Skip to content

Commit 2cffc83

Browse files
authored
Merge pull request #232111 from Shereen-Bhar/integration-section
Integration section review
2 parents 9f9e038 + 42c862c commit 2cffc83

File tree

69 files changed

+543
-577
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+543
-577
lines changed

articles/defender-for-iot/organizations/concept-sentinel-integration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,7 @@ SecurityIncident
125125

126126
For more information, see:
127127

128+
- [Integrations with Microsoft and partner services](integrate-overview.md)
128129
- [Tutorial: Connect Microsoft Defender for IoT with Microsoft Sentinel](../../sentinel/iot-solution.md)
129130
- [Detect threats out-of-the-box with Defender for IoT data](../../sentinel/iot-advanced-threat-monitoring.md#detect-threats-out-of-the-box-with-defender-for-iot-data)
130131
- [Create custom analytics rules to detect threats](../../sentinel/detect-threats-custom.md)

articles/defender-for-iot/organizations/integrate-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ Integrate Microsoft Defender for Iot with partner services to view partner data
1818

1919
## Axonius
2020

21-
2221
|Name |Description |Support scope |Supported by |Learn more |
2322
|---------|---------|---------|---------|---------|
2423
|**Axonius Cybersecurity Asset Management** | Import and manage device inventory discovered by Defender for IoT in your Axonius instance. | - OT networks<br>- Locally managed sensors and on-premises management consoles | Axonius | [Axonius documentation](https://docs.axonius.com/docs/azure-defender-for-iot) |
@@ -106,7 +105,6 @@ Integrate Microsoft Defender for Iot with partner services to view partner data
106105
| **Splunk** | Send Defender for IoT alerts to Splunk | - OT networks <br>- Cloud connected sensors | Microsoft | [Stream Defender for IoT cloud alerts to a partner SIEM](integrations/send-cloud-data-to-partners.md) |
107106
|**Splunk** | Send Defender for IoT alerts to Splunk | - OT networks<br>- Locally managed sensors and on-premises management consoles | Microsoft | [Integrate Splunk with Microsoft Defender for IoT](tutorial-splunk.md) |
108107

109-
110108
## Next steps
111109

112110
> [!div class="nextstepaction"]

articles/defender-for-iot/organizations/integrations/arcsight.md

Lines changed: 21 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This article describes how to send Microsoft Defender for IoT alerts to ArcSight
1313

1414
Before you begin, make sure that you have the following prerequisites:
1515

16-
- Access to a Defender for IoT OT sensor as an Admin user.
16+
- Access to a Defender for IoT OT sensor as an Admin user. For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](../roles-on-premises.md).
1717

1818
## Configure the ArcSight receiver type
1919

@@ -28,32 +28,38 @@ For more information, see the [ArcSight SmartConnectors Documentation](https://w
2828

2929
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to ArcSight.
3030

31-
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
31+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created aren't affected by the rule.
3232

3333
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
3434

35-
1. Sign in to your OT sensor console and select **Forwarding** on the left.
35+
1. Sign in to your OT sensor console and select **Forwarding**.
3636

37-
1. Enter a meaningful name for your rule, and then define your rule details, including:
37+
1. Select **+ Create new rule**.
3838

39-
- The minimal alert level. For example, if you select Minor, you are notified about all minor, major and critical incidents.
40-
- The protocols you want to include in the rule.
41-
- The traffic you want to include in the rule.
39+
1. In the **Add forwarding rule** pane, define the rule parameters:
40+
41+
:::image type="content" source="../media/integrate-arcsight/create-new-forwarding-rule.png" alt-text="Screenshot of creating a new forwarding rule." lightbox="../media/integrate-arcsight/create-new-forwarding-rule.png":::
42+
43+
| Parameter | Description |
44+
|---------|---------|
45+
| **Rule name** | Enter a meaningful name for your rule. |
46+
| **Minimal alert level** | The minimal security level incident to forward. For example, if you select Minor, you're notified about all minor, major and critical incidents. |
47+
| **Any protocol detected** | Toggle off to select the protocols you want to include in the rule. |
48+
| **Traffic detected by any engine** | Toggle off to select the traffic you want to include in the rule. |
4249

4350
1. In the **Actions** area, define the following values:
4451

45-
- **Server**: Select **ArcSight**
46-
- **Host**: The ArcSight server address
47-
- **Port**: The ArcSight server port
48-
- **Timezone**: The timezone of the ArcSight server
52+
| Parameter | Description |
53+
|---------|---------|
54+
| **Server** | Select **ArcSight**. |
55+
| **Host** | The ArcSight server address. |
56+
| **Port** | The ArcSight server port. |
57+
| **Timezone** | Enter the timezone of the ArcSight server. |
4958

5059
1. Select **Save** to save your forwarding rule.
5160

5261
## Next steps
5362

54-
For more information, see:
55-
56-
- [Integrations with partner services](../integrate-overview.md)
63+
- [Integrations with Microsoft and partner services](../integrate-overview.md)
5764
- [Forward alert information](../how-to-forward-alert-information-to-partners.md)
5865
- [Manage individual sensors](../how-to-manage-individual-sensors.md)
59-

articles/defender-for-iot/organizations/integrations/logrhythm.md

Lines changed: 22 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -13,32 +13,41 @@ This article describes how to send Microsoft Defender for IoT alerts to LogRhyth
1313

1414
Before you begin, make sure that you have the following prerequisites:
1515

16-
- Access to a Defender for IoT OT sensor as an Admin user.
16+
- Access to a Defender for IoT OT sensor as an Admin user. For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](../roles-on-premises.md).
1717

1818
## Create a Defender for IoT forwarding rule
1919

2020
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to LogRhythm.
2121

22-
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
22+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created aren't affected by the rule.
2323

2424
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
2525

26-
1. Sign in to your OT sensor console and select **Forwarding** on the left.
26+
1. Sign in to your OT sensor console and select **Forwarding**.
2727

28-
1. Enter a meaningful name for your rule, and then define your rule details, including:
28+
1. Select **+ Create new rule**.
2929

30-
- The minimal alert level. For example, if you select Minor, you are notified about all minor, major and critical incidents.
31-
- The protocols you want to include in the rule.
32-
- The traffic you want to include in the rule.
30+
1. In the **Add forwarding rule** pane, define the rule parameters:
31+
32+
:::image type="content" source="../media/integrate-logrhythm/create-new-forwarding-rule.png" alt-text="Screenshot of creating a new forwarding rule." lightbox="../media/integrate-logrhythm/create-new-forwarding-rule.png":::
33+
34+
| Parameter | Description |
35+
|---------|---------|
36+
| **Rule name** | Enter a meaningful name for your rule. |
37+
| **Minimal alert level** | The minimal security level incident to forward. For example, if you select Minor, you're notified about all minor, major and critical incidents. |
38+
| **Any protocol detected** | Toggle off to select the protocols you want to include in the rule. |
39+
| **Traffic detected by any engine** | Toggle off to select the traffic you want to include in the rule. |
3340

3441
1. In the **Actions** area, define the following values:
3542

36-
- **Server**: Select a SYSLOG server option, such as **SYSLOG Server (LEEF format)
37-
- **Host**: The IP or hostname of your LogRhythm collector
38-
- **Port**: Enter **514**
39-
- **Timezone**: Enter your timezone
43+
| Parameter | Description |
44+
|---------|---------|
45+
| **Server** | Select a SYSLOG server option, such as **SYSLOG Server (LEEF format)**. |
46+
| **Host** | The IP or hostname of your LogRhythm collector |
47+
| **Port** | Enter 514. |
48+
| **Timezone** | Enter your timezone. |
4049

41-
1. Select **Save** to save your forwarding rule.
50+
1. Select **Save**.
4251

4352
## Configure LogRhythm to collect logs
4453

@@ -48,7 +57,5 @@ For more information, see the [LogRhythm documentation](https://docs.logrhythm.c
4857

4958
## Next steps
5059

51-
For more information, see:
52-
53-
- [Integrations with partner services](../integrate-overview.md)
60+
- [Integrations with Microsoft and partner services](../integrate-overview.md)
5461
- [Forward alert information](../how-to-forward-alert-information-to-partners.md)

articles/defender-for-iot/organizations/integrations/netwitness.md

Lines changed: 21 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -13,39 +13,46 @@ This article describes how to send Microsoft Defender for IoT alerts to RSA NetW
1313

1414
Before you begin, make sure that you have the following prerequisites:
1515

16-
- Access to a Defender for IoT OT sensor as an Admin user.
16+
- Access to a Defender for IoT OT sensor as an Admin user. For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](../roles-on-premises.md).
1717

1818
- NetWitness configuration to collect events from sources that support Common Event Format (CEF). For more information, see the [CyberX Platform - RSA NetWitness CEF Parser Implementation Guide](https://community.netwitness.com//t5/netwitness-platform-integrations/cyberx-platform-rsa-netwitness-cef-parser-implementation-guide/ta-p/554364).
1919

2020
## Create a Defender for IoT forwarding rule
2121

2222
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to NetWitness.
2323

24-
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
24+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created aren't affected by the rule.
2525

2626
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
2727

28-
1. Sign in to your OT sensor console and select **Forwarding** on the left.
28+
1. Sign in to your OT sensor console and select **Forwarding**.
2929

30-
1. Enter a meaningful name for your rule, and then define your rule details, including:
30+
1. Select **+ Create new rule**.
3131

32-
- The minimal alert level. For example, if you select Minor, you are notified about all minor, major and critical incidents.
33-
- The protocols you want to include in the rule.
34-
- The traffic you want to include in the rule.
32+
1. In the **Add forwarding rule** pane, define the rule parameters:
33+
34+
:::image type="content" source="../media/integrate-netwitness/create-new-forwarding-rule.png" alt-text="Screenshot of creating a new forwarding rule." lightbox="../media/integrate-netwitness/create-new-forwarding-rule.png":::
35+
36+
| Parameter | Description |
37+
|---------|---------|
38+
| **Rule name** | Enter a meaningful name for your rule. |
39+
| **Minimal alert level** | The minimal security level incident to forward. For example, if you select Minor, you're notified about all minor, major and critical incidents. |
40+
| **Any protocol detected** | Toggle off to select the protocols you want to include in the rule. |
41+
| **Traffic detected by any engine** | Toggle off to select the traffic you want to include in the rule. |
3542

3643
1. In the **Actions** area, define the following values:
3744

38-
- **Server**: Select **NetWitness**
39-
- **Host**: The NetWitness hostname
40-
- **Port**: The NetWitness port
41-
- **Timezone**: Enter your NetWitness timezone
45+
| Parameter | Description |
46+
|---------|---------|
47+
| **Server** | Select **NetWitness**. |
48+
| **Host** | The NetWitness hostname. |
49+
| **Port** | The NetWitness port. |
50+
| **Timezone** | Enter your NetWitness timezone. |
4251

4352
1. Select **Save** to save your forwarding rule.
4453

4554
## Next steps
4655

47-
For more information, see:
48-
4956
- [CyberX Platform - RSA NetWitness CEF Parser Implementation Guide](https://community.netwitness.com//t5/netwitness-platform-integrations/cyberx-platform-rsa-netwitness-cef-parser-implementation-guide/ta-p/554364)
50-
- [Integrations with partner services](../integrate-overview.md)
57+
- [Integrations with Microsoft and partner services](../integrate-overview.md)
5158
- [Forward alert information](../how-to-forward-alert-information-to-partners.md)

articles/defender-for-iot/organizations/integrations/on-premises-sentinel.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ Before you start, make sure that you have the following prerequisites as needed:
2424

2525
- If you want to encrypt the data you send to Microsoft Sentinel using TLS, make sure to generate a valid TLS certificate from the proxy server to use in your forwarding alert rule.
2626

27-
2827
## Set up forwarding alert rules
2928

3029
1. Sign into your OT network sensor or on-premises management console and create a forwarding rule. For more information, see [Forward on-premises OT alert information](../how-to-forward-alert-information-to-partners.md).
@@ -40,11 +39,14 @@ Select **Save** when you're done. Make sure to test the rule to make sure that i
4039
> [!IMPORTANT]
4140
> To forward alert details to multiple Microsoft Sentinel instances, make sure to create a separate forwarding rule for each instance. Don't use the **Add server** option in the same forwarding rule to send data to multiple Microsoft Sentinel instances.
4241
43-
4442
## Next steps
4543

4644
> [!div class="nextstepaction"]
4745
> [Stream data from cloud-connected sensors](../iot-solution.md)
4846
4947
> [!div class="nextstepaction"]
50-
> [Investigate in Microsoft Sentinel](../../../sentinel/investigate-cases.md)
48+
> [Investigate in Microsoft Sentinel](../../../sentinel/investigate-cases.md)
49+
50+
For more information, see:
51+
> [!div class="nextstepaction"]
52+
> [Integrations with Microsoft and partner services](../integrate-overview.md)

articles/defender-for-iot/organizations/integrations/send-cloud-data-to-partners.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,6 @@ You'll need Azure Active Directory (Azure AD) defined as a service principal for
4848
- **Application (client) ID**
4949
- **Directory (tenant) ID**
5050

51-
5251
1. From the **Certificates & secrets** page, note the values of your client secret **Value** and **Secret ID**.
5352

5453
## Create an Azure event hub
@@ -108,6 +107,7 @@ Once data starts getting ingested into Splunk from your event hub, query the dat
108107

109108
## Next steps
110109

111-
This article describes how to forward alerts generated by cloud-connected sensors only. If you're working on-premises, such as in air-gapped environments, you may be able to create a forwarding alert rule to forward alert data directly from an OT sensor or on-premises management console.
110+
This article describes how to forward alerts generated by cloud-connected sensors only. If you're working on-premises, such as in air-gapped environments, you may be able to create a forwarding alert rule to forward alert data directly from an OT sensor or on-premises management console.
112111

113-
For more information, see [Integrations with Microsoft and partner services](../integrate-overview.md).
112+
> [!div class="nextstepaction"]
113+
> [Integrations with Microsoft and partner services](../integrate-overview.md).

0 commit comments

Comments
 (0)