|
1 | 1 | ---
|
2 |
| -title: Configure Windows endpoint monitoring |
3 |
| -description: Enrich data resolved on devices by working with Windows endpoint monitoring (WMI). |
4 |
| -ms.date: 11/09/2021 |
| 2 | +title: Configure Windows endpoint monitoring for Defender for IoT devices |
| 3 | +description: Set up Windows endpoint monitoring (WMI) for Windows information on devices. |
| 4 | +ms.date: 02/01/2022 |
5 | 5 | ms.topic: how-to
|
6 | 6 | ---
|
7 | 7 |
|
8 | 8 |
|
9 | 9 | # Configure Windows endpoint monitoring (WMI)
|
10 | 10 |
|
11 |
| -With the Windows endpoint monitoring capability, you can configure Microsoft Defender for IoT to selectively probe Windows systems. This provides you with more focused and accurate information about your devices, such as service pack levels. |
| 11 | +Use WMI to scan Windows systems for focused and accurate device information, such as service pack levels. You can scan specific IP address ranges and hosts. You can perform scheduled or manual scans. When a scan is finished, you can view the results in a CSV log file. The log contains all the IP addresses that were probed, and success and failure information for each address. There's also an error code, which is a free string derived from the exception. Note that: |
12 | 12 |
|
13 |
| -You can configure probing with specific ranges and hosts, and configure it to be performed only as often as desired. You accomplish selective probing by using the Windows Management Instrumentation (WMI), which is Microsoft's standard scripting language for managing Windows systems. |
| 13 | +- You can run only one scan at a time. |
| 14 | +- You get the best results with users who have domain or local administrator privileges. |
| 15 | +- Only the scan of the last log is kept in the system. |
14 | 16 |
|
15 |
| -> [!NOTE] |
16 |
| -> - You can run only one scan at a time. |
17 |
| -> - You get the best results with users who have domain or local administrator privileges. |
18 |
| -> - Before you begin the WMI configuration, configure a firewall rule that opens outgoing traffic from the sensor to the scanned subnet by using UDP port 135 and all TCP ports above 1024. |
19 | 17 |
|
20 |
| -When the probe is finished, a log file with all the probing attempts is available from the option to export a log. The log contains all the IP addresses that were probed. For each IP address, the log shows success and failure information. There's also an error code, which is a free string derived from the exception. The scan of the last log only is kept in the system. |
| 18 | +## Set up a firewall rule |
21 | 19 |
|
22 |
| -You can perform scheduled scans or manual scans. When a scan is finished, you can view the results in a CSV file. |
| 20 | +Before you begin scanning, create a firewall rule that allows outgoing traffic from the sensor to the scanned subnet by using UDP port 135 and all TCP ports above 1024. |
23 | 21 |
|
24 |
| -**Prerequisites** |
25 | 22 |
|
26 |
| -Configure a firewall rule that opens outgoing traffic from the sensor to the scanned subnet by using UDP port 135 and all TCP ports above 1024. |
| 23 | +## Set up scanning |
27 | 24 |
|
28 |
| -## Perform an automatic scan |
| 25 | +1. In Defender for Cloud select **System Settings**. |
| 26 | +1. Under **Network monitoring**, select **Windows Endpoint Monitoring (WMI)** |
| 27 | +1. In the **Windows Endpoint Monitoring (WMI) dialog, select **Add ranges**. You can also import and export ranges. |
| 28 | +1. Specify the IP address range you want to scan. You can add multiple ranges. |
| 29 | +1. Add your user name and password, and ensure that **Enable** is toggled on. |
| 30 | +1. In **Scan will run**, specify when you want the automatic scan to run. You can set an hourly interval between scans, or a specific scan time. |
| 31 | +1. If you want to run a scan immediately with the configured settings, select **Manually scan**. |
| 32 | +1. Select **Save** to save the automatic scan settings. |
| 33 | +1. When the scan is finished, select to view/export scan results. |
29 | 34 |
|
30 |
| -This section describes how to perform an automatic scan |
31 |
| - |
32 |
| -**To perform an automatic scan:** |
33 |
| - |
34 |
| -1. On the side menu, select **System Settings**. |
35 |
| - |
36 |
| -2. Select **Windows Endpoint Monitoring** :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-icon-v2.png" border="false":::. |
37 |
| - |
38 |
| - :::image type="content" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-screen-v2.png" alt-text="Screenshot that shows the selection of Windows Endpoint Monitoring."::: |
39 |
| - |
40 |
| -3. On the **Scan Schedule** pane, configure options as follows: |
41 |
| - |
42 |
| - - **By fixed intervals (in hours)**: Set the scan schedule according to intervals in hours. |
43 |
| - |
44 |
| - - **By specific times**: Set the scan schedule according to specific times and select **Save Scan**. |
45 |
| - |
46 |
| - :::image type="content" source="media/how-to-control-what-traffic-is-monitored/schedule-a-scan-screen-v2.png" alt-text="Screenshot that shows the Save Scan button."::: |
47 |
| - |
48 |
| -4. To define the scan range, select **Set scan ranges**. |
49 |
| - |
50 |
| -5. Set the IP address range and add your user and password. |
51 |
| - |
52 |
| - :::image type="content" source="media/how-to-control-what-traffic-is-monitored/edit-scan-range-screen.png" alt-text="Screenshot that shows adding a user and password."::: |
53 |
| - |
54 |
| -6. To exclude an IP range from a scan, select **Disable** next to the range. |
55 |
| - |
56 |
| -7. To remove a range, select :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/remove-scan-icon.png" border="false"::: next to the range. |
57 |
| - |
58 |
| -8. Select **Save**. The **Edit Scan Ranges Configuration** dialog box closes, and the number of ranges appears in the **Scan Ranges** pane. |
59 |
| - |
60 |
| -## Perform a manual scan |
61 |
| - |
62 |
| -**To perform a manual scan:** |
63 |
| - |
64 |
| -1. On the side menu, select **System Settings**. |
65 |
| - |
66 |
| -2. Select **Windows Endpoint Monitoring** :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-icon-v2.png" border="false":::. |
67 |
| - |
68 |
| - :::image type="content" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-screen-v2.png" alt-text="Screenshot that shows the Windows Endpoint Monitoring setup screen."::: |
69 |
| - |
70 |
| -3. In the **Actions** pane, select **Start scan**. A status bar appears on the **Actions** pane and shows the progress of the scanning process. |
71 |
| - |
72 |
| - :::image type="content" source="media/how-to-control-what-traffic-is-monitored/started-scan-screen-v2.png" alt-text="Screenshot that shows the Start scan button."::: |
73 |
| - |
74 |
| -## View scan results |
75 |
| - |
76 |
| -**To view scan results:** |
77 |
| - |
78 |
| -1. When the scan is finished, on the **Actions** pane, select **View Scan Results**. The CSV file with the scan results is downloaded to your computer. |
0 commit comments