+
1. When the scan is finished, select **View Scan Results**. A .csv file with the scan results is downloaded to your computer.
0 commit comments