You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/best-practices/certificate-requirements.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: SSL/TLS certificate file requirements - Microsoft Defender for IoT
3
-
description: Learn about requirements for SSL/TLS certificates used with Microsoft Defender for IOT OT sensors and on-premises management consoles.
3
+
description: Learn about requirements for SSL/TLS certificates used with Microsoft Defender for IOT OT sensors.
4
4
ms.date: 01/17/2023
5
5
ms.topic: install-set-up-deploy
6
6
---
@@ -15,15 +15,13 @@ Use the content below to learn about the requirements for [creating SSL/TLS cert
15
15
16
16
Defender for IoT uses SSL/TLS certificates to secure communication between the following system components:
17
17
18
-
- Between users and the OT sensor or on-premises management console UI access
19
-
- Between OT sensors and an on-premises management console, including [API communication](../references-work-with-defender-for-iot-apis.md)
20
-
- Between an on-premises management console and a high availability (HA) server, if configured
21
-
- Between OT sensors or on-premises management consoles and partners servers defined in [alert forwarding rules](../how-to-forward-alert-information-to-partners.md)
18
+
- Between users and the OT sensor
19
+
- Between OT sensors and partners servers defined in [alert forwarding rules](../how-to-forward-alert-information-to-partners.md)
22
20
23
-
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
21
+
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors, and will block encrypted communication between Defender for IoT components.
24
22
25
23
> [!IMPORTANT]
26
-
> You must create a unique certificate for each OT sensor, on-premises management console, and high availability server, where each certificate meets required criteria.
24
+
> You must create a unique certificate for each OT sensor, and high availability server, where each certificate meets required criteria.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages.md
+3-25Lines changed: 3 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,13 +27,13 @@ To perform the procedures in this article, make sure that you have:
27
27
28
28
- One or more OT sensors [onboarded](onboard-sensors.md) to Azure.
29
29
30
-
- Relevant permissions on the Azure portal and any OT network sensors or on-premises management console you want to update.
30
+
- Relevant permissions on the Azure portal and any OT network sensors you want to update.
31
31
32
32
-**To download threat intelligence packages from the Azure portal**, you need access to the Azure portal as a [Security Reader](../../role-based-access-control/built-in-roles.md#security-reader), [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin), [Contributor](../../role-based-access-control/built-in-roles.md#contributor), or [Owner](../../role-based-access-control/built-in-roles.md#owner) role.
33
33
34
34
-**To push threat intelligence updates to cloud-connected OT sensors from the Azure portal**, you need access to the Azure portal as a [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin), [Contributor](../../role-based-access-control/built-in-roles.md#contributor), or [Owner](../../role-based-access-control/built-in-roles.md#owner) role.
35
35
36
-
-**To manually upload threat intelligence packages to OT sensors or on-premises management consoles**, you need access to the OT sensor or on-premises management console as an **Admin** user.
36
+
-**To manually upload threat intelligence packages to OT sensors**, you need access to the OT sensor as an **Admin** user.
37
37
38
38
For more information, see [Azure user roles and permissions for Defender for IoT](roles-azure.md) and [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
39
39
@@ -51,7 +51,7 @@ Update threat intelligence packages on your OT sensors using any of the followin
51
51
52
52
-[Have updates pushed](#automatically-push-updates-to-cloud-connected-sensors) to cloud-connected OT sensors automatically as they're released.
53
53
-[Manually push](#manually-push-updates-to-cloud-connected-sensors) updates to cloud-connected OT sensors.
54
-
-[Download an update package](#manually-update-locally-managed-sensors) and manually upload it to your OT sensor. Alternately, upload the package to an on-premises management console and push the updates from there to any connected OT sensors.
54
+
-[Download an update package](#manually-update-locally-managed-sensors) and manually upload it to your OT sensor.
55
55
56
56
### Automatically push updates to cloud-connected sensors
57
57
@@ -87,8 +87,6 @@ The **Threat Intelligence update status** field displays the update progress for
87
87
88
88
If you're working with locally managed OT sensors, you need to download the updated threat intelligence packages and upload them manually on your sensors.
89
89
90
-
If you're also working with an on-premises management console, we recommend that you upload the threat intelligence package to the on-premises management console and push the update from there.
91
-
92
90
> [!TIP]
93
91
> This option can also be used for cloud-connected sensors if you don't want to push the updates from the Azure portal.
94
92
>
@@ -111,24 +109,6 @@ If you're also working with an on-premises management console, we recommend that
111
109
112
110
1. Browse to and select the package you'd downloaded from the Azure portal and upload it to the sensor.
113
111
114
-
**To update multiple sensors simultaneously:**
115
-
116
-
1. Sign in to your on-premises management console and select **System settings**.
117
-
118
-
1. In the **Sensor Engine Configuration** area, select the sensors that you want to receive the updated packages. For example:
119
-
120
-
:::image type="content" source="media/how-to-work-with-threat-intelligence-packages/update-threat-intelligence-multiple-sensors.png" alt-text="Screenshot of where you can select which sensors you want to make changes to." lightbox="media/how-to-work-with-threat-intelligence-packages/update-threat-intelligence-multiple-sensors.png":::
121
-
122
-
1. In the **Sensor Threat Intelligence Data** section, select the plus sign (**+**).
123
-
124
-
1. In the **Upload File** dialog, select **BROWSE FILE...** to browse to and select the update package. For example:
125
-
126
-
:::image type="content" source="media/how-to-work-with-threat-intelligence-packages/upload-threat-intelligence-to-management-console.png" alt-text="Screenshot of where you can upload a Threat Intelligence package to multiple sensors." lightbox="media/how-to-work-with-threat-intelligence-packages/upload-threat-intelligence-to-management-console.png":::
127
-
128
-
1. Select **CLOSE** and then **SAVE CHANGES** to push the threat intelligence update to all selected sensors.
129
-
130
-
:::image type="content" source="media/how-to-work-with-threat-intelligence-packages/save-changes-management-console.png" alt-text="Screenshot of where you can save changes made to selected sensors on the management console." lightbox="media/how-to-work-with-threat-intelligence-packages/save-changes-management-console.png":::
131
-
132
112
## Review threat intelligence update statuses
133
113
134
114
On each OT sensor, the threat intelligence update status and version information are shown in the sensor's **System settings > Threat intelligence** settings.
@@ -155,5 +135,3 @@ For cloud-connected OT sensors, threat intelligence data is also shown in the **
155
135
For more information, see:
156
136
157
137
-[Onboard OT sensors to Defender for IoT](onboard-sensors.md)
158
-
159
-
-[Manage sensors from the management console](legacy-central-management/how-to-manage-sensors-from-the-on-premises-management-console.md)
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/manage-users-sensor.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.topic: how-to
7
7
---
8
8
# Create and manage users on an OT network sensor
9
9
10
-
Microsoft Defender for IoT provides tools for managing on-premises user access in the OT network sensor, and the legacy on-premises management console. Azure users are managed [at the Azure subscription level](manage-users-overview.md) using Azure RBAC.
10
+
Microsoft Defender for IoT provides tools for managing on-premises user access in the OT network sensor. Azure users are managed [at the Azure subscription level](manage-users-overview.md) using Azure RBAC.
11
11
12
12
This article describes how to manage on-premises users directly on an OT network sensor.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/references-data-retention.md
+11-29Lines changed: 11 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
title: Data retention and sharing across Microsoft Defender for IoT
3
-
description: Learn about the data retention periods and capacities for Microsoft Defender for IoT data stored in Microsoft Azure, the OT sensor, and on-premises management console.
3
+
description: Learn about the data retention periods and capacities for Microsoft Defender for IoT data stored in Microsoft Azure and the OT sensor.
4
4
ms.topic: conceptual
5
5
ms.date: 06/30/2024
6
6
---
7
7
8
8
# Data retention, privacy, and sharing across Microsoft Defender for IoT
9
9
10
-
Microsoft Defender for IoT stores data in the Microsoft Azure portal, in OT network sensors, and in on-premises management consoles.
10
+
Microsoft Defender for IoT stores data in the Microsoft Azure portal, in OT network sensors.
11
11
12
12
Each storage type has varying storage capacity options and retention times. This article describes the data retention policy for the amount of data and length of time the data is stored in each storage type before being deleted or overwritten.
13
13
@@ -46,7 +46,6 @@ The following table lists how long device data is stored in each Defender for Io
46
46
|---------|---------|
47
47
|**Azure portal**| 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your device inventory from the Azure portal](how-to-manage-device-inventory-for-organizations.md). |
48
48
|**OT network sensor**| 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your OT device inventory from a sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md). |
49
-
|**On-premises management console**| 90 days from the date of the **Last activity** value. <br><br> For more information, see [Manage your OT device inventory from an on-premises management console](legacy-central-management/how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md). |
50
49
51
50
## Alert data retention
52
51
@@ -56,7 +55,6 @@ The following table lists how long alert data is stored in each Defender for IoT
56
55
|---------|---------|
57
56
|**Azure portal**| 90 days from the date in the **First detection** value. <br><br> For more information, see [View and manage alerts from the Azure portal](how-to-manage-cloud-alerts.md). |
58
57
|**OT network sensor**| 90 days from the date in the **First detection** value.<br><br> For more information, see [View alerts on your sensor](how-to-view-alerts.md). |
59
-
|**On-premises management console**| 90 days from the date in the **First detection** value.<br><br> For more information, see [Work with alerts on the on-premises management console](legacy-central-management/how-to-work-with-alerts-on-premises-management-console.md). |
60
58
61
59
### OT alert PCAP data retention
62
60
@@ -66,7 +64,6 @@ The following table lists how long PCAP data is stored in each Defender for IoT
66
64
|---------|---------|
67
65
|**Azure portal**| PCAP files are available for download from the Azure portal for as long as the OT network sensor stores them. <br><br> Once downloaded, the files are cached on the Azure portal for 48 hours. <br><br> For more information, see [Access alert PCAP data](how-to-manage-cloud-alerts.md#access-alert-pcap-data). |
68
66
|**OT network sensor**| Dependent on the sensor's storage capacity allocated for PCAP files, which determines its [hardware profile](ot-appliance-sizing.md): <br><br>- **C5600**: 130 GB <br>- **E1800**: 130 GB <br>- **E1000** : 78 GB<br>- **E500**: 78 GB <br>- **L500**: 7 GB <br>- **L100**: 2.5 GB<br><br> If a sensor exceeds its maximum storage capacity, the oldest PCAP file is deleted to accommodate the new one. <br><br> For more information, see [Access alert PCAP data](how-to-view-alerts.md#access-alert-pcap-data) and [Pre-configured physical appliances for OT monitoring](ot-pre-configured-appliances.md). |
69
-
|**On-premises management console**| PCAP files aren't stored on the on-premises management console and are only accessed from the on-premises management console via a direct link to the OT sensor. |
70
67
71
68
The usage of available PCAP storage space depends on factors such as the number of alerts, the type of the alert, and the network bandwidth, all of which affect the size of the PCAP file.
72
69
@@ -104,21 +101,19 @@ For more information, see [Track sensor activity](how-to-track-sensor-activity.m
104
101
105
102
Service and processing log files are stored on the Azure portal for 30 days from their creation date.
106
103
107
-
Other OT monitoring log files are stored only on the OT network sensor and the on-premises management console.
104
+
Other OT monitoring log files are stored only on the OT network sensor.
108
105
109
106
For more information, see:
110
107
111
108
-[Troubleshoot the sensor](how-to-troubleshoot-sensor.md)
112
-
-[Troubleshoot the on-premises management console](legacy-central-management/how-to-troubleshoot-on-premises-management-console.md)
113
109
114
110
## Backup file capacity
115
111
116
-
Both the OT network sensor and the on-premises management console have automated backups running daily, and older backup files are overwritten when the configured storage capacity reaches its limit.
112
+
The OT network sensor has automated backups running daily, and older backup files are overwritten when the configured storage capacity reaches its limit.
117
113
118
114
For more information, see:
119
115
120
116
-[Set up backup and restore files on an OT sensor](back-up-restore-sensor.md#set-up-backup-and-restore-files)
121
-
-[Configure OT sensor backup settings on an on premises management console](legacy-central-management/back-up-sensors-from-management.md#configure-ot-sensor-backup-settings)
122
117
123
118
### Backups on the OT network sensor
124
119
@@ -132,33 +127,20 @@ The retention of backup files depends on the sensor's architecture, as each hard
132
127
|**E1800**| 100 GB |
133
128
|**C5600**| 100 GB |
134
129
135
-
If the device can't allocate enough hard disk space, then only the last backup is saved on the on-premises management console.
130
+
## Data sharing for Microsoft Defender for IoT
136
131
137
-
### Backups on the on-premises management console
132
+
Microsoft Defender for IoT shares data, including customer data, among the following Microsoft products, also licensed by the customer.
138
133
139
-
Allocated hard disk space for on-premises management console backup files is limited to 10 GB and to only 20 backups.
140
-
141
-
If you're using an on-premises management console, each connected OT sensor also has its own, extra backup directory on the on-premises management console:
142
-
143
-
- A single sensor backup file is limited to a maximum of 40 GB. A file exceeding that size isn't sent to the on-premises management console.
144
-
- Total hard disk space allocated to sensor backup from all sensors on the on-premises management console is 100 GB.
145
-
146
-
## Data sharing for Microsoft Defender for IoT
147
-
148
-
Microsoft Defender for IoT shares data, including customer data, among the following Microsoft products, also licensed by the customer.
149
-
150
-
- Microsoft Defender XDR
151
-
- Microsoft Sentinel
152
-
- Microsoft Threat Intelligence Center
153
-
- Microsoft Defender for Cloud
154
-
- Microsoft Defender for Endpoint
134
+
- Microsoft Defender XDR
135
+
- Microsoft Sentinel
136
+
- Microsoft Threat Intelligence Center
137
+
- Microsoft Defender for Cloud
138
+
- Microsoft Defender for Endpoint
155
139
- Microsoft Security Exposure Management
156
140
157
141
## Next steps
158
142
159
143
For more information, see:
160
144
161
145
-[Manage individual OT network sensors](how-to-manage-individual-sensors.md)
162
-
-[Manage OT network sensors from an on-premises management console](legacy-central-management/how-to-manage-sensors-from-the-on-premises-management-console.md)
163
-
-[Manage an on-premises management console](legacy-central-management/how-to-manage-the-on-premises-management-console.md)
164
146
-[Azure data encryption](/azure/security/fundamentals/encryption-overview)
0 commit comments