Skip to content

Commit 49e26dc

Browse files
authored
Merge pull request #232264 from batamig/release-deploy-sanity-iii
Release deploy sanity xrefs take 3
2 parents d00f644 + 6d14990 commit 49e26dc

File tree

55 files changed

+480
-264
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+480
-264
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 143 additions & 70 deletions
Original file line numberDiff line numberDiff line change
@@ -51,20 +51,89 @@
5151
displayName: Microsoft Defender for Endpoint, MDE
5252
- name: Azure security baseline for Defender for IoT
5353
href: /security/benchmark/azure/baselines/microsoft-defender-for-iot-security-baseline?bc=%2fazure%2defender-for-iot%2fbreadcrumb%2ftoc.json&toc=%2fazure%2fdefender-for-iot%2fTOC.json
54-
- name: OT monitoring appliance catalog
55-
items:
56-
- name: Which appliances do I need?
57-
href: ot-appliance-sizing.md
58-
- name: Pre-configured appliances
59-
href: ot-pre-configured-appliances.md
60-
- name: OT monitoring with virtual appliances
61-
href: ot-virtual-appliances.md
6254
- name: Deploy
6355
items:
56+
- name: Deploy OT monitoring
57+
items:
58+
- name: OT deployment path
59+
href: ot-deploy/ot-deploy-path.md
60+
- name: Plan and prepare for an OT deployment
61+
items:
62+
- name: Plan your OT monitoring system
63+
items:
64+
- name: Overview
65+
href: best-practices/plan-corporate-monitoring.md
66+
- name: Azure connection methods
67+
href: architecture-connections.md
68+
- name: SSL/TLS certificate requirements
69+
href: best-practices/certificate-requirements.md
70+
- name: Prepare an OT site
71+
items:
72+
- name: Overview
73+
href: best-practices/plan-prepare-deploy.md
74+
- name: Defender for IoT and your network architecture
75+
href: best-practices/understand-network-architecture.md
76+
- name: Choose a traffic mirroring method
77+
href: best-practices/traffic-mirroring-methods.md
78+
displayName: SPAN port, TAP
79+
- name: OT monitoring appliance catalog
80+
items:
81+
- name: Which appliances do I need?
82+
href: ot-appliance-sizing.md
83+
- name: Pre-configured appliances
84+
href: ot-pre-configured-appliances.md
85+
- name: OT monitoring with virtual appliances
86+
href: ot-virtual-appliances.md
87+
- name: Create SSL/TLS certificates
88+
href: ot-deploy/create-ssl-certificates.md
89+
- name: Onboard OT sensors to Azure
90+
href: onboard-sensors.md
91+
- name: Site networking setup
92+
items:
93+
- name: Configure traffic mirroring
94+
items:
95+
- name: Overview
96+
href: traffic-mirroring/traffic-mirroring-overview.md
97+
- name: Configure a switch SPAN port
98+
href: traffic-mirroring/configure-mirror-span.md
99+
- name: Configure a remote SPAN (RSPAN)
100+
href: traffic-mirroring/configure-mirror-rspan.md
101+
- name: Configure active or passive aggregation (TAP)
102+
href: best-practices/traffic-mirroring-methods.md#active-or-passive-aggregation-tap
103+
- name: Configure ERSPAN mirroring
104+
href: traffic-mirroring/configure-mirror-erspan.md
105+
- name: Configure mirroring with an ESXi vSwitch
106+
href: traffic-mirroring/configure-mirror-esxi.md
107+
- name: Configure mirroring with a Hyper-V vSwitch
108+
href: traffic-mirroring/configure-mirror-hyper-v.md
109+
- name: Provision for cloud management
110+
href: ot-deploy/provision-cloud-management.md
111+
- name: Deploy OT network sensors
112+
items:
113+
- name: Install sensor software
114+
href: ot-deploy/install-software-ot-sensor.md
115+
- name: Validate after installation
116+
href: ot-deploy/post-install-validation-ot-software.md
117+
- name: Activate and set up an OT sensor
118+
href: ot-deploy/activate-deploy-sensor.md
119+
displayName: SSL, TLS, certificate
120+
- name: Configure proxy settings
121+
href: connect-sensors.md
122+
- name: Calibrate and fine-tune OT monitoring
123+
items:
124+
- name: Control OT traffic monitoring
125+
href: how-to-control-what-traffic-is-monitored.md
126+
displayName: VLAN, port name, subnets, DHCP
127+
- name: Update detected device properties
128+
href: ot-deploy/update-device-inventory.md
129+
- name: Create a learned baseline of OT alerts
130+
href: ot-deploy/create-learned-baseline.md
64131
- name: Deploy air-gapped OT sensor management
65132
items:
66133
- name: Air-gapped management deployment path
67134
href: ot-deploy/air-gapped-deploy.md
135+
- name: Prepare an appliance
136+
href: ot-deploy/prepare-management-appliance.md
68137
- name: Install an on-premises management console
69138
href: ot-deploy/install-software-on-premises-management-console.md
70139
- name: Activate and set up an on-premises management console
@@ -281,72 +350,76 @@
281350
href: how-to-troubleshoot-on-premises-management-console.md
282351
- name: Reference
283352
items:
284-
- name: Sample connectivity models
285-
href: best-practices/sample-connectivity-models.md
286-
- name: Networking requirements
287-
href: networking-requirements.md
288-
- name: OT monitoring appliances
289-
items:
290-
- name: Overview
291-
href: appliance-catalog/index.yml
292-
displayName: appliance catalog
293-
- name: Corporate environments
294-
items:
295-
- name: HPE ProLiant DL360
296-
href: appliance-catalog/hpe-proliant-dl360.md
297-
- name: Large enterprises
298-
items:
299-
- name: HPE ProLiant DL20 Gen10 Plus (4SFF)
300-
href: appliance-catalog/hpe-proliant-dl20-plus-enterprise.md
301-
- name: Dell Edge 5200 (Rugged MIL-STD-810G)
302-
href: appliance-catalog/dell-edge-5200.md
303-
- name: Dell PowerEdge R350
304-
href: appliance-catalog/dell-poweredge-r350-e1800.md
305-
- name: Production line
306-
items:
307-
- name: HPE ProLiant DL20 Gen10 Plus (NHP 2LFF)
308-
href: appliance-catalog/hpe-proliant-dl20-plus-smb.md
309-
- name: YS-techsystems YS-FIT2 (Rugged MIL-STD-810G)
310-
href: appliance-catalog/ys-techsystems-ys-fit2.md
311-
- name: Virtual appliances
312-
items:
313-
- name: OT sensor (VMware ESXi)
314-
href: appliance-catalog/virtual-sensor-vmware.md
315-
- name: OT sensor (Hyper-V)
316-
href: appliance-catalog/virtual-sensor-hyper-v.md
317-
- name: On-premises management console (VMware ESXi)
318-
href: appliance-catalog/virtual-management-vmware.md
319-
- name: On-premises management console (Microsoft Hyper-V)
320-
href: appliance-catalog/virtual-management-hyper-v.md
321-
- name: Legacy appliances
322-
items:
323-
- name: HPE ProLiant DL20 Gen10 (E1800)
324-
href: appliance-catalog/hpe-proliant-dl20-legacy.md
325-
- name: Dell PowerEdge R340 XL (E1800)
326-
href: appliance-catalog/dell-poweredge-r340-xl-legacy.md
327-
- name: HPE Edgeline EL300 (L500 Rugged)
328-
href: appliance-catalog/hpe-edgeline-el300.md
329-
- name: HPE ProLiant DL20 Gen10 (L500 Rugged)
330-
href: appliance-catalog/hpe-proliant-dl20-smb-legacy.md
331-
- name: Neousys Nuvo-500LP (L100 Rugged)
332-
href: appliance-catalog/neousys-nuvo-5006lp.md
333353
- name: Supported protocols
334354
href: concept-supported-protocols.md
335355
- name: Alert reference
336356
href: alert-engine-messages.md
337357
displayName: alerts
338-
- name: Sensor health message reference
339-
href: sensor-health-messages.md
340-
- name: CLI command reference
358+
- name: Deployment references
341359
items:
342-
- name: CLI users and access
343-
href: references-work-with-defender-for-iot-cli-commands.md
344-
displayName: shell, login, cli, command-line, commands, users, user
345-
- name: OT sensor CLI reference
346-
href: cli-ot-sensor.md
347-
displayName: shell, login, cli, command-line, commands, users, user
348-
- name: Data retention
349-
href: references-data-retention.md
360+
- name: Sample connectivity models
361+
href: best-practices/sample-connectivity-models.md
362+
- name: Networking requirements
363+
href: networking-requirements.md
364+
- name: OT monitoring appliances
365+
items:
366+
- name: Overview
367+
href: appliance-catalog/index.yml
368+
displayName: appliance catalog
369+
- name: Corporate environments
370+
items:
371+
- name: HPE ProLiant DL360
372+
href: appliance-catalog/hpe-proliant-dl360.md
373+
- name: Large enterprises
374+
items:
375+
- name: HPE ProLiant DL20 Gen10 Plus (4SFF)
376+
href: appliance-catalog/hpe-proliant-dl20-plus-enterprise.md
377+
- name: Dell Edge 5200 (Rugged MIL-STD-810G)
378+
href: appliance-catalog/dell-edge-5200.md
379+
- name: Dell PowerEdge R350
380+
href: appliance-catalog/dell-poweredge-r350-e1800.md
381+
- name: Production line
382+
items:
383+
- name: HPE ProLiant DL20 Gen10 Plus (NHP 2LFF)
384+
href: appliance-catalog/hpe-proliant-dl20-plus-smb.md
385+
- name: YS-techsystems YS-FIT2 (Rugged MIL-STD-810G)
386+
href: appliance-catalog/ys-techsystems-ys-fit2.md
387+
- name: Virtual appliances
388+
items:
389+
- name: OT sensor (VMware ESXi)
390+
href: appliance-catalog/virtual-sensor-vmware.md
391+
- name: OT sensor (Hyper-V)
392+
href: appliance-catalog/virtual-sensor-hyper-v.md
393+
- name: On-premises management console (VMware ESXi)
394+
href: appliance-catalog/virtual-management-vmware.md
395+
- name: On-premises management console (Microsoft Hyper-V)
396+
href: appliance-catalog/virtual-management-hyper-v.md
397+
- name: Legacy appliances
398+
items:
399+
- name: HPE ProLiant DL20 Gen10 (E1800)
400+
href: appliance-catalog/hpe-proliant-dl20-legacy.md
401+
- name: Dell PowerEdge R340 XL (E1800)
402+
href: appliance-catalog/dell-poweredge-r340-xl-legacy.md
403+
- name: HPE Edgeline EL300 (L500 Rugged)
404+
href: appliance-catalog/hpe-edgeline-el300.md
405+
- name: HPE ProLiant DL20 Gen10 (L500 Rugged)
406+
href: appliance-catalog/hpe-proliant-dl20-smb-legacy.md
407+
- name: Neousys Nuvo-500LP (L100 Rugged)
408+
href: appliance-catalog/neousys-nuvo-5006lp.md
409+
- name: System maintenance references
410+
items:
411+
- name: Sensor health message reference
412+
href: sensor-health-messages.md
413+
- name: Data retention
414+
href: references-data-retention.md
415+
- name: CLI command reference
416+
items:
417+
- name: CLI users and access
418+
href: references-work-with-defender-for-iot-cli-commands.md
419+
displayName: shell, login, cli, command-line, commands, users, user
420+
- name: OT sensor CLI reference
421+
href: cli-ot-sensor.md
422+
displayName: shell, login, cli, command-line, commands, users, user
350423
- name: API reference
351424
items:
352425
- name: Working with Defender for IoT APIs
@@ -375,6 +448,8 @@
375448
href: api/management-inventory-apis.md
376449
- name: Partner integration
377450
href: api/management-integration-apis.md
451+
- name: Resources
452+
items:
378453
- name: Frequently asked questions
379454
items:
380455
- name: General FAQ
@@ -383,8 +458,6 @@
383458
href: faqs-ot.md
384459
- name: Enterprise IoT networks FAQ
385460
href: faqs-eiot.md
386-
- name: Resources
387-
items:
388461
- name: Custom columns sample script
389462
href: custom-columns-sample-script.md
390463
- name: Regional availability

articles/defender-for-iot/organizations/alerts.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Use the following table to learn more about each alert status and triage option.
111111
|**Active** | - Azure portal only | Set an alert to *Active* to indicate that an investigation is underway, but that the alert can't yet be closed or otherwise triaged. <br><br>This status has no effect elsewhere in Defender for IoT. |
112112
|**Closed** | - Azure portal <br><br>- OT network sensors <br><br>- On-premises management console | Close an alert to indicate that it's fully investigated, and you want to be alerted again the next time the same traffic is detected.<br><br>Closing an alert adds it to the sensor event timeline.<br><br>On the on-premises management console, *New* alerts are called *Acknowledged*. |
113113
|**Learn** | - Azure portal <br><br>- OT network sensors <br><br>- On-premises management console <br><br>*Unlearning* an alert is available only on the OT sensor. | Learn an alert when you want to close it and add it as allowed traffic, so that you aren't alerted again the next time the same traffic is detected. <br><br>For example, when the sensor detects firmware version changes following standard maintenance procedures, or when a new, expected device is added to the network. <br><br>Learning an alert closes the alert and adds an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when calculating other OT sensor reports. <br><br>Learning alerts is available for selected alerts only, mostly those triggered by *Policy* and *Anomaly* engine alerts. |
114-
|**Mute** | - OT network sensors <br><br>- On-premises management console <br><br>*Unmuting* an alert is available only on the OT sensor. | Mute an alert when you want to close it and not see again for the same traffic, but without adding the alert allowed traffic. <br><br>For example, when the Operational engine triggers an alert indicating that the PLC Mode was changed on a device. The new mode may indicate that the PLC isn't secure, but after investigation, it's determined that the new mode is acceptable. <br><br>Muting an alert closes it, but doesn't add an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when when calculating data for other sensor reports. <br><br>Muting an alert is available for selected alerts only, mostly those triggered by the *Anomaly*, *Protocol Violation*, or *Operational* engines. |
114+
|**Mute** | - OT network sensors <br><br>- On-premises management console <br><br>*Unmuting* an alert is available only on the OT sensor. | Mute an alert when you want to close it and not see again for the same traffic, but without adding the alert allowed traffic. <br><br>For example, when the Operational engine triggers an alert indicating that the PLC Mode was changed on a device. The new mode may indicate that the PLC isn't secure, but after investigation, it's determined that the new mode is acceptable. <br><br>Muting an alert closes it, but doesn't add an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when calculating data for other sensor reports. <br><br>Muting an alert is available for selected alerts only, mostly those triggered by the *Anomaly*, *Protocol Violation*, or *Operational* engines. |
115115

116116
> [!TIP]
117117
> If you know ahead of time which events are irrelevant for you, such as during a maintenance window, or if you don't want to track the event in the event timeline, create an alert exclusion rule on an on-premises management console instead.
@@ -125,6 +125,8 @@ Use the following table to learn more about each alert status and triage option.
125125

126126
Use learning mode to perform an initial triage on the alerts in your network, *learning* those you want to mark as authorized, expected activity. Learned traffic doesn't generate new alerts the next time the same traffic is detected.
127127

128+
For more information, see [Create a learned baseline of OT alerts](ot-deploy/create-learned-baseline.md).
129+
128130
## Next steps
129131

130132
Review alert types and messages to help you understand and plan remediation actions and playbook integrations. For more information, see [OT monitoring alert types and descriptions](alert-engine-messages.md).

articles/defender-for-iot/organizations/architecture-connections.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ ms.date: 02/23/2023
77

88
# Methods for connecting sensors to Azure
99

10-
<!--fix according to recipes doc-->
1110
This article is one in a series of articles describing the [deployment path](ot-deploy/ot-deploy-path.md) for OT monitoring with Microsoft Defender for IoT.
1211

1312
Use the content below to learn about the architectures and methods supported for connecting Defender for IoT sensors to the Azure portal in the cloud.
@@ -18,7 +17,7 @@ Network sensors connect to Azure to provide data about detected devices, alerts,
1817

1918
All connection methods provide:
2019

21-
- **Improved security**, without additional security configurations. Connect to Azure using specific and secure endpoints, without the need for any wildcards.
20+
- **Improved security**, without additional security configurations. [Connect to Azure using specific and secure endpoints](networking-requirements.md#sensor-access-to-azure-portal), without the need for any wildcards.
2221

2322
- **Encryption**, Transport Layer Security (TLS1.2/AES-256) provides encrypted communication between the sensor and Azure resources.
2423

articles/defender-for-iot/organizations/architecture.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ Defender for IoT network sensors discover and continuously monitor network traff
3333

3434
Data collection, processing, analysis, and alerting takes place directly on the sensor, which can be ideal for locations with low bandwidth or high-latency connectivity. Only telemetry and insights are transferred on for management, either to the Azure portal or an on-premises management console.
3535

36+
For more information, see [Defender for IoT OT deployment path](ot-deploy/ot-deploy-path.md).
3637

3738
### Cloud-connected vs. local OT sensors
3839

@@ -74,7 +75,7 @@ Defender for IoT network sensors include the following main analytics engines:
7475
| **Policy Violation** | A policy violation occurs with a deviation from baseline behavior defined in learned or configured settings. | An *"Unauthorized HTTP User Agent"* alert indicates that an application that wasn't learned or approved by policy is used as an HTTP client on a device. This might be a new web browser or application on that device.|
7576
|**Industrial malware detection engine** | Identifies behaviors that indicate the presence of malicious network activity via known malware, such as Conficker, Black Energy, Havex, WannaCry, NotPetya, and Triton. | A *"Suspicion of Malicious Activity (Stuxnet)"* alert indicates that the sensor detected suspicious network activity known to be related to the Stuxnet malware. This malware is an advanced persistent threat aimed at industrial control and SCADA networks. |
7677
|**Anomaly detection engine** | Detects unusual machine-to-machine (M2M) communications and behaviors. <br><br>This engine models ICS networks and therefore requires a shorter learning period than analytics developed for IT. Anomalies are detected faster, with minimal false positives. | A *"Periodic Behavior in Communication Channel"* alert reflects periodic and cyclic behavior of data transmission, which is common in industrial networks. <br>Other examples include excessive SMB sign-in attempts, and PLC scan detected alerts. |
77-
|**Operational incident detection** | Detects operational issues such as intermittent connectivity that can indicate early signs of equipment failure. | A *"Device is Suspected to be Disconnected (Unresponsive)"* alert is triggered when a device isn't responding to any kind of request for a predefined period. This alert might indicate a device shutdown, disconnection, or malfunction. <br>Another example might be the that Siemens S7 stop PLC command was sent alerts. |
78+
|**Operational incident detection** | Detects operational issues such as intermittent connectivity that can indicate early signs of equipment failure. | A *"Device is Suspected to be Disconnected (Unresponsive)"* alert is triggered when a device isn't responding to any kind of request for a predefined period. This alert might indicate a device shutdown, disconnection, or malfunction. <br>Another example might be if the Siemens S7 stop PLC command was sent alerts. |
7879

7980
## Management options
8081

@@ -94,6 +95,8 @@ Defender for IoT provides hybrid network support using the following management
9495

9596
The software version on your on-premises management console must be equal to that of your most up-to-date sensor version. Each on-premises management console version is backwards compatible to older, supported sensor versions, but cannot connect to newer sensor versions.
9697

98+
For more information, see [Air-gapped OT sensor management deployment path](ot-deploy/air-gapped-deploy.md).
99+
97100
## What is a Defender for IoT committed device?
98101

99102
[!INCLUDE [devices-inventoried](includes/devices-inventoried.md)]

0 commit comments

Comments
 (0)