Skip to content

Commit 3b53fbc

Browse files
authored
Merge pull request #176335 from ElazarK/release-notes-db
release notes device builders
2 parents 6c7d50b + d6ed598 commit 3b53fbc

File tree

1 file changed

+12
-156
lines changed

1 file changed

+12
-156
lines changed
Lines changed: 12 additions & 156 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
22
title: What's new in Azure Defender for IoT for device builders
3-
description: Learn about the latest releases, and the newest features of Defender for IoT device builders.
3+
description: Learn about the latest releases, and the newest features for Defender for IoT device builders.
44
ms.topic: overview
5-
ms.date: 10/20/2021
6-
ms.custom: ignite-fall-2021
5+
ms.date: 11/02/2021
76
---
87

98
# What's new in Azure Defender for IoT for device builders?
@@ -18,181 +17,38 @@ Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://az
1817

1918
Listed below are the support, breaking change policies for Defender for IoT, and the versions of Azure Defender for IoT that are currently available.
2019

21-
### Servicing information and timelines
20+
## September 2021
2221

23-
Microsoft plans to release updates for Azure Defender for IoT no less than once per quarter. Each general availability (GA) version of the Azure Defender for IoT sensor, and on premises management console is supported for up to nine months after its release. Fixes, and new functionality will be applied to the current GA version that are currently in support, and will not be applied to older GA versions.
22+
**Version 3.11**:
2423

25-
### Versions and support dates
24+
- **[Login collector](concept-event-aggregation.md#login-collector-event-based-collector)** - The login collectors gather user logins, logouts, and failed login attempts. Such as SSH & telnet.
2625

27-
| Version | Date released | End support date |
28-
|--|--|--|
29-
| 10.0 | 01/2021 | 10/2021 |
30-
| 10.3 | 04/2021 | 02/2022 |
31-
| 10.5.2 | 11/2021 | 07/2022 |
26+
- **[System information collector](concept-event-aggregation.md#system-information-trigger-based-collector)** - The system information collector gatherers information related to the device’s operating system and hardware details.
3227

33-
## April 2021
28+
- **[Event aggregation](concept-event-aggregation.md#how-does-event-aggregation-work)** - The Defender for IoT agent aggregates events such as process, login, network events that reduce the number of messages sent and costs, all while maintaining your device's security.
3429

35-
### Work with automatic threat intelligence updates (Public Preview)
36-
37-
New threat intelligence packages can now be automatically pushed to cloud connected sensors as they are released by Microsoft Defender for IoT. This is in addition to downloading threat intelligence packages and then uploading them to sensors.
38-
39-
Working with automatic updates helps reduce operational efforts and ensure greater security.
40-
41-
Enable automatic updating by onboarding your cloud connected sensor on the Defender for IoT portal with the **Automatic Threat Intelligence Updates** toggle turned on.
42-
43-
If you would like to take a more conservative approach to updating your threat intelligence data, you can manually push packages from the Azure Defender for IoT portal to cloud connected sensors only when you feel it is required.
44-
This gives you the ability to control when a package is installed, without the need to download and then upload it to your sensors. Manually push updates to sensors from the Defender for IoT **Sites and Sensors** page.
45-
46-
You can also review the following information about threat intelligence packages:
47-
48-
- Package version installed
49-
- Threat intelligence update mode
50-
- Threat intelligence update status
51-
52-
### View cloud connected sensor information (Public Preview)
53-
54-
View important operational information about cloud connected sensors on the **Sites and Sensors** page.
55-
56-
- The sensor version installed
57-
- The sensor connection status to the cloud.
58-
- The last time the sensor was detected connecting to the cloud.
59-
60-
### Alert API enhancements
61-
62-
New fields are available for users working with alert APIs.
63-
64-
**On-premises management console**
65-
66-
- Source and destination address
67-
- Remediation steps
68-
- The name of sensor defined by the user
69-
- The name of zone associated with the sensor
70-
- The name of site associated with the sensor
71-
72-
**Sensor**
73-
74-
- Source and destination address
75-
- Remediation steps
76-
77-
API version 2 is required when working with the new fields.
78-
79-
### Features delivered as Generally Available (GA)
80-
81-
The following features were previously available for Public Preview, and are now Generally Available (GA) features:
82-
83-
- Sensor - enhanced custom alert rules
84-
- On-premises management console - export alerts
85-
- Add second network interface to On-premises management console
86-
- Device builder - new micro agent
30+
- **[Twin configuration](concept-micro-agent-configuration.md)** - The micro agent's behavior is configured by a set of module twin properties. (e.g event sending frequency and Aggregation mode). You can configure the micro agent to best suit your needs.
8731

8832
## March 2021
8933

90-
### Sensor - enhanced custom alert rules (Public Preview)
91-
92-
You can now create custom alert rules based on the day, group of days and time-period network activity was detected. Working with day and time rule conditions is useful, for example in cases where alert severity is derived by the time the alert event takes place. For example, create a custom rule that triggers a high severity alert when network activity is detected on a weekend or in the evening.
93-
94-
This feature is available on the sensor with the release of version 10.2.
95-
96-
### On-premises management console - export alerts (Public Preview)
97-
98-
Alert information can now be exported to a .csv file from the on-premises management console. You can export information of all alerts detected or export information based on the filtered view.
99-
100-
This feature is available on the on-premises management console with the release of version 10.2.
101-
102-
### Add second network interface to On-premises management console (Public Preview)
103-
104-
You can now enhance the security of your deployment by adding a second network interface to your on-premises management console. This feature allows your on-premises management to have its connected sensors on one secure network, while allowing your users to access the on-premises management console through a second separate network interface.
105-
106-
This feature is available on the on-premises management console with the release of version 10.2.
107-
10834
### Device builder - new micro agent (Public preview)
10935

11036
A new device builder module is available. The module, referred to as a micro-agent, allows:
11137

11238
- **Integration with Azure IoT Hub and Azure Defender for IoT** - build stronger endpoint security directly into your IoT devices by integrating it with the monitoring option provided by both the Azure IoT Hub and Azure Defender for IoT.
39+
11340
- **Flexible deployment options with support for standard IoT operating systems** - can be deployed either as a binary package or as modifiable source code, with support for standard IoT operating systems like Linux and Azure RTOS.
41+
11442
- **Minimal resource requirements with no OS kernel dependencies** - small footprint, low CPU consumption, and no OS kernel dependencies.
43+
11544
- **Security posture management** – proactively monitor the security posture of your IoT devices.
45+
11646
- **Continuous, real-time IoT/OT threat detection** - detect threats such as botnets, brute force attempts, crypto miners, and suspicious network activity
11747

11848
The deprecated Defender-IoT-micro-agent documentation will be moved to the *Agent-based solution for device builders>Classic* folder.
11949

12050
This feature set is available with the current public preview cloud release.
12151

122-
## January 2021
123-
124-
- [Security](#security)
125-
- [Onboarding](#onboarding)
126-
- [Usability](#usability)
127-
- [Other updates](#other-updates)
128-
129-
### Security
130-
131-
Certificate and password recovery enhancements were made for this release.
132-
133-
#### Certificates
134-
135-
This version lets you:
136-
137-
- Upload SSL certificates directly to the sensors and on-premises management consoles.
138-
- Perform validation between the on-premises management console and connected sensors, and between a management console and a High Availability management console. Validation is based on expiration dates, root CA authenticity, and Certificate Revocation Lists. If validation fails, the session will not continue.
139-
140-
For upgrades:
141-
142-
- There is no change in SSL certificate or validation functionality during the upgrade.
143-
- After upgrading, sensor and on-premises management console administrative users can replace SSL certificates, or activate SSL certificate validation from the System Settings, SSL Certificate window.
144-
145-
For Fresh Installations:
146-
147-
- During first-time login, users are required to either use an SSL Certificate (recommended) or a locally generated self-signed certificate (not recommended)
148-
- Certificate validation is turned on by default for fresh installations.
149-
150-
#### Password recovery
151-
152-
Sensor and on-premises management console Administrative users can now recover passwords from the Azure Defender for IoT portal. Previously password recovery required intervention by the support team.
153-
154-
### Onboarding
155-
156-
#### On-premises management console - committed devices
157-
158-
Following initial sign-in to the on-premises management console, users are now required to upload an activation file. The file contains the aggregate number of devices to be monitored on the organizational network. This number is referred to as the number of committed devices.
159-
Committed devices are defined during the onboarding process on the Azure Defender for IoT portal, where the activation file is generated.
160-
First-time users and users upgrading are required to upload the activation file.
161-
After initial activation, the number of devices detected on the network might exceed the number of committed devices. This event might happen, for example, if you connect more sensors to the management console. If there is a discrepancy between the number of detected devices and the number of committed devices, a warning appears in the management console. If this event occurs, you should upload a new activation file.
162-
163-
#### Pricing page options
164-
165-
Pricing page lets you onboard new subscriptions to Azure Defender for IoT and define committed devices in your network.
166-
Additionally, the Pricing page now lets you manage existing subscriptions associated with a sensor and update device commitment.
167-
168-
#### View and manage onboarded sensors
169-
170-
A new Site and Sensors portal page lets you:
171-
172-
- Add descriptive information about the sensor. For example, a zone associated with the sensor, or free-text tags.
173-
- View and filter sensor information. For example, view details about sensors that are cloud connected or locally managed or view information about sensors in a specific zone.
174-
175-
### Usability
176-
177-
#### Azure Sentinel new connector page
178-
179-
The Azure Defender for IoT data connector page in Azure Sentinel has been redesigned. The data connector is now based on subscriptions rather than IoT Hubs; allowing customers to better manage their configuration connection to Azure Sentinel.
180-
181-
#### Azure portal permission updates
182-
183-
Security Reader and Security Administrator support has been added.
184-
185-
### Other updates
186-
187-
#### Access group - zone permissions
188-
189-
The on-premises management console Access Group rules will not include the option to grant access to a specific zone. There is no change in defining rules that use sites, regions, and business units. Following upgrade, Access Groups that contained rules allowing access to specific zones will be modified to allow access to its parent site, including all its zones.
190-
191-
#### Terminology changes
192-
193-
The term asset has been renamed device in the sensor and on-premises management console, reports, and other solution interfaces.
194-
In sensor and on-premises management console Alerts, the term Manage this Event has been named Remediation Steps.
195-
19652
## Next steps
19753

19854
[What is agent-based solution for device builders](architecture-agent-based.md)

0 commit comments

Comments
 (0)