You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md
+17-5Lines changed: 17 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,11 +84,11 @@ Disable custom alert rules to prevent them from running without deleting them al
84
84
85
85
In the **Custom alert rules** page, select one or more rules, and then select **Disable**, **Enable**, or **Delete** in the toolbar as needed.
86
86
87
-
## Learn DNS traffic on an OT sensor
87
+
## Allow DNS traffic on an OT sensor
88
88
89
-
*Learn* unauthorized internet alerts in bulk by creating an allowlist of domain names on your OT sensor.
89
+
Allow unauthorized internet alerts in bulk by creating an allowlist of domain names on your OT sensor.
90
90
91
-
When a DNS allowlist is configured, the sensor checks each unauthorized internet connectivity attempt against the list. If the domain's FQDN is included in the allowlist, the sensor learns the traffic automatically, without triggering an alert.
91
+
When a DNS allowlist is configured, the sensor checks each unauthorized internet connectivity attempt against the list. If the domain's FQDN is included in the allowlist, the sensor allows the traffic automatically, without triggering an alert.
92
92
93
93
**To define a DNS allowlist:**
94
94
@@ -98,14 +98,26 @@ When a DNS allowlist is configured, the sensor checks each unauthorized internet
98
98
99
99
1. Select **Edit** :::image type="icon" source="media/how-to-generate-reports/manage-icon.png" border="false"::: for the **Internet Domain Allowlist** row. For example:
100
100
101
-
:::image type="content" source="media/how-to-manage-individual-sensors/dns-edit-configuration.png" alt-text="Screenshot of how to edit configurations for DNS in the sensor console." lightbox="media/how-to-manage-individual-sensors/dns-edit-configuration.png":::
101
+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/dns-edit-configuration.png" alt-text="Screenshot of how to edit configurations for DNS in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/dns-edit-configuration.png":::
102
102
103
103
1. In the **Edit configuration** pane > **Fqdn allowlist** field, enter one or more domain names. Separate multiple domain names with commas. Your sensor won't generate alerts for unauthorized internet connectivity attempts on the configured domains.
104
104
105
105
1. Select **Submit** to save your changes.
106
106
107
107
> [!TIP]
108
-
> All OT sensor users can view the currently configured list of domains in a data mining report, including the FQDNs and resolved IP addresses, and the last resolution time. For more information, see [Create data mining queries](how-to-create-data-mining-queries.md).
108
+
> All OT sensor users can view the currently configured list of domains in a data mining report, including the FQDNs, resolved IP addresses, and the last resolution time. For more information, see [Create data mining queries](how-to-create-data-mining-queries.md).
109
+
110
+
**To view in a data mining report:**
111
+
112
+
[Create a custom data mining report](how-to-create-data-mining-queries.md#create-an-ot-sensor-custom-data-mining-report) and make sure to select **Internet Domain Allowlist** under **DNS** when choosing a category in the **Create new report** pane.
113
+
114
+
For example:
115
+
116
+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/data-mining-allowlist.png" alt-text="Screenshot of how to generate a custom data mining report for the allowlist in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/data-mining-allowlist.png":::
117
+
118
+
The generated data mining report will then show a list of the allowed domains and each IP address that’s being resolved for those domains, as well as the TTL (in seconds) during which those IP addresses won't trigger an internet connectivity alert. For example:
119
+
120
+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png" alt-text="Screenshot of data mining report of allowlist in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png":::
109
121
110
122
## Create alert exclusion rules on an on-premises management console
0 commit comments