Skip to content

Commit 2100b39

Browse files
committed
removal of cm from main docs 3
1 parent 913d9c1 commit 2100b39

9 files changed

+37
-126
lines changed

articles/defender-for-iot/organizations/best-practices/certificate-requirements.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: SSL/TLS certificate file requirements - Microsoft Defender for IoT
3-
description: Learn about requirements for SSL/TLS certificates used with Microsoft Defender for IOT OT sensors and on-premises management consoles.
3+
description: Learn about requirements for SSL/TLS certificates used with Microsoft Defender for IOT OT sensors.
44
ms.date: 01/17/2023
55
ms.topic: install-set-up-deploy
66
---
@@ -15,15 +15,13 @@ Use the content below to learn about the requirements for [creating SSL/TLS cert
1515

1616
Defender for IoT uses SSL/TLS certificates to secure communication between the following system components:
1717

18-
- Between users and the OT sensor or on-premises management console UI access
19-
- Between OT sensors and an on-premises management console, including [API communication](../references-work-with-defender-for-iot-apis.md)
20-
- Between an on-premises management console and a high availability (HA) server, if configured
21-
- Between OT sensors or on-premises management consoles and partners servers defined in [alert forwarding rules](../how-to-forward-alert-information-to-partners.md)
18+
- Between users and the OT sensor
19+
- Between OT sensors and partners servers defined in [alert forwarding rules](../how-to-forward-alert-information-to-partners.md)
2220

23-
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
21+
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors, and will block encrypted communication between Defender for IoT components.
2422

2523
> [!IMPORTANT]
26-
> You must create a unique certificate for each OT sensor, on-premises management console, and high availability server, where each certificate meets required criteria.
24+
> You must create a unique certificate for each OT sensor, and high availability server, where each certificate meets required criteria.
2725
2826
## Supported file types
2927

articles/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages.md

Lines changed: 3 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ To perform the procedures in this article, make sure that you have:
2727

2828
- One or more OT sensors [onboarded](onboard-sensors.md) to Azure.
2929

30-
- Relevant permissions on the Azure portal and any OT network sensors or on-premises management console you want to update.
30+
- Relevant permissions on the Azure portal and any OT network sensors you want to update.
3131

3232
- **To download threat intelligence packages from the Azure portal**, you need access to the Azure portal as a [Security Reader](../../role-based-access-control/built-in-roles.md#security-reader), [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin), [Contributor](../../role-based-access-control/built-in-roles.md#contributor), or [Owner](../../role-based-access-control/built-in-roles.md#owner) role.
3333

3434
- **To push threat intelligence updates to cloud-connected OT sensors from the Azure portal**, you need access to the Azure portal as a [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin), [Contributor](../../role-based-access-control/built-in-roles.md#contributor), or [Owner](../../role-based-access-control/built-in-roles.md#owner) role.
3535

36-
- **To manually upload threat intelligence packages to OT sensors or on-premises management consoles**, you need access to the OT sensor or on-premises management console as an **Admin** user.
36+
- **To manually upload threat intelligence packages to OT sensors**, you need access to the OT sensor as an **Admin** user.
3737

3838
For more information, see [Azure user roles and permissions for Defender for IoT](roles-azure.md) and [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
3939

@@ -51,7 +51,7 @@ Update threat intelligence packages on your OT sensors using any of the followin
5151

5252
- [Have updates pushed](#automatically-push-updates-to-cloud-connected-sensors) to cloud-connected OT sensors automatically as they're released.
5353
- [Manually push](#manually-push-updates-to-cloud-connected-sensors) updates to cloud-connected OT sensors.
54-
- [Download an update package](#manually-update-locally-managed-sensors) and manually upload it to your OT sensor. Alternately, upload the package to an on-premises management console and push the updates from there to any connected OT sensors.
54+
- [Download an update package](#manually-update-locally-managed-sensors) and manually upload it to your OT sensor.
5555

5656
### Automatically push updates to cloud-connected sensors
5757

@@ -87,8 +87,6 @@ The **Threat Intelligence update status** field displays the update progress for
8787

8888
If you're working with locally managed OT sensors, you need to download the updated threat intelligence packages and upload them manually on your sensors.
8989

90-
If you're also working with an on-premises management console, we recommend that you upload the threat intelligence package to the on-premises management console and push the update from there.
91-
9290
> [!TIP]
9391
> This option can also be used for cloud-connected sensors if you don't want to push the updates from the Azure portal.
9492
>
@@ -111,24 +109,6 @@ If you're also working with an on-premises management console, we recommend that
111109

112110
1. Browse to and select the package you'd downloaded from the Azure portal and upload it to the sensor.
113111

114-
**To update multiple sensors simultaneously:**
115-
116-
1. Sign in to your on-premises management console and select **System settings**.
117-
118-
1. In the **Sensor Engine Configuration** area, select the sensors that you want to receive the updated packages. For example:
119-
120-
:::image type="content" source="media/how-to-work-with-threat-intelligence-packages/update-threat-intelligence-multiple-sensors.png" alt-text="Screenshot of where you can select which sensors you want to make changes to." lightbox="media/how-to-work-with-threat-intelligence-packages/update-threat-intelligence-multiple-sensors.png":::
121-
122-
1. In the **Sensor Threat Intelligence Data** section, select the plus sign (**+**).
123-
124-
1. In the **Upload File** dialog, select **BROWSE FILE...** to browse to and select the update package. For example:
125-
126-
:::image type="content" source="media/how-to-work-with-threat-intelligence-packages/upload-threat-intelligence-to-management-console.png" alt-text="Screenshot of where you can upload a Threat Intelligence package to multiple sensors." lightbox="media/how-to-work-with-threat-intelligence-packages/upload-threat-intelligence-to-management-console.png":::
127-
128-
1. Select **CLOSE** and then **SAVE CHANGES** to push the threat intelligence update to all selected sensors.
129-
130-
:::image type="content" source="media/how-to-work-with-threat-intelligence-packages/save-changes-management-console.png" alt-text="Screenshot of where you can save changes made to selected sensors on the management console." lightbox="media/how-to-work-with-threat-intelligence-packages/save-changes-management-console.png":::
131-
132112
## Review threat intelligence update statuses
133113

134114
On each OT sensor, the threat intelligence update status and version information are shown in the sensor's **System settings > Threat intelligence** settings.
@@ -155,5 +135,3 @@ For cloud-connected OT sensors, threat intelligence data is also shown in the **
155135
For more information, see:
156136

157137
- [Onboard OT sensors to Defender for IoT](onboard-sensors.md)
158-
159-
- [Manage sensors from the management console](legacy-central-management/how-to-manage-sensors-from-the-on-premises-management-console.md)

articles/defender-for-iot/organizations/manage-users-sensor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: how-to
77
---
88
# Create and manage users on an OT network sensor
99

10-
Microsoft Defender for IoT provides tools for managing on-premises user access in the OT network sensor, and the legacy on-premises management console. Azure users are managed [at the Azure subscription level](manage-users-overview.md) using Azure RBAC.
10+
Microsoft Defender for IoT provides tools for managing on-premises user access in the OT network sensor. Azure users are managed [at the Azure subscription level](manage-users-overview.md) using Azure RBAC.
1111

1212
This article describes how to manage on-premises users directly on an OT network sensor.
1313

articles/defender-for-iot/organizations/references-data-retention.md

Lines changed: 11 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Data retention and sharing across Microsoft Defender for IoT
3-
description: Learn about the data retention periods and capacities for Microsoft Defender for IoT data stored in Microsoft Azure, the OT sensor, and on-premises management console.
3+
description: Learn about the data retention periods and capacities for Microsoft Defender for IoT data stored in Microsoft Azure and the OT sensor.
44
ms.topic: conceptual
55
ms.date: 06/30/2024
66
---
77

88
# Data retention, privacy, and sharing across Microsoft Defender for IoT
99

10-
Microsoft Defender for IoT stores data in the Microsoft Azure portal, in OT network sensors, and in on-premises management consoles.
10+
Microsoft Defender for IoT stores data in the Microsoft Azure portal, in OT network sensors.
1111

1212
Each storage type has varying storage capacity options and retention times. This article describes the data retention policy for the amount of data and length of time the data is stored in each storage type before being deleted or overwritten.
1313

@@ -46,7 +46,6 @@ The following table lists how long device data is stored in each Defender for Io
4646
|---------|---------|
4747
| **Azure portal** | 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your device inventory from the Azure portal](how-to-manage-device-inventory-for-organizations.md). |
4848
| **OT network sensor** | 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your OT device inventory from a sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md). |
49-
| **On-premises management console** | 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your OT device inventory from an on-premises management console](legacy-central-management/how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md). |
5049

5150
## Alert data retention
5251

@@ -56,7 +55,6 @@ The following table lists how long alert data is stored in each Defender for IoT
5655
|---------|---------|
5756
| **Azure portal** | 90 days from the date in the **First detection** value. <br><br> For more information, see [View and manage alerts from the Azure portal](how-to-manage-cloud-alerts.md). |
5857
| **OT network sensor** | 90 days from the date in the **First detection** value.<br><br> For more information, see [View alerts on your sensor](how-to-view-alerts.md). |
59-
| **On-premises management console** | 90 days from the date in the **First detection** value.<br><br> For more information, see [Work with alerts on the on-premises management console](legacy-central-management/how-to-work-with-alerts-on-premises-management-console.md). |
6058

6159
### OT alert PCAP data retention
6260

@@ -66,7 +64,6 @@ The following table lists how long PCAP data is stored in each Defender for IoT
6664
|---------|---------|
6765
| **Azure portal** | PCAP files are available for download from the Azure portal for as long as the OT network sensor stores them. <br><br> Once downloaded, the files are cached on the Azure portal for 48 hours. <br><br> For more information, see [Access alert PCAP data](how-to-manage-cloud-alerts.md#access-alert-pcap-data). |
6866
| **OT network sensor** | Dependent on the sensor's storage capacity allocated for PCAP files, which determines its [hardware profile](ot-appliance-sizing.md): <br><br>- **C5600**: 130 GB <br>- **E1800**: 130 GB <br>- **E1000** : 78 GB<br>- **E500**: 78 GB <br>- **L500**: 7 GB <br>- **L100**: 2.5 GB<br><br> If a sensor exceeds its maximum storage capacity, the oldest PCAP file is deleted to accommodate the new one. <br><br> For more information, see [Access alert PCAP data](how-to-view-alerts.md#access-alert-pcap-data) and [Pre-configured physical appliances for OT monitoring](ot-pre-configured-appliances.md). |
69-
| **On-premises management console** | PCAP files aren't stored on the on-premises management console and are only accessed from the on-premises management console via a direct link to the OT sensor. |
7067

7168
The usage of available PCAP storage space depends on factors such as the number of alerts, the type of the alert, and the network bandwidth, all of which affect the size of the PCAP file.
7269

@@ -104,21 +101,19 @@ For more information, see [Track sensor activity](how-to-track-sensor-activity.m
104101

105102
Service and processing log files are stored on the Azure portal for 30 days from their creation date.
106103

107-
Other OT monitoring log files are stored only on the OT network sensor and the on-premises management console.
104+
Other OT monitoring log files are stored only on the OT network sensor.
108105

109106
For more information, see:
110107

111108
- [Troubleshoot the sensor](how-to-troubleshoot-sensor.md)
112-
- [Troubleshoot the on-premises management console](legacy-central-management/how-to-troubleshoot-on-premises-management-console.md)
113109

114110
## Backup file capacity
115111

116-
Both the OT network sensor and the on-premises management console have automated backups running daily, and older backup files are overwritten when the configured storage capacity reaches its limit.
112+
The OT network sensor has automated backups running daily, and older backup files are overwritten when the configured storage capacity reaches its limit.
117113

118114
For more information, see:
119115

120116
- [Set up backup and restore files on an OT sensor](back-up-restore-sensor.md#set-up-backup-and-restore-files)
121-
- [Configure OT sensor backup settings on an on premises management console](legacy-central-management/back-up-sensors-from-management.md#configure-ot-sensor-backup-settings)
122117

123118
### Backups on the OT network sensor
124119

@@ -132,33 +127,20 @@ The retention of backup files depends on the sensor's architecture, as each hard
132127
| **E1800** | 100 GB |
133128
| **C5600** | 100 GB |
134129

135-
If the device can't allocate enough hard disk space, then only the last backup is saved on the on-premises management console.
130+
## Data sharing for Microsoft Defender for IoT
136131

137-
### Backups on the on-premises management console
132+
Microsoft Defender for IoT shares data, including customer data, among the following Microsoft products, also licensed by the customer.
138133

139-
Allocated hard disk space for on-premises management console backup files is limited to 10 GB and to only 20 backups.
140-
141-
If you're using an on-premises management console, each connected OT sensor also has its own, extra backup directory on the on-premises management console:
142-
143-
- A single sensor backup file is limited to a maximum of 40 GB. A file exceeding that size isn't sent to the on-premises management console.
144-
- Total hard disk space allocated to sensor backup from all sensors on the on-premises management console is 100 GB.
145-
146-
## Data sharing for Microsoft Defender for IoT
147-
148-
Microsoft Defender for IoT shares data, including customer data, among the following Microsoft products, also licensed by the customer.
149-
150-
- Microsoft Defender XDR
151-
- Microsoft Sentinel
152-
- Microsoft Threat Intelligence Center
153-
- Microsoft Defender for Cloud
154-
- Microsoft Defender for Endpoint
134+
- Microsoft Defender XDR
135+
- Microsoft Sentinel
136+
- Microsoft Threat Intelligence Center
137+
- Microsoft Defender for Cloud
138+
- Microsoft Defender for Endpoint
155139
- Microsoft Security Exposure Management
156140

157141
## Next steps
158142

159143
For more information, see:
160144

161145
- [Manage individual OT network sensors](how-to-manage-individual-sensors.md)
162-
- [Manage OT network sensors from an on-premises management console](legacy-central-management/how-to-manage-sensors-from-the-on-premises-management-console.md)
163-
- [Manage an on-premises management console](legacy-central-management/how-to-manage-the-on-premises-management-console.md)
164146
- [Azure data encryption](/azure/security/fundamentals/encryption-overview)

0 commit comments

Comments
 (0)