Skip to content

Commit 1fb57a7

Browse files
committed
Merge branch 'release-d4iot-deployment-plus' of https://github.com/MicrosoftDocs/azure-docs-pr into release-deployment-only
2 parents 3af75fe + 2337a0f commit 1fb57a7

13 files changed

+122
-270
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 19 additions & 128 deletions
Original file line numberDiff line numberDiff line change
@@ -15,16 +15,15 @@
1515
- name: Microsoft Sentinel solution versions
1616
href: release-notes-sentinel.md
1717
- name: Quickstarts
18-
expanded: false
1918
items:
20-
- name: Get started with OT security monitoring
19+
- name: Add an OT plan to your Azure subscription
2120
href: getting-started.md
2221
displayName: onboard
23-
- name: Enable Enterprise IoT security
24-
href: eiot-defender-for-endpoint.md
25-
displayName: onboard
2622
- name: Concepts
2723
items:
24+
- name: Defender for IoT system components
25+
href: architecture.md
26+
displayName: committed devices
2827
- name: Subscription billing
2928
href: billing.md
3029
- name: Roles and permissions
@@ -38,138 +37,30 @@
3837
- name: On-premises roles for OT monitoring
3938
href: roles-on-premises.md
4039
displayName: users, user
41-
- name: OT system architecture
42-
href: architecture.md
43-
displayName: committed devices
44-
- name: OT sensor cloud connection methods
45-
href: architecture-connections.md
46-
- name: OT network monitoring best practices
47-
items:
48-
- name: Understand your network architecture
49-
href: best-practices/understand-network-architecture.md
50-
- name: Plan your network connections
51-
href: best-practices/plan-network-monitoring.md
52-
- name: Sample connectivity models
53-
href: best-practices/sample-connectivity-models.md
54-
- name: Zero Trust and your OT/IoT networks
55-
href: concept-zero-trust.md
56-
- name: OT monitoring appliance catalog
57-
items:
58-
- name: Which appliances do I need?
59-
href: ot-appliance-sizing.md
60-
- name: Pre-configured appliances
61-
href: ot-pre-configured-appliances.md
62-
- name: OT monitoring with virtual appliances
63-
href: ot-virtual-appliances.md
64-
- name: Supported protocols
65-
href: concept-supported-protocols.md
66-
- name: Defender for IoT device inventory
40+
- name: Device inventories
6741
href: device-inventory.md
68-
- name: Defender for IoT alerts
42+
- name: Alerts
6943
href: alerts.md
70-
- name: Monitoring OT threats in enterprise SOCs
44+
- name: Zero Trust and your OT/IoT networks
45+
href: concept-zero-trust.md
46+
- name: Defender for IoT and your SOC
7147
href: concept-sentinel-integration.md
7248
displayName: Microsoft Sentinel, modernize SOC
73-
- name: Securing IoT devices in the enterprise
49+
- name: Securing enterprise IoT devices
7450
href: concept-enterprise.md
7551
displayName: Microsoft Defender for Endpoint, MDE
76-
- name: Security
52+
- name: Azure security baseline for Defender for IoT
53+
href: /security/benchmark/azure/baselines/microsoft-defender-for-iot-security-baseline?bc=%2fazure%2defender-for-iot%2fbreadcrumb%2ftoc.json&toc=%2fazure%2fdefender-for-iot%2fTOC.json
54+
- name: OT monitoring appliance catalog
7755
items:
78-
- name: Azure security baseline for Defender for IoT
79-
href: /security/benchmark/azure/baselines/microsoft-defender-for-iot-security-baseline?bc=%2fazure%2defender-for-iot%2fbreadcrumb%2ftoc.json&toc=%2fazure%2fdefender-for-iot%2fTOC.json
56+
- name: Which appliances do I need?
57+
href: ot-appliance-sizing.md
58+
- name: Pre-configured appliances
59+
href: ot-pre-configured-appliances.md
60+
- name: OT monitoring with virtual appliances
61+
href: ot-virtual-appliances.md
8062
- name: Deploy
8163
items:
82-
- name: Deploy OT monitoring
83-
items:
84-
- name: OT deployment path
85-
href: ot-deploy/ot-deploy-path.md
86-
- name: Plan and prepare for an OT deployment
87-
items:
88-
- name: Plan your OT monitoring system
89-
items:
90-
- name: Overview
91-
href: best-practices/plan-corporate-monitoring.md
92-
- name: Azure connection methods
93-
href: architecture-connections.md
94-
- name: SSL/TLS certificate requirements
95-
href: best-practices/certificate-requirements.md
96-
- name: Prepare an OT site
97-
items:
98-
- name: Overview
99-
href: best-practices/plan-prepare-deploy.md
100-
- name: Defender for IoT and your network architecture
101-
href: best-practices/understand-network-architecture.md
102-
- name: Choose a traffic mirroring method
103-
href: best-practices/traffic-mirroring-methods.md
104-
displayName: SPAN port, TAP
105-
- name: Create SSL/TLS certificates
106-
href: ot-deploy/create-ssl-certificates.md
107-
- name: Onboard OT sensors to Azure
108-
href: onboard-sensors.md
109-
- name: Site networking setup
110-
items:
111-
- name: Configure traffic mirroring
112-
items:
113-
- name: Overview
114-
href: traffic-mirroring/traffic-mirroring-overview.md
115-
- name: Configure a switch SPAN port
116-
href: traffic-mirroring/configure-mirror-span.md
117-
- name: Configure a remote SPAN (RSPAN)
118-
href: traffic-mirroring/configure-mirror-rspan.md
119-
- name: Configure active or passive aggregation (TAP)
120-
href: best-practices/traffic-mirroring-methods.md#active-or-passive-aggregation-tap
121-
- name: Configure ERSPAN mirroring
122-
href: traffic-mirroring/configure-mirror-erspan.md
123-
- name: Configure mirroring with an ESXi vSwitch
124-
href: traffic-mirroring/configure-mirror-esxi.md
125-
- name: Configure mirroring with a Hyper-V vSwitch
126-
href: traffic-mirroring/configure-mirror-hyper-v.md
127-
- name: Provision for cloud management
128-
href: ot-deploy/provision-cloud-management.md
129-
- name: Deploy OT network sensors
130-
items:
131-
- name: Install sensor software
132-
href: ot-deploy/install-software-ot-sensor.md
133-
- name: Validate after installation
134-
href: ot-deploy/post-install-validation-ot-software.md
135-
- name: Activate and set up an OT sensor
136-
href: ot-deploy/activate-deploy-sensor.md
137-
displayName: SSL, TLS, certificate
138-
- name: Configure proxy settings
139-
href: connect-sensors.md
140-
- name: Calibrate and fine-tune OT monitoring
141-
items:
142-
- name: Control OT traffic monitoring
143-
href: how-to-control-what-traffic-is-monitored.md
144-
displayName: VLAN, port name, subnets, DHCP
145-
- name: Update detected device properties
146-
href: ot-deploy/update-device-inventory.md
147-
- name: Create a learned baseline of OT alerts
148-
href: ot-deploy/create-learned-baseline.md
149-
- name: Deploy air-gapped OT sensor management
150-
items:
151-
- name: Air-gapped management deployment path
152-
href: ot-deploy/air-gapped-deploy.md
153-
- name: Install an on-premises management console
154-
href: ot-deploy/install-software-on-premises-management-console.md
155-
- name: Activate and set up an on-premises management console
156-
href: ot-deploy/activate-deploy-management.md
157-
- name: Connect OT sensors to an on-premises management console
158-
href: ot-deploy/connect-sensors-to-management.md
159-
- name: Configure on-premises sites and zones
160-
href: ot-deploy/sites-and-zones-on-premises.md
161-
displayName: site, zone, Zero Trust
162-
- name: Deploy Enterprise IoT monitoring
163-
items:
164-
- name: Enable Enterprise IoT security
165-
href: eiot-defender-for-endpoint.md
166-
displayName: onboard
167-
- name: Discover Enterprise IoT devices
168-
href: eiot-sensor.md
169-
displayName: Enterprise IoT sensor
170-
- name: Extra deployment steps and samples
171-
href: extra-deploy-enterprise-iot.md
172-
displayName: Enterprise IoT sensor
17364
- name: Deploy air-gapped OT sensor management
17465
items:
17566
- name: Air-gapped management deployment path

articles/defender-for-iot/organizations/alerts.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom: enterprise-iot
88

99
# Microsoft Defender for IoT alerts
1010

11-
Microsoft Defender for IoT alerts enhance your network security and operations with real-time details about events logged in your network. Alerts are messages that a Defender for IoT engine triggers when OT or Enterprise IoT network sensors detect changes or suspicious activity in network traffic that needs your attention.
11+
Microsoft Defender for IoT alerts enhance your network security and operations with real-time details about events logged in your network. Alerts are triggered when OT or Enterprise IoT network sensors detect changes or suspicious activity in network traffic that needs your attention.
1212

1313
For example:
1414

@@ -119,6 +119,12 @@ Use the following table to learn more about each alert status and triage option.
119119
> For more information, see [Create alert exclusion rules on an on-premises management console](how-to-accelerate-alert-incident-response.md#create-alert-exclusion-rules-on-an-on-premises-management-console).
120120
>
121121
122+
### Triage OT alerts during learning mode
123+
124+
*Learning mode* refers to the initial period after an OT sensor is deployed, when your OT sensor learns your network's baseline activity, including the devices and protocols in your network, and the regular file transfers that occur between specific devices.
125+
126+
Use learning mode to perform an initial triage on the alerts in your network, *learning* those you want to mark as authorized, expected activity. Learned traffic doesn't generate new alerts the next time the same traffic is detected.
127+
122128
## Next steps
123129

124130
Review alert types and messages to help you understand and plan remediation actions and playbook integrations. For more information, see [OT monitoring alert types and descriptions](alert-engine-messages.md).
Lines changed: 28 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: System architecture for OT monitoring - Microsoft Defender for IoT
2+
title: System architecture for OT/IoT monitoring - Microsoft Defender for IoT
33
description: Learn about the Microsoft Defender for IoT system architecture and data flow.
4-
ms.topic: overview
5-
ms.date: 12/25/2022
4+
ms.topic: conceptual
5+
ms.date: 01/18/2023
66
---
77

8-
# System architecture for OT system monitoring
8+
# Microsoft Defender for IoT components
99

1010
The Microsoft Defender for IoT system is built to provide broad coverage and visibility from diverse data sources.
1111

@@ -18,38 +18,35 @@ Defender for IoT connects to both cloud and on-premises components, and is built
1818
Defender for IoT includes the following OT security monitoring components:
1919

2020
- **The Azure portal**, for cloud management and integration to other Microsoft services, such as Microsoft Sentinel.
21-
- **OT network sensors**, to detect OT devices across your network. OT network sensors are deployed on either a virtual machine or a physical appliance, and configured as cloud-connected sensors, or fully on-premises, locally managed sensors.
22-
- **An on-premises management console** for centralized OT site management in local, air-gapped environments.
2321

24-
## What is a Defender for IoT committed device?
22+
- **Operational technology (OT) or Enterprise IoT network sensors**, to detect devices across your network. Defender for IoT network sensors are deployed on either a virtual machine or a physical appliance. OT sensors can be configured as cloud-connected sensors, or fully on-premises, locally managed sensors.
2523

26-
[!INCLUDE [devices-inventoried](includes/devices-inventoried.md)]
24+
- **An on-premises management console** for centralized OT sensor management and monitoring for local, air-gapped environments.
2725

28-
## OT network sensors
26+
## OT and Enterprise IoT network sensors
2927

30-
OT network sensors discover and continuously monitor network traffic across your OT devices.
28+
Defender for IoT network sensors discover and continuously monitor network traffic across your network devices.
3129

32-
- Network sensors are purpose-built for OT networks and connect to a SPAN port or network TAP. OT network sensors can provide visibility into risks within minutes of connecting to the network.
30+
- Network sensors are purpose-built for OT/IoT networks and connect to a SPAN port or network TAP. Defender for IoT network sensors can provide visibility into risks within minutes of connecting to the network.
3331

34-
- Network sensors use OT-aware analytics engines and Layer-6 Deep Packet Inspection (DPI) to detect threats, such as fileless malware, based on anomalous or unauthorized activity.
32+
- Network sensors use OT/IoT-aware analytics engines and Layer-6 Deep Packet Inspection (DPI) to detect threats, such as fileless malware, based on anomalous or unauthorized activity.
3533

3634
Data collection, processing, analysis, and alerting takes place directly on the sensor, which can be ideal for locations with low bandwidth or high-latency connectivity. Only telemetry and insights are transferred on for management, either to the Azure portal or an on-premises management console.
3735

38-
For more information, see [Onboard OT sensors to Defender for IoT](onboard-sensors.md).
3936

4037
### Cloud-connected vs. local OT sensors
4138

4239
Cloud-connected sensors are sensors that are connected to Defender for IoT in Azure, and differ from locally managed sensors as follows:
4340

44-
When you have a cloud connected OT network sensor:
41+
**When you have a cloud connected OT network sensor**:
4542

4643
- All data that the sensor detects is displayed in the sensor console, but alert information is also delivered to Azure, where it can be analyzed and shared with other Azure services.
4744

4845
- Microsoft threat intelligence packages can be automatically pushed to cloud-connected sensors.
4946

5047
- The sensor name defined during onboarding is the name displayed in the sensor, and is read-only from the sensor console.
5148

52-
In contrast, when working with locally managed sensors:
49+
**In contrast, when working with locally managed sensors**:
5350

5451
- View any data for a specific sensor from the sensor console. For a unified view of all information detected by several sensors, use an on-premises management console.
5552

@@ -69,15 +66,15 @@ For example, the **policy violation detection** engine models industry control s
6966

7067
Since many detection algorithms were built for IT, rather than OT networks, the extra baseline for ICS networks helps to shorten the system's learning curve for new detections.
7168

72-
Defender for IoT network sensors include the following analytics engines:
73-
74-
|Name |Description |
75-
|---------|---------|
76-
|**Protocol violation detection engine** | Identifies the use of packet structures and field values that violate ICS protocol specifications. <br><br>For example, Modbus exceptions or the initiation of an obsolete function code alerts. |
77-
|**Industrial malware detection engine** | Identifies behaviors that indicate the presence of known malware, such as Conficker, Black Energy, Havex, WannaCry, NotPetya, and Triton. |
78-
|**Anomaly detection engine** | Detects unusual machine-to-machine (M2M) communications and behaviors. <br><br>This engine models ICS networks and therefore requires a shorter learning period than analytics developed for IT. Anomalies are detected faster, with minimal false positives. <br><br>For example, Excessive SMB sign-in attempts, and PLC Scan Detected alerts. |
79-
|**Operational incident detection** | Detects operational issues such as intermittent connectivity that can indicate early signs of equipment failure. <br><br> For example, the device might be disconnected (unresponsive), or the Siemens S7 stop PLC command was sent alerts. |
69+
Defender for IoT network sensors include the following main analytics engines:
8070

71+
|Name |Description | Examples |
72+
|---------|---------|---------|
73+
|**Protocol violation detection engine** | Identifies the use of packet structures and field values that violate ICS protocol specifications. <br><br>Protocol violations occur when the packet structure or field values don't comply with the protocol specification.| An *"Illegal MODBUS Operation (Function Code Zero)"* alert indicates that a primary device sent a request with function code 0 to a secondary device. This action isn't allowed according to the protocol specification, and the secondary device might not handle the input correctly |
74+
| **Policy Violation** | A policy violation occurs with a deviation from baseline behavior defined in learned or configured settings. | An *"Unauthorized HTTP User Agent"* alert indicates that an application that wasn't learned or approved by policy is used as an HTTP client on a device. This might be a new web browser or application on that device.|
75+
|**Industrial malware detection engine** | Identifies behaviors that indicate the presence of malicious network activity via known malware, such as Conficker, Black Energy, Havex, WannaCry, NotPetya, and Triton. | A *"Suspicion of Malicious Activity (Stuxnet)"* alert indicates that the sensor detected suspicious network activity known to be related to the Stuxnet malware. This malware is an advanced persistent threat aimed at industrial control and SCADA networks. |
76+
|**Anomaly detection engine** | Detects unusual machine-to-machine (M2M) communications and behaviors. <br><br>This engine models ICS networks and therefore requires a shorter learning period than analytics developed for IT. Anomalies are detected faster, with minimal false positives. | A *"Periodic Behavior in Communication Channel"* alert reflects periodic and cyclic behavior of data transmission, which is common in industrial networks. <br>Other examples include excessive SMB sign-in attempts, and PLC scan detected alerts. |
77+
|**Operational incident detection** | Detects operational issues such as intermittent connectivity that can indicate early signs of equipment failure. | A *"Device is Suspected to be Disconnected (Unresponsive)"* alert is triggered when a device isn't responding to any kind of request for a predefined period. This alert might indicate a device shutdown, disconnection, or malfunction. <br>Another example might be the that Siemens S7 stop PLC command was sent alerts. |
8178

8279
## Management options
8380

@@ -93,15 +90,15 @@ Defender for IoT provides hybrid network support using the following management
9390

9491
:::image type="content" source="media/release-notes/new-interface.png" alt-text="Screenshot that shows the updated interface." lightbox="media/release-notes/new-interface.png":::
9592

96-
- **The on-premises management console**. In air-gapped environments, the on-premises management console provides a centralized view and management options for devices and threats detected by connected OT network sensors. The on-premises management console also lets you organize your network into separate sites and zones to support a [Zero Trust](/security/zero-trust/) mindset, and provides extra maintenance tools and reporting features.
93+
- **The on-premises management console**. In air-gapped environments, you can get a central view of data from all of your sensors from an on-premises management console, using extra maintenance tools and reporting features.
9794

98-
## Next steps
95+
The software version on your on-premises management console must be equal to that of your most up-to-date sensor version. Each on-premises management console version is backwards compatible to older, supported sensor versions, but cannot connect to newer sensor versions.
9996

100-
> [!div class="nextstepaction"]
101-
> [Understand OT sensor connection methods](architecture-connections.md)
97+
## What is a Defender for IoT committed device?
98+
99+
[!INCLUDE [devices-inventoried](includes/devices-inventoried.md)]
102100

103-
> [!div class="nextstepaction"]
104-
> [Connect OT sensors to Microsoft Defender for IoT](connect-sensors.md)
101+
## Next steps
105102

106-
> [!div class="nextstepaction"]
107-
> [Frequently asked questions](resources-frequently-asked-questions.md)
103+
> [!div class="step-by-step"]
104+
> [Understand your network architecture »](architecture.md)

0 commit comments

Comments
 (0)