You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md
+3-42Lines changed: 3 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,50 +111,12 @@ If you're currently using an on-premises management console with cloud-connected
111
111
112
112
Your rules are added to the list of suppression rules on the **Suppression rules (Preview)** page. Select a rule to edit or delete it as needed.
113
113
114
-
### Create alert exclusion rules on an on-premises management console
115
-
116
-
We recommend creating alert exclusion rules on an on-premises management console only for locally managed sensors. For cloud-connected sensors, any suppression rules created on the Azure portal will override exclusion rules created on the on-premises management console for that sensor.
117
-
118
-
**To create an alert exclusion rule**:
119
-
120
-
1. Sign into your on-premises management console and select **Alert Exclusion** on the left-hand menu.
121
-
122
-
1. On the **Alert Exclusion** page, select the **+** button at the top-right to add a new rule.
123
-
124
-
1. In the **Create Exclusion Rule** dialog, enter the following details:
125
-
126
-
|Name |Description |
127
-
|---------|---------|
128
-
|**Name**| Enter a meaningful name for your rule. The name can't contain quotes (`"`). |
129
-
|**By Time Period**| Select a time zone and the specific time period you want the exclusion rule to be active, and then select **ADD**. <br><br>Use this option to create separate rules for different time zones. For example, you might need to apply an exclusion rule between 8:00 AM and 10:00 AM in three different time zones. In this case, create three separate exclusion rules that use the same time period and the relevant time zone. |
130
-
|**By Device Address**| Select and enter the following values, and then select **ADD**: <br><br>- Select whether the designated device is a source, destination, or both a source and destination device. <br>- Select whether the address is an IP address, MAC address, or subnet <br>- Enter the value of the IP address, MAC address, or subnet. |
131
-
|**By Alert Title**| Select one or more alerts to add to the exclusion rule and then select **ADD**. To find alert titles, enter all, or part of an alert title and select the one you want from the dropdown list. |
132
-
|**By Sensor Name**| Select one or more sensors to add to the exclusion rule and then select **ADD**. To find sensor names, enter all or part of the sensor name and select the one you want from the dropdown list. |
133
-
134
-
> [!IMPORTANT]
135
-
> Alert exclusion rules are `AND` based, which means that alerts are only excluded when all rule conditions are met.
136
-
> If a rule condition is not defined, all options are included. For example, if you don't include the name of a sensor in the rule, the rule is applied to all sensors.
137
-
138
-
A summary of the rule parameters is shown at the bottom of the dialog.
139
-
140
-
1. Check the rule summary shown at the bottom of the **Create Exclusion Rule** dialog and then select **SAVE**
141
-
142
-
**To create alert exclusion rules via API**:
143
-
144
-
Use the [Defender for IoT API](references-work-with-defender-for-iot-apis.md) to create on-premises management console alert exclusion rules from an external ticketing system or other system that manage network maintenance processes.
145
-
146
-
Use the [maintenanceWindow (Create alert exclusions)](api/management-alert-apis.md#maintenancewindow-create-alert-exclusions) API to define the sensors, analytics engines, start time, and end time to apply the rule. Exclusion rules created via API are shown in the on-premises management console as read-only.
147
-
148
-
For more information, see [Defender for IoT API reference](references-work-with-defender-for-iot-apis.md).
149
-
150
-
151
114
## Allow internet connections on an OT network
152
115
153
116
Decrease the number of unauthorized internet alerts by creating an allowlist of domain names on your OT sensor. When a DNS allowlist is configured, the sensor checks each unauthorized internet connectivity attempt against the list before triggering an alert. If the domain's FQDN is included in the allowlist, the sensor doesn’t trigger the alert and allows the traffic automatically.
154
117
155
118
All OT sensor users can view a currently configured list of domains in a [data mining report](how-to-create-data-mining-queries.md), including the FQDNs, resolved IP addresses, and the last resolution time.
156
119
157
-
158
120
**To define a DNS allowlist:**
159
121
160
122
1. Sign into your OT sensor as the *admin* user and select the **Support** page.
@@ -167,8 +129,9 @@ All OT sensor users can view a currently configured list of domains in a [data m
167
129
168
130
1. In the **Edit configuration** pane > **Fqdn allowlist** field, enter one or more domain names. Separate multiple domain names with commas. Your sensor won't generate alerts for unauthorized internet connectivity attempts on the configured domains.
169
131
170
-
1. Select **Submit**to save your changes.
132
+
You can use the `*` wildcard at any place in the domain name to easily add subdomains to the allowlist without having to input each one, for example, `*.microsoft.com` or `teams.microsoft.*`.
171
133
134
+
1. Select **Submit** to save your changes.
172
135
173
136
**To view the current allowlist in a data mining report:**
174
137
@@ -182,7 +145,6 @@ The generated data mining report shows a list of the allowed domains and each IP
182
145
183
146
:::image type="content" source="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png" alt-text="Screenshot of data mining report of allowlist in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png":::
184
147
185
-
186
148
## Create alert comments on an OT sensor
187
149
188
150
1. Sign into your OT sensor and select **System Settings** > **Network Monitoring** > **Alert Comments**.
@@ -276,8 +238,7 @@ Use the [Defender for IoT API](references-work-with-defender-for-iot-apis.md) to
276
238
277
239
Use the [maintenanceWindow (Create alert exclusions)](api/management-alert-apis.md#maintenancewindow-create-alert-exclusions) API to define the sensors, analytics engines, start time, and end time to apply the rule. Exclusion rules created via API are shown in the on-premises management console as read-only.
278
240
279
-
For more information, see
280
-
[Defender for IoT API reference](references-work-with-defender-for-iot-apis.md).
241
+
For more information, see [Defender for IoT API reference](references-work-with-defender-for-iot-apis.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,14 +14,19 @@ Features released earlier than nine months ago are described in the [What's new
14
14
15
15
> [!NOTE]
16
16
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
|**OT networks**| - [Added protocol](#added-protocol)<br> - [Improved OT sensor onboarding](#improved-ot-sensor-onboarding)|
25
+
|**OT networks**| - [Add wildcards to allowlist domain names](#add-wildcards-allowlist-domain-names)<br> - [Added protocol](#added-protocol) <br> - [Improved OT sensor onboarding](#improved-ot-sensor-onboarding)|
26
+
27
+
### Add wildcards allowlist domain names
28
+
29
+
When adding domain names to the FQDN allowlist use the `*` wildcard to include all sub-domains. For more information, see [allow internet connections on an OT network](how-to-accelerate-alert-incident-response.md#allow-internet-connections-on-an-ot-network).
25
30
26
31
### Added protocol
27
32
@@ -37,7 +42,7 @@ We now support completing the configuration process without the need to solve th
0 commit comments