Skip to content

Commit 205f904

Browse files
authored
Merge pull request #280797 from tarTech23/wild
Add wildcard
2 parents 156891d + 42347b6 commit 205f904

File tree

2 files changed

+10
-44
lines changed

2 files changed

+10
-44
lines changed

articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md

Lines changed: 3 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -111,50 +111,12 @@ If you're currently using an on-premises management console with cloud-connected
111111

112112
Your rules are added to the list of suppression rules on the **Suppression rules (Preview)** page. Select a rule to edit or delete it as needed.
113113

114-
### Create alert exclusion rules on an on-premises management console
115-
116-
We recommend creating alert exclusion rules on an on-premises management console only for locally managed sensors. For cloud-connected sensors, any suppression rules created on the Azure portal will override exclusion rules created on the on-premises management console for that sensor.
117-
118-
**To create an alert exclusion rule**:
119-
120-
1. Sign into your on-premises management console and select **Alert Exclusion** on the left-hand menu.
121-
122-
1. On the **Alert Exclusion** page, select the **+** button at the top-right to add a new rule.
123-
124-
1. In the **Create Exclusion Rule** dialog, enter the following details:
125-
126-
|Name |Description |
127-
|---------|---------|
128-
|**Name** | Enter a meaningful name for your rule. The name can't contain quotes (`"`). |
129-
|**By Time Period** | Select a time zone and the specific time period you want the exclusion rule to be active, and then select **ADD**. <br><br>Use this option to create separate rules for different time zones. For example, you might need to apply an exclusion rule between 8:00 AM and 10:00 AM in three different time zones. In this case, create three separate exclusion rules that use the same time period and the relevant time zone. |
130-
|**By Device Address** | Select and enter the following values, and then select **ADD**: <br><br>- Select whether the designated device is a source, destination, or both a source and destination device. <br>- Select whether the address is an IP address, MAC address, or subnet <br>- Enter the value of the IP address, MAC address, or subnet. |
131-
|**By Alert Title** | Select one or more alerts to add to the exclusion rule and then select **ADD**. To find alert titles, enter all, or part of an alert title and select the one you want from the dropdown list. |
132-
|**By Sensor Name** | Select one or more sensors to add to the exclusion rule and then select **ADD**. To find sensor names, enter all or part of the sensor name and select the one you want from the dropdown list. |
133-
134-
> [!IMPORTANT]
135-
> Alert exclusion rules are `AND` based, which means that alerts are only excluded when all rule conditions are met.
136-
> If a rule condition is not defined, all options are included. For example, if you don't include the name of a sensor in the rule, the rule is applied to all sensors.
137-
138-
A summary of the rule parameters is shown at the bottom of the dialog.
139-
140-
1. Check the rule summary shown at the bottom of the **Create Exclusion Rule** dialog and then select **SAVE**
141-
142-
**To create alert exclusion rules via API**:
143-
144-
Use the [Defender for IoT API](references-work-with-defender-for-iot-apis.md) to create on-premises management console alert exclusion rules from an external ticketing system or other system that manage network maintenance processes.
145-
146-
Use the [maintenanceWindow (Create alert exclusions)](api/management-alert-apis.md#maintenancewindow-create-alert-exclusions) API to define the sensors, analytics engines, start time, and end time to apply the rule. Exclusion rules created via API are shown in the on-premises management console as read-only.
147-
148-
For more information, see [Defender for IoT API reference](references-work-with-defender-for-iot-apis.md).
149-
150-
151114
## Allow internet connections on an OT network
152115

153116
Decrease the number of unauthorized internet alerts by creating an allowlist of domain names on your OT sensor. When a DNS allowlist is configured, the sensor checks each unauthorized internet connectivity attempt against the list before triggering an alert. If the domain's FQDN is included in the allowlist, the sensor doesn’t trigger the alert and allows the traffic automatically.
154117

155118
All OT sensor users can view a currently configured list of domains in a [data mining report](how-to-create-data-mining-queries.md), including the FQDNs, resolved IP addresses, and the last resolution time.
156119

157-
158120
**To define a DNS allowlist:**
159121

160122
1. Sign into your OT sensor as the *admin* user and select the **Support** page.
@@ -167,8 +129,9 @@ All OT sensor users can view a currently configured list of domains in a [data m
167129

168130
1. In the **Edit configuration** pane > **Fqdn allowlist** field, enter one or more domain names. Separate multiple domain names with commas. Your sensor won't generate alerts for unauthorized internet connectivity attempts on the configured domains.
169131

170-
1. Select **Submit** to save your changes.
132+
You can use the `*` wildcard at any place in the domain name to easily add subdomains to the allowlist without having to input each one, for example, `*.microsoft.com` or `teams.microsoft.*`.
171133

134+
1. Select **Submit** to save your changes.
172135

173136
**To view the current allowlist in a data mining report:**
174137

@@ -182,7 +145,6 @@ The generated data mining report shows a list of the allowed domains and each IP
182145

183146
:::image type="content" source="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png" alt-text="Screenshot of data mining report of allowlist in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png":::
184147

185-
186148
## Create alert comments on an OT sensor
187149

188150
1. Sign into your OT sensor and select **System Settings** > **Network Monitoring** > **Alert Comments**.
@@ -276,8 +238,7 @@ Use the [Defender for IoT API](references-work-with-defender-for-iot-apis.md) to
276238

277239
Use the [maintenanceWindow (Create alert exclusions)](api/management-alert-apis.md#maintenancewindow-create-alert-exclusions) API to define the sensors, analytics engines, start time, and end time to apply the rule. Exclusion rules created via API are shown in the on-premises management console as read-only.
278240

279-
For more information, see
280-
[Defender for IoT API reference](references-work-with-defender-for-iot-apis.md).
241+
For more information, see [Defender for IoT API reference](references-work-with-defender-for-iot-apis.md).
281242

282243
## Next steps
283244

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,19 @@ Features released earlier than nine months ago are described in the [What's new
1414

1515
> [!NOTE]
1616
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17+
>
1718
1819
[!INCLUDE [defender-iot-defender-reference](../includes/defender-for-iot-defender-reference.md)]
1920

2021
## October 2024
2122

2223
|Service area |Updates |
2324
|---------|---------|
24-
| **OT networks** | - [Added protocol](#added-protocol)<br> - [Improved OT sensor onboarding](#improved-ot-sensor-onboarding) |
25+
| **OT networks** | - [Add wildcards to allowlist domain names](#add-wildcards-allowlist-domain-names)<br> - [Added protocol](#added-protocol) <br> - [Improved OT sensor onboarding](#improved-ot-sensor-onboarding) |
26+
27+
### Add wildcards allowlist domain names
28+
29+
When adding domain names to the FQDN allowlist use the `*` wildcard to include all sub-domains. For more information, see [allow internet connections on an OT network](how-to-accelerate-alert-incident-response.md#allow-internet-connections-on-an-ot-network).
2530

2631
### Added protocol
2732

@@ -37,7 +42,7 @@ We now support completing the configuration process without the need to solve th
3742

3843
|Service area |Updates |
3944
|---------|---------|
40-
| **OT networks** | - [Security update](#security-update) |
45+
| **OT networks** | - [Security update](#security-update) |
4146

4247
### Security update
4348

0 commit comments

Comments
 (0)