Skip to content

Commit 5bbb2bd

Browse files
authored
Merge pull request #188746 from batamig/iot-feb-21-release
Aggregated IoT Feb 21 release
2 parents b4b63fa + 7763f95 commit 5bbb2bd

32 files changed

+547
-1339
lines changed

articles/defender-for-iot/organizations/alert-engine-messages.md

Lines changed: 107 additions & 109 deletions
Large diffs are not rendered by default.

articles/defender-for-iot/organizations/architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What is agentless solution architecture
33
description: Learn about Microsoft Defender for IoT agentless architecture and information flow.
44
ms.topic: overview
5-
ms.date: 11/09/2021
5+
ms.date: 02/06/2022
66
---
77

88
# Microsoft Defender for IoT architecture
@@ -87,7 +87,7 @@ Tightly integrated with your SOC workflows and run books, it enables easy priori
8787

8888
- Control all sensors – configure and monitor all sensors from a single location.
8989

90-
:::image type="content" source="media/updates/alerts-and-site-management-v2.png" alt-text="Manage all of your alerts and information.":::
90+
:::image type="content" source="media/architecture/initial-dashboard.png" alt-text="Screen shot of dashboard." lightbox="media/architecture/initial-dashboard.png":::
9191

9292
### Azure portal
9393

articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-sensor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -224,9 +224,9 @@ You can access console tools from the side menu. Tools help you:
224224

225225
| Tools| Description |
226226
|---|---|
227-
| Event timeline | View a timeline with information about alerts, network events, and user operations. For more information, see [Event timeline](how-to-track-sensor-activity.md#event-timeline).|
228-
| Data mining | Generate comprehensive and granular information about your network's devices at various layers. For more information, see [Sensor data mining queries](how-to-create-data-mining-queries.md#sensor-data-mining-queries).|
229-
| Trends and Statistics | View trends and statistics about an extensive range of network traffic and activity. As a small example, display charts and graphs showing top traffic by port, connectivity drops by hours, S7 traffic by control function, number of devices per VLAN, SRTP errors by day, or Modbus traffic by function. For more information, see [Sensor trends and statistics reports](how-to-create-trends-and-statistics-reports.md#sensor-trends-and-statistics-reports).
227+
| Event timeline | View a timeline with information about alerts, network events, and user operations. For more information, see [Track sensor activity](how-to-track-sensor-activity.md).|
228+
| Data mining | Generate comprehensive and granular information about your network's devices at various layers. For more information, see [Sensor data mining queries](how-to-create-data-mining-queries.md).|
229+
| Trends and Statistics | View trends and statistics about an extensive range of network traffic and activity. As a small example, display charts and graphs showing top traffic by port, connectivity drops by hours, S7 traffic by control function, number of devices per VLAN, SRTP errors by day, or Modbus traffic by function. For more information, see [Sensor trends and statistics reports](how-to-create-trends-and-statistics-reports.md).
230230
| Risk Assessment | Proactively address vulnerabilities, identify risks such as missing patches or unauthorized applications. Detect changes to device configurations, controller logic, and firmware. Prioritize fixes based on risk scoring and automated threat modeling. For more information, see [Risk assessment reporting](how-to-create-risk-assessment-reports.md#risk-assessment-reporting).|
231231
| Attack Vector | Display a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target. For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md#attack-vector-reporting).|
232232

articles/defender-for-iot/organizations/how-to-analyze-programming-details-changes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The Programming Analysis window displays both authorized and unauthorized progra
4848

4949
Access the Programming Analysis window from the:
5050

51-
- [Event Timeline](#event-timeline)
51+
- [Event Timeline](how-to-track-sensor-activity.md)
5252

5353
- [Unauthorized Programming Alerts](#unauthorized-programming-alerts)
5454

Lines changed: 19 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -1,78 +1,34 @@
11
---
2-
title: Configure Windows endpoint monitoring
3-
description: Enrich data resolved on devices by working with Windows endpoint monitoring (WMI).
4-
ms.date: 11/09/2021
2+
title: Configure Windows endpoint monitoring for Defender for IoT devices
3+
description: Set up Windows endpoint monitoring (WMI) for Windows information on devices.
4+
ms.date: 02/01/2022
55
ms.topic: how-to
66
---
77

88

99
# Configure Windows endpoint monitoring (WMI)
1010

11-
With the Windows endpoint monitoring capability, you can configure Microsoft Defender for IoT to selectively probe Windows systems. This provides you with more focused and accurate information about your devices, such as service pack levels.
11+
Use WMI to scan Windows systems for focused and accurate device information, such as service pack levels. You can scan specific IP address ranges and hosts. You can perform scheduled or manual scans. When a scan is finished, you can view the results in a CSV log file. The log contains all the IP addresses that were probed, and success and failure information for each address. There's also an error code, which is a free string derived from the exception. Note that:
1212

13-
You can configure probing with specific ranges and hosts, and configure it to be performed only as often as desired. You accomplish selective probing by using the Windows Management Instrumentation (WMI), which is Microsoft's standard scripting language for managing Windows systems.
13+
- You can run only one scan at a time.
14+
- You get the best results with users who have domain or local administrator privileges.
15+
- Only the scan of the last log is kept in the system.
1416

15-
> [!NOTE]
16-
> - You can run only one scan at a time.
17-
> - You get the best results with users who have domain or local administrator privileges.
18-
> - Before you begin the WMI configuration, configure a firewall rule that opens outgoing traffic from the sensor to the scanned subnet by using UDP port 135 and all TCP ports above 1024.
1917

20-
When the probe is finished, a log file with all the probing attempts is available from the option to export a log. The log contains all the IP addresses that were probed. For each IP address, the log shows success and failure information. There's also an error code, which is a free string derived from the exception. The scan of the last log only is kept in the system.
18+
## Set up a firewall rule
2119

22-
You can perform scheduled scans or manual scans. When a scan is finished, you can view the results in a CSV file.
20+
Before you begin scanning, create a firewall rule that allows outgoing traffic from the sensor to the scanned subnet by using UDP port 135 and all TCP ports above 1024.
2321

24-
**Prerequisites**
2522

26-
Configure a firewall rule that opens outgoing traffic from the sensor to the scanned subnet by using UDP port 135 and all TCP ports above 1024.
23+
## Set up scanning
2724

28-
## Perform an automatic scan
25+
1. In Defender for Cloud select **System Settings**.
26+
1. Under **Network monitoring**, select **Windows Endpoint Monitoring (WMI)**
27+
1. In the **Windows Endpoint Monitoring (WMI) dialog, select **Add ranges**. You can also import and export ranges.
28+
1. Specify the IP address range you want to scan. You can add multiple ranges.
29+
1. Add your user name and password, and ensure that **Enable** is toggled on.
30+
1. In **Scan will run**, specify when you want the automatic scan to run. You can set an hourly interval between scans, or a specific scan time.
31+
1. If you want to run a scan immediately with the configured settings, select **Manually scan**.
32+
1. Select **Save** to save the automatic scan settings.
33+
1. When the scan is finished, select to view/export scan results.
2934

30-
This section describes how to perform an automatic scan
31-
32-
**To perform an automatic scan:**
33-
34-
1. On the side menu, select **System Settings**.
35-
36-
2. Select **Windows Endpoint Monitoring** :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-icon-v2.png" border="false":::.
37-
38-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-screen-v2.png" alt-text="Screenshot that shows the selection of Windows Endpoint Monitoring.":::
39-
40-
3. On the **Scan Schedule** pane, configure options as follows:
41-
42-
- **By fixed intervals (in hours)**: Set the scan schedule according to intervals in hours.
43-
44-
- **By specific times**: Set the scan schedule according to specific times and select **Save Scan**.
45-
46-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/schedule-a-scan-screen-v2.png" alt-text="Screenshot that shows the Save Scan button.":::
47-
48-
4. To define the scan range, select **Set scan ranges**.
49-
50-
5. Set the IP address range and add your user and password.
51-
52-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/edit-scan-range-screen.png" alt-text="Screenshot that shows adding a user and password.":::
53-
54-
6. To exclude an IP range from a scan, select **Disable** next to the range.
55-
56-
7. To remove a range, select :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/remove-scan-icon.png" border="false"::: next to the range.
57-
58-
8. Select **Save**. The **Edit Scan Ranges Configuration** dialog box closes, and the number of ranges appears in the **Scan Ranges** pane.
59-
60-
## Perform a manual scan
61-
62-
**To perform a manual scan:**
63-
64-
1. On the side menu, select **System Settings**.
65-
66-
2. Select **Windows Endpoint Monitoring** :::image type="icon" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-icon-v2.png" border="false":::.
67-
68-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/windows-endpoint-monitoring-screen-v2.png" alt-text="Screenshot that shows the Windows Endpoint Monitoring setup screen.":::
69-
70-
3. In the **Actions** pane, select **Start scan**. A status bar appears on the **Actions** pane and shows the progress of the scanning process.
71-
72-
:::image type="content" source="media/how-to-control-what-traffic-is-monitored/started-scan-screen-v2.png" alt-text="Screenshot that shows the Start scan button.":::
73-
74-
## View scan results
75-
76-
**To view scan results:**
77-
78-
1. When the scan is finished, on the **Actions** pane, select **View Scan Results**. The CSV file with the scan results is downloaded to your computer.

articles/defender-for-iot/organizations/how-to-create-and-manage-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This article describes how to create and manage users of sensors and the on-prem
1111

1212
Features are also available to track user activity and enable Active Directory sign in.
1313

14-
By default, each sensor and on-premises management console is installed with a *cyberx and support* user. These users have access to advanced tools for troubleshooting and setup. Administrator users should sign in with these user credentials, create an admin user, and then create extra users for Security Analysts and Read-only users.
14+
By default, each sensor and on-premises management console is installed with a *cyberx, support* and *cyberx_host* user. These users have access to advanced tools for troubleshooting and setup. Administrator users should sign in with these user credentials, create an admin user, and then create extra users for security analysts and read-only users.
1515

1616
## Role-based permissions
1717
The following user roles are available:

0 commit comments

Comments
 (0)