Skip to content

Commit 2ef1fa7

Browse files
authored
Merge pull request #232346 from batamig/post-deploy-sanity
post deploy sanity
2 parents 5845e1f + ac8e4b8 commit 2ef1fa7

13 files changed

+19
-79
lines changed

articles/defender-for-iot/organizations/alerts.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,11 @@ While you can view alert details, investigate alert context, and triage and mana
3232
|**OT network sensor consoles** | Alerts generated by that OT sensor | - View the alert's source and destination in the **Device map** <br>- View related events on the **Event timeline** <br>- Forward alerts directly to partner vendors <br>- Create alert comments <br> - Create custom alert rules <br>- Unlearn alerts |
3333
|**An on-premises management console** | Alerts generated by connected OT sensors | - Forward alerts directly to partner vendors <br> - Create alert exclusion rules |
3434

35-
For more information, see [Accelerating OT alert workflows](#accelerating-ot-alert-workflows) and [Alert statuses and triaging options](alerts.md#alert-statuses-and-triaging-options) below.
35+
For more information, see:
36+
37+
- [Alert data retention](references-data-retention.md#alert-data-retention)
38+
- [Accelerating OT alert workflows](#accelerating-ot-alert-workflows)
39+
- [Alert statuses and triaging options](alerts.md#alert-statuses-and-triaging-options)
3640

3741
Alert options also differ depending on your location and user role. For more information, see [Azure user roles and permissions](roles-azure.md) and [On-premises users and roles](roles-on-premises.md).
3842

articles/defender-for-iot/organizations/best-practices/sample-connectivity-models.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,22 +17,16 @@ The following diagram shows an example of a ring network topology, in which each
1717

1818
## Sample: Linear bus and star topology
1919

20-
In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. In the following example, lower switches aren't monitored, and traffic that remains local to these switches won't be seen. Devices might be identified based on ARP messages, but connection information will be missing.
20+
In a star network such as the one shown in the diagram below, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. In the following example, lower switches aren't monitored, and traffic that remains local to these switches won't be seen. Devices might be identified based on ARP messages, but connection information will be missing.
2121

2222
:::image type="content" source="../media/how-to-set-up-your-network/linear-bus-star-topology.png" alt-text="Diagram of the linear bus and star topology." border="false" lightbox="../media/how-to-set-up-your-network/linear-bus-star-topology.png":::
2323

2424
## Sample: Multi-layer, multi-tenant network
2525

26-
The following diagram is a general abstraction of a multilayer, multitenant network, with an expansive cybersecurity ecosystem typically operated by an SOC and MSSP.
27-
28-
Typically, NTA sensors are deployed in layers 0 to 3 of the OSI model.
26+
The following diagram is a general abstraction of a multilayer, multi-tenant network, with an expansive cybersecurity ecosystem typically operated by an security operations center (SOC) and managed security service provider (MSSP). Defender for IoT sensors are typically deployed in layers 0 to 3 of the OSI model.
2927

3028
:::image type="content" source="../media/how-to-set-up-your-network/osi-model.png" alt-text="Diagram of the OSI model." lightbox="../media/how-to-set-up-your-network/osi-model.png" border="false":::
3129

3230
## Next steps
3331

34-
After you've [understood your own network's OT architecture](understand-network-architecture.md) and [planned out your deployment](plan-network-monitoring.md), learn more about methods for traffic mirroring and passive or active monitoring.
35-
36-
For more information, see:
37-
38-
- [Traffic mirroring methods for OT monitoring](traffic-mirroring-methods.md)
32+
For more information, see [Traffic mirroring methods for OT monitoring](traffic-mirroring-methods.md).

articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -159,20 +159,5 @@ For more information, see
159159

160160
## Next steps
161161

162-
> [!div class="nextstepaction"]
163-
> [View and manage alerts from the Azure portal](how-to-manage-cloud-alerts.md)
164-
165-
> [!div class="nextstepaction"]
166-
> [View and manage alerts on your OT sensor](how-to-view-alerts.md)
167-
168-
> [!div class="nextstepaction"]
169-
> [Forward alert information](how-to-forward-alert-information-to-partners.md)
170-
171-
> [!div class="nextstepaction"]
172-
> [OT monitoring alert types and descriptions](alert-engine-messages.md)
173-
174-
> [!div class="nextstepaction"]
175-
> [View and manage alerts on the the on-premises management console](how-to-work-with-alerts-on-premises-management-console.md)
176-
177162
> [!div class="nextstepaction"]
178163
> [Microsoft Defender for IoT alerts](alerts.md)

articles/defender-for-iot/organizations/how-to-forward-alert-information-to-partners.md

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -310,18 +310,5 @@ If your forwarding alert rules aren't working as expected, check the following d
310310

311311
## Next steps
312312

313-
> [!div class="nextstepaction"]
314-
> [Microsoft Defender for IoT alerts](alerts.md)
315-
316-
> [!div class="nextstepaction"]
317-
> [View and manage alerts on your OT sensor](how-to-view-alerts.md)
318-
319-
> [!div class="nextstepaction"]
320-
> [View and manage alerts from the Azure portal](how-to-manage-cloud-alerts.md)
321-
322-
> [!div class="nextstepaction"]
323-
> [OT monitoring alert types and descriptions](alert-engine-messages.md)
324-
325-
326313
> [!div class="nextstepaction"]
327314
> [Microsoft Defender for IoT alerts](alerts.md)

articles/defender-for-iot/organizations/how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,7 @@ For more information, see [Defender for IoT sensor and management console APIs](
166166

167167
For more information, see:
168168

169+
- [Defender for IoT device inventory](device-inventory.md)
169170
- [Control what traffic is monitored](how-to-control-what-traffic-is-monitored.md)
170171
- [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md)
171172
- [Device data retention periods](references-data-retention.md#device-data-retention-periods).

articles/defender-for-iot/organizations/how-to-investigate-sensor-detections-in-a-device-inventory.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,7 @@ All devices detected within the range of the filter will be deleted. If you dele
152152

153153
For more information, see:
154154

155+
- [Defender for IoT device inventory](device-inventory.md)
155156
- [Control what traffic is monitored](how-to-control-what-traffic-is-monitored.md)
156157
- [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md)
157158
- [Device data retention periods](references-data-retention.md#device-data-retention-periods)

articles/defender-for-iot/organizations/how-to-manage-cloud-alerts.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -147,14 +147,5 @@ The file is generated, and you're prompted to save it locally.
147147

148148
## Next steps
149149

150-
> [!div class="nextstepaction"]
151-
> [Forward alert information](how-to-forward-alert-information-to-partners.md)
152-
153-
> [!div class="nextstepaction"]
154-
> [OT monitoring alert types and descriptions](alert-engine-messages.md)
155-
156150
> [!div class="nextstepaction"]
157151
> [Microsoft Defender for IoT alerts](alerts.md)
158-
159-
> [!div class="nextstepaction"]
160-
> [Data retention across Microsoft Defender for IoT](references-data-retention.md)

articles/defender-for-iot/organizations/how-to-manage-device-inventory-for-organizations.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,7 @@ The merged device that is now listed in the grid retains the details of the devi
174174

175175
For more information, see:
176176

177+
- [Defender for IoT device inventory](device-inventory.md)
177178
- [Control what traffic is monitored](how-to-control-what-traffic-is-monitored.md)
178179
- [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md)
179180
- [Device data retention periods](references-data-retention.md#device-data-retention-periods).

articles/defender-for-iot/organizations/how-to-manage-sensors-on-the-cloud.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -191,11 +191,8 @@ If you need to open a support ticket for a locally managed sensor, upload a diag
191191

192192
## Next steps
193193

194-
> [!div class="nextstepaction"]
195-
> [Manage OT sensors from the sensor console](how-to-manage-individual-sensors.md)
196-
197194
> [!div class="nextstepaction"]
198195
> [Define and view OT sensor settings from the Azure portal (Public preview)](configure-sensor-settings-portal.md)
199196
200197
> [!div class="nextstepaction"]
201-
> [View and manage alerts on the Defender for IoT portal (Preview)](how-to-manage-cloud-alerts.md)
198+
> [Manage OT sensors from the sensor console](how-to-manage-individual-sensors.md)

articles/defender-for-iot/organizations/how-to-track-sensor-activity.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,23 +9,20 @@ ms.topic: how-to
99

1010
Activity detected by your Microsoft Defender for IoT sensors is recorded in the event timeline. Activity includes alerts and alert management actions, network events, and user operations such as user sign-in or user deletion.
1111

12-
The event timeline provides a chronological view and context of all network activity, to help determine the cause and effect of incidents. The timeline view makes it easy to extract information from network events, and more efficiently analyze alerts and events observed on the network. With the ability to store vast amounts of data, the event timeline view can be a valuable resource for security teams to perform investigations and gain a deeper understanding of network activity.
12+
The OT sensor's event timeline provides a chronological view and context of all network activity, to help determine the cause and effect of incidents. The timeline view makes it easy to extract information from network events, and more efficiently analyze alerts and events observed on the network. With the ability to store vast amounts of data, the event timeline view can be a valuable resource for security teams to perform investigations and gain a deeper understanding of network activity.
1313

1414
Use the event timeline during investigations, to understand and analyze the chain of events that preceded and followed an attack or incident. The centralized view of multiple security-related events on the same timeline helps to identify patterns and correlations, and enable security teams to quickly assess the impact of incidents and respond accordingly.
1515

16-
Enhance your security analysis and incident investigations with the event timeline, with the following options:
16+
For more information, see:
1717

1818
- [View events on the timeline](#view-the-event-timeline)
19-
2019
- [Audit user activity](track-user-activity.md)
21-
2220
- [View and manage alerts](how-to-view-alerts.md#view-details-and-remediate-a-specific-alert)
23-
2421
- [Analyze programming details and changes](how-to-analyze-programming-details-changes.md)
2522

2623
## Permissions
2724

28-
Administrator or Security Analyst permissions are required to perform the procedures described in this article.
25+
Before you perform the procedures described in this article, make sure that you have access to an OT sensor as an **Admin** or **Security Analyst** role. For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
2926

3027
## View the event timeline
3128

@@ -112,8 +109,8 @@ The maximum number of events shown in the event timeline is dependent on [the ha
112109

113110
## Next steps
114111

115-
[Audit user activity](track-user-activity.md)
112+
For more information, see:
116113

117-
[View details and remediate a specific alert](how-to-view-alerts.md#view-details-and-remediate-a-specific-alert)
118-
119-
[Analyze programming details and changes](how-to-analyze-programming-details-changes.md)
114+
- [Audit user activity](track-user-activity.md)
115+
- [View details and remediate a specific alert](how-to-view-alerts.md#view-details-and-remediate-a-specific-alert)
116+
- [Analyze programming details and changes](how-to-analyze-programming-details-changes.md)

0 commit comments

Comments
 (0)