Skip to content

Commit 2337a0f

Browse files
authored
Merge pull request #232130 from batamig/intro-concepts
Deployment guide release: overview and concepts
2 parents 3049222 + 6e0fccf commit 2337a0f

23 files changed

+145
-207
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 41 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,50 @@
1515
- name: Microsoft Sentinel solution versions
1616
href: release-notes-sentinel.md
1717
- name: Quickstarts
18-
expanded: false
1918
items:
20-
- name: Get started with OT security monitoring
19+
- name: Add an OT plan to your Azure subscription
2120
href: getting-started.md
2221
displayName: onboard
23-
- name: Enable Enterprise IoT security
24-
href: eiot-defender-for-endpoint.md
25-
displayName: onboard
22+
- name: Concepts
23+
items:
24+
- name: Defender for IoT system components
25+
href: architecture.md
26+
displayName: committed devices
27+
- name: Subscription billing
28+
href: billing.md
29+
- name: Roles and permissions
30+
items:
31+
- name: Overview
32+
href: manage-users-overview.md
33+
displayName: users, user
34+
- name: Azure roles for OT and Enterprise IoT monitoring
35+
href: roles-azure.md
36+
displayName: users, user
37+
- name: On-premises roles for OT monitoring
38+
href: roles-on-premises.md
39+
displayName: users, user
40+
- name: Device inventories
41+
href: device-inventory.md
42+
- name: Alerts
43+
href: alerts.md
44+
- name: Zero Trust and your OT/IoT networks
45+
href: concept-zero-trust.md
46+
- name: Defender for IoT and your SOC
47+
href: concept-sentinel-integration.md
48+
displayName: Microsoft Sentinel, modernize SOC
49+
- name: Securing enterprise IoT devices
50+
href: concept-enterprise.md
51+
displayName: Microsoft Defender for Endpoint, MDE
52+
- name: Azure security baseline for Defender for IoT
53+
href: /security/benchmark/azure/baselines/microsoft-defender-for-iot-security-baseline?bc=%2fazure%2defender-for-iot%2fbreadcrumb%2ftoc.json&toc=%2fazure%2fdefender-for-iot%2fTOC.json
54+
- name: OT monitoring appliance catalog
55+
items:
56+
- name: Which appliances do I need?
57+
href: ot-appliance-sizing.md
58+
- name: Pre-configured appliances
59+
href: ot-pre-configured-appliances.md
60+
- name: OT monitoring with virtual appliances
61+
href: ot-virtual-appliances.md
2662
- name: Deploy
2763
items:
2864
- name: Deploy air-gapped OT sensor management
@@ -64,60 +100,6 @@
64100
href: iot-advanced-threat-monitoring.md
65101
- name: Monitor with Zero Trust principles
66102
href: monitor-zero-trust.md
67-
- name: Concepts
68-
items:
69-
- name: Subscription billing
70-
href: billing.md
71-
- name: Roles and permissions
72-
items:
73-
- name: Overview
74-
href: manage-users-overview.md
75-
displayName: users, user
76-
- name: Azure roles for OT and Enterprise IoT monitoring
77-
href: roles-azure.md
78-
displayName: users, user
79-
- name: On-premises roles for OT monitoring
80-
href: roles-on-premises.md
81-
displayName: users, user
82-
- name: OT system architecture
83-
href: architecture.md
84-
displayName: committed devices
85-
- name: OT sensor cloud connection methods
86-
href: architecture-connections.md
87-
- name: OT network monitoring best practices
88-
items:
89-
- name: Understand your network architecture
90-
href: best-practices/understand-network-architecture.md
91-
- name: Plan your network connections
92-
href: best-practices/plan-network-monitoring.md
93-
- name: Sample connectivity models
94-
href: best-practices/sample-connectivity-models.md
95-
- name: Zero Trust and your OT/IoT networks
96-
href: concept-zero-trust.md
97-
- name: OT monitoring appliance catalog
98-
items:
99-
- name: Which appliances do I need?
100-
href: ot-appliance-sizing.md
101-
- name: Pre-configured appliances
102-
href: ot-pre-configured-appliances.md
103-
- name: OT monitoring with virtual appliances
104-
href: ot-virtual-appliances.md
105-
- name: Supported protocols
106-
href: concept-supported-protocols.md
107-
- name: Defender for IoT device inventory
108-
href: device-inventory.md
109-
- name: Defender for IoT alerts
110-
href: alerts.md
111-
- name: Monitoring OT threats in enterprise SOCs
112-
href: concept-sentinel-integration.md
113-
displayName: Microsoft Sentinel, modernize SOC
114-
- name: Securing IoT devices in the enterprise
115-
href: concept-enterprise.md
116-
displayName: Microsoft Defender for Endpoint, MDE
117-
- name: Security
118-
items:
119-
- name: Azure security baseline for Defender for IoT
120-
href: /security/benchmark/azure/baselines/microsoft-defender-for-iot-security-baseline?bc=%2fazure%2defender-for-iot%2fbreadcrumb%2ftoc.json&toc=%2fazure%2fdefender-for-iot%2fTOC.json
121103
- name: How-to guides
122104
items:
123105
- name: Visualize devices

articles/defender-for-iot/organizations/alerts.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom: enterprise-iot
88

99
# Microsoft Defender for IoT alerts
1010

11-
Microsoft Defender for IoT alerts enhance your network security and operations with real-time details about events logged in your network. Alerts are messages that a Defender for IoT engine triggers when OT or Enterprise IoT network sensors detect changes or suspicious activity in network traffic that needs your attention.
11+
Microsoft Defender for IoT alerts enhance your network security and operations with real-time details about events logged in your network. Alerts are triggered when OT or Enterprise IoT network sensors detect changes or suspicious activity in network traffic that needs your attention.
1212

1313
For example:
1414

@@ -119,6 +119,12 @@ Use the following table to learn more about each alert status and triage option.
119119
> For more information, see [Create alert exclusion rules on an on-premises management console](how-to-accelerate-alert-incident-response.md#create-alert-exclusion-rules-on-an-on-premises-management-console).
120120
>
121121
122+
### Triage OT alerts during learning mode
123+
124+
*Learning mode* refers to the initial period after an OT sensor is deployed, when your OT sensor learns your network's baseline activity, including the devices and protocols in your network, and the regular file transfers that occur between specific devices.
125+
126+
Use learning mode to perform an initial triage on the alerts in your network, *learning* those you want to mark as authorized, expected activity. Learned traffic doesn't generate new alerts the next time the same traffic is detected.
127+
122128
## Next steps
123129

124130
Review alert types and messages to help you understand and plan remediation actions and playbook integrations. For more information, see [OT monitoring alert types and descriptions](alert-engine-messages.md).
Lines changed: 28 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: System architecture for OT monitoring - Microsoft Defender for IoT
2+
title: System architecture for OT/IoT monitoring - Microsoft Defender for IoT
33
description: Learn about the Microsoft Defender for IoT system architecture and data flow.
4-
ms.topic: overview
5-
ms.date: 12/25/2022
4+
ms.topic: conceptual
5+
ms.date: 01/18/2023
66
---
77

8-
# System architecture for OT system monitoring
8+
# Microsoft Defender for IoT components
99

1010
The Microsoft Defender for IoT system is built to provide broad coverage and visibility from diverse data sources.
1111

@@ -18,38 +18,35 @@ Defender for IoT connects to both cloud and on-premises components, and is built
1818
Defender for IoT includes the following OT security monitoring components:
1919

2020
- **The Azure portal**, for cloud management and integration to other Microsoft services, such as Microsoft Sentinel.
21-
- **OT network sensors**, to detect OT devices across your network. OT network sensors are deployed on either a virtual machine or a physical appliance, and configured as cloud-connected sensors, or fully on-premises, locally managed sensors.
22-
- **An on-premises management console** for centralized OT site management in local, air-gapped environments.
2321

24-
## What is a Defender for IoT committed device?
22+
- **Operational technology (OT) or Enterprise IoT network sensors**, to detect devices across your network. Defender for IoT network sensors are deployed on either a virtual machine or a physical appliance. OT sensors can be configured as cloud-connected sensors, or fully on-premises, locally managed sensors.
2523

26-
[!INCLUDE [devices-inventoried](includes/devices-inventoried.md)]
24+
- **An on-premises management console** for centralized OT sensor management and monitoring for local, air-gapped environments.
2725

28-
## OT network sensors
26+
## OT and Enterprise IoT network sensors
2927

30-
OT network sensors discover and continuously monitor network traffic across your OT devices.
28+
Defender for IoT network sensors discover and continuously monitor network traffic across your network devices.
3129

32-
- Network sensors are purpose-built for OT networks and connect to a SPAN port or network TAP. OT network sensors can provide visibility into risks within minutes of connecting to the network.
30+
- Network sensors are purpose-built for OT/IoT networks and connect to a SPAN port or network TAP. Defender for IoT network sensors can provide visibility into risks within minutes of connecting to the network.
3331

34-
- Network sensors use OT-aware analytics engines and Layer-6 Deep Packet Inspection (DPI) to detect threats, such as fileless malware, based on anomalous or unauthorized activity.
32+
- Network sensors use OT/IoT-aware analytics engines and Layer-6 Deep Packet Inspection (DPI) to detect threats, such as fileless malware, based on anomalous or unauthorized activity.
3533

3634
Data collection, processing, analysis, and alerting takes place directly on the sensor, which can be ideal for locations with low bandwidth or high-latency connectivity. Only telemetry and insights are transferred on for management, either to the Azure portal or an on-premises management console.
3735

38-
For more information, see [Onboard OT sensors to Defender for IoT](onboard-sensors.md).
3936

4037
### Cloud-connected vs. local OT sensors
4138

4239
Cloud-connected sensors are sensors that are connected to Defender for IoT in Azure, and differ from locally managed sensors as follows:
4340

44-
When you have a cloud connected OT network sensor:
41+
**When you have a cloud connected OT network sensor**:
4542

4643
- All data that the sensor detects is displayed in the sensor console, but alert information is also delivered to Azure, where it can be analyzed and shared with other Azure services.
4744

4845
- Microsoft threat intelligence packages can be automatically pushed to cloud-connected sensors.
4946

5047
- The sensor name defined during onboarding is the name displayed in the sensor, and is read-only from the sensor console.
5148

52-
In contrast, when working with locally managed sensors:
49+
**In contrast, when working with locally managed sensors**:
5350

5451
- View any data for a specific sensor from the sensor console. For a unified view of all information detected by several sensors, use an on-premises management console.
5552

@@ -69,15 +66,15 @@ For example, the **policy violation detection** engine models industry control s
6966

7067
Since many detection algorithms were built for IT, rather than OT networks, the extra baseline for ICS networks helps to shorten the system's learning curve for new detections.
7168

72-
Defender for IoT network sensors include the following analytics engines:
73-
74-
|Name |Description |
75-
|---------|---------|
76-
|**Protocol violation detection engine** | Identifies the use of packet structures and field values that violate ICS protocol specifications. <br><br>For example, Modbus exceptions or the initiation of an obsolete function code alerts. |
77-
|**Industrial malware detection engine** | Identifies behaviors that indicate the presence of known malware, such as Conficker, Black Energy, Havex, WannaCry, NotPetya, and Triton. |
78-
|**Anomaly detection engine** | Detects unusual machine-to-machine (M2M) communications and behaviors. <br><br>This engine models ICS networks and therefore requires a shorter learning period than analytics developed for IT. Anomalies are detected faster, with minimal false positives. <br><br>For example, Excessive SMB sign-in attempts, and PLC Scan Detected alerts. |
79-
|**Operational incident detection** | Detects operational issues such as intermittent connectivity that can indicate early signs of equipment failure. <br><br> For example, the device might be disconnected (unresponsive), or the Siemens S7 stop PLC command was sent alerts. |
69+
Defender for IoT network sensors include the following main analytics engines:
8070

71+
|Name |Description | Examples |
72+
|---------|---------|---------|
73+
|**Protocol violation detection engine** | Identifies the use of packet structures and field values that violate ICS protocol specifications. <br><br>Protocol violations occur when the packet structure or field values don't comply with the protocol specification.| An *"Illegal MODBUS Operation (Function Code Zero)"* alert indicates that a primary device sent a request with function code 0 to a secondary device. This action isn't allowed according to the protocol specification, and the secondary device might not handle the input correctly |
74+
| **Policy Violation** | A policy violation occurs with a deviation from baseline behavior defined in learned or configured settings. | An *"Unauthorized HTTP User Agent"* alert indicates that an application that wasn't learned or approved by policy is used as an HTTP client on a device. This might be a new web browser or application on that device.|
75+
|**Industrial malware detection engine** | Identifies behaviors that indicate the presence of malicious network activity via known malware, such as Conficker, Black Energy, Havex, WannaCry, NotPetya, and Triton. | A *"Suspicion of Malicious Activity (Stuxnet)"* alert indicates that the sensor detected suspicious network activity known to be related to the Stuxnet malware. This malware is an advanced persistent threat aimed at industrial control and SCADA networks. |
76+
|**Anomaly detection engine** | Detects unusual machine-to-machine (M2M) communications and behaviors. <br><br>This engine models ICS networks and therefore requires a shorter learning period than analytics developed for IT. Anomalies are detected faster, with minimal false positives. | A *"Periodic Behavior in Communication Channel"* alert reflects periodic and cyclic behavior of data transmission, which is common in industrial networks. <br>Other examples include excessive SMB sign-in attempts, and PLC scan detected alerts. |
77+
|**Operational incident detection** | Detects operational issues such as intermittent connectivity that can indicate early signs of equipment failure. | A *"Device is Suspected to be Disconnected (Unresponsive)"* alert is triggered when a device isn't responding to any kind of request for a predefined period. This alert might indicate a device shutdown, disconnection, or malfunction. <br>Another example might be the that Siemens S7 stop PLC command was sent alerts. |
8178

8279
## Management options
8380

@@ -93,15 +90,15 @@ Defender for IoT provides hybrid network support using the following management
9390

9491
:::image type="content" source="media/release-notes/new-interface.png" alt-text="Screenshot that shows the updated interface." lightbox="media/release-notes/new-interface.png":::
9592

96-
- **The on-premises management console**. In air-gapped environments, the on-premises management console provides a centralized view and management options for devices and threats detected by connected OT network sensors. The on-premises management console also lets you organize your network into separate sites and zones to support a [Zero Trust](/security/zero-trust/) mindset, and provides extra maintenance tools and reporting features.
93+
- **The on-premises management console**. In air-gapped environments, you can get a central view of data from all of your sensors from an on-premises management console, using extra maintenance tools and reporting features.
9794

98-
## Next steps
95+
The software version on your on-premises management console must be equal to that of your most up-to-date sensor version. Each on-premises management console version is backwards compatible to older, supported sensor versions, but cannot connect to newer sensor versions.
9996

100-
> [!div class="nextstepaction"]
101-
> [Understand OT sensor connection methods](architecture-connections.md)
97+
## What is a Defender for IoT committed device?
98+
99+
[!INCLUDE [devices-inventoried](includes/devices-inventoried.md)]
102100

103-
> [!div class="nextstepaction"]
104-
> [Connect OT sensors to Microsoft Defender for IoT](connect-sensors.md)
101+
## Next steps
105102

106-
> [!div class="nextstepaction"]
107-
> [Frequently asked questions](resources-frequently-asked-questions.md)
103+
> [!div class="step-by-step"]
104+
> [Understand your network architecture »](architecture.md)

articles/defender-for-iot/organizations/concept-sentinel-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Microsoft Sentinel is a scalable cloud service for security information event ma
2525

2626
In Microsoft Sentinel, the Defender for IoT data connector and solution brings out-of-the-box security content to SOC teams, helping them to view, analyze and respond to OT security alerts, and understand the generated incidents in the broader organizational threat contents.
2727

28-
Install the Defender for IoT data connector alone to stream your OT network alerts to Microsoft Sentinel. Then, also install the **Microsoft Defender for IoT** solution the extra value of IoT/OT-specific analytics rules, workbooks, and SOAR playbooks, as well as incident mappings to [MITRE ATT&CK for ICS](https://collaborate.mitre.org/attackics/index.php/Overview).
28+
Install the Defender for IoT data connector alone to stream your OT network alerts to Microsoft Sentinel. Then, also install the **Microsoft Defender for IoT** solution the extra value of IoT/OT-specific analytics rules, workbooks, and SOAR playbooks, as well as incident mappings to [MITRE ATT&CK for ICS techniques](https://attack.mitre.org/techniques/ics/).
2929

3030
### Integrated detection and response
3131

0 commit comments

Comments
 (0)