Skip to content

Commit 1dd6dfa

Browse files
committed
more fixes
1 parent ce3f13b commit 1dd6dfa

File tree

1 file changed

+18
-39
lines changed

1 file changed

+18
-39
lines changed

articles/defender-for-iot/organizations/how-to-control-what-traffic-is-monitored.md

Lines changed: 18 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Example scenario:
106106
A policy violation occurs with a deviation from baseline behavior defined in learned or configured settings.
107107

108108
Example scenario:
109-
*"Unauthorized HTTP User Agent"* alert. This alert indicates that an application that was not learned or approved by policy is used as an HTTP client on a device. This might be a new web browser or application on that device.
109+
*"Unauthorized HTTP User Agent"* alert. This alert indicates that an application that wasn't learned or approved by policy is used as an HTTP client on a device. This might be a new web browser or application on that device.
110110

111111
### Malware engine
112112

@@ -179,30 +179,30 @@ The host name appears in the device inventory, and device map, and in reports.
179179

180180
You can schedule reverse lookup resolution schedules for specific hourly intervals, such as every 12 hours. Or you can schedule a specific time.
181181

182-
To define DNS servers:
182+
**To define DNS servers:**
183183

184-
1. Select **System Settings** and then select **DNS Settings**.
184+
1. Select **System settings**> **Network monitoring**, then select **Reverse DNS Lookup**.
185185

186186
2. Select **Add DNS Server**.
187187

188-
:::image type="content" source="media/how-to-enrich-asset-information/dns-reverse-lookup-configuration-screen.png" alt-text="Screenshot that shows the selection of Add DNS Server.":::
189-
190-
3. In the **Schedule reverse DNS lookup** field, choose either:
188+
3. In the **Schedule Reverse lookup** field, choose either:
191189

192190
- Intervals (per hour).
193191

194192
- A specific time. Use European formatting. For example, use **14:30** and not **2:30 PM**.
195193

196-
4. In the **DNS Server Address** field, enter the DNS IP address.
194+
4. In the **DNS server address** field, enter the DNS IP address.
197195

198-
5. In the **DNS Server Port** field, enter the DNS port.
196+
5. In the **DNS server port** field, enter the DNS port.
199197

200-
6. Resolve the network IP addresses to device FQDNs. In the **Number of Labels** field, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
198+
6. Resolve the network IP addresses to device FQDNs. In the **Number of labels** field, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
201199

202200
7. In the **Subnets** field, enter the subnets that you want the DNS server to query.
203201

204202
8. Select the **Enable** toggle if you want to initiate the reverse lookup.
205203

204+
1. Select **Save**.
205+
206206
### Test the DNS configuration
207207

208208
By using a test device, verify that the settings you defined work properly:
@@ -213,8 +213,6 @@ By using a test device, verify that the settings you defined work properly:
213213

214214
3. Enter an address in **Lookup Address** for the **DNS reverse lookup test for server** dialog box.
215215

216-
:::image type="content" source="media/how-to-enrich-asset-information/dns-reverse-lookup-test-screen.png" alt-text="Screenshot that shows the Lookup Address area.":::
217-
218216
4. Select **Test**.
219217

220218
## Configure Windows Endpoint Monitoring
@@ -236,49 +234,30 @@ You can perform scheduled scans or manual scans. When a scan is finished, you ca
236234

237235
Configure a firewall rule that opens outgoing traffic from the sensor to the scanned subnet by using UDP port 135 and all TCP ports above 1024.
238236

239-
To configure an automatic scan:
237+
**To configure an automatic scan:**
240238

241-
1. On the side menu, select **System Settings**.
239+
1. Select **System settings**> **Network monitoring**, then select **Windows Endpoint Monitoring (WMI)**.
242240

243-
2. Select **Windows Endpoint Monitoring** :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-icon-v2.png" border="false":::.
241+
1. In the **Edit scan ranges configuration** section, enter the ranges you want to scan and add your username and password.
244242

245-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-screen-v2.png" alt-text="Screenshot that shows the selection of Windows Endpoint Monitoring.":::
246-
247-
3. On the **Scan Schedule** pane, configure options as follows:
243+
3. Define how you want to run the scan:
248244

249245
- **By fixed intervals (in hours)**: Set the scan schedule according to intervals in hours.
250246

251247
- **By specific times**: Set the scan schedule according to specific times and select **Save Scan**.
252248

253-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/schedule-a-scan-screen-v2.png" alt-text="Screenshot that shows the Save Scan button.":::
254-
255-
4. To define the scan range, select **Set scan ranges**.
256-
257-
5. Set the IP address range and add your user and password.
258-
259-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/edit-scan-range-screen.png" alt-text="Screenshot that shows adding a user and password.":::
260-
261-
6. To exclude an IP range from a scan, select **Disable** next to the range.
262-
263-
7. To remove a range, select :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/remove-scan-icon.png" border="false"::: next to the range.
264249

265250
8. Select **Save**. The **Edit Scan Ranges Configuration** dialog box closes, and the number of ranges appears in the **Scan Ranges** pane.
266251

267-
To perform a manual scan:
268-
269-
1. On the side menu, select **System Settings**.
270-
271-
2. Select **Windows Endpoint Monitoring** :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-icon-v2.png" border="false":::.
272-
273-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-screen-v2.png" alt-text="Screenshot that shows the Windows Endpoint Monitoring setup screen.":::
252+
**To perform a manual scan:**
274253

275-
3. In the **Actions** pane, select **Start scan**. A status bar appears on the **Actions** pane and shows the progress of the scanning process.
254+
1. Define the scan ranges.
276255

277-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/started-scan-screen-v2.png" alt-text="Screenshot that shows the Start scan button.":::
256+
3. Select **Save** and **Apply changes** and then select **Manually scan**.
278257

279-
To view scan results:
258+
**To view scan results:**
280259

281-
1. When the scan is finished, on the **Actions** pane, select **View Scan Results**. The CSV file with the scan results is downloaded to your computer.
260+
1. When the scan is finished, select **View Scan Results**. A .csv file with the scan results is downloaded to your computer.
282261

283262
## See also
284263

0 commit comments

Comments
 (0)