Skip to content

Commit 66f6a31

Browse files
authored
Merge pull request #202116 from batamig/device-inventory-improvement
Device inventory improvement
2 parents 63f226f + b615227 commit 66f6a31

File tree

49 files changed

+388
-485
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+388
-485
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -53,18 +53,21 @@
5353
href: concept-supported-protocols.md
5454
- name: How-to guides
5555
items:
56-
- name: Visualize network assets
56+
- name: Visualize devices
57+
displayName: assets, network devices
5758
items:
58-
- name: View assets from the Azure portal
59-
href: how-to-manage-device-inventory-for-organizations.md
60-
- name: View OT assets from a sensor console
61-
href: how-to-investigate-sensor-detections-in-a-device-inventory.md
62-
- name: View OT assets on a sensor device map
59+
- name: Manage device inventory
60+
items:
61+
- name: Manage device inventory from the Azure portal
62+
href: how-to-manage-device-inventory-for-organizations.md
63+
- name: Manage device inventory from an OT sensor console
64+
href: how-to-investigate-sensor-detections-in-a-device-inventory.md
65+
- name: Manage device inventory from an on-premises management console
66+
href: how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md
67+
- name: View OT device mapping
6368
href: how-to-work-with-the-sensor-device-map.md
64-
- name: View OT assets on a sensor per zone
69+
- name: View OT devices per zone
6570
href: how-to-view-information-per-zone.md
66-
- name: View OT assets from an on-premises management console
67-
href: how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md
6871
- name: Manage alerts
6972
items:
7073
- name: Manage alerts from the Azure portal
@@ -162,6 +165,8 @@
162165
href: how-to-manage-individual-sensors.md
163166
- name: Control OT traffic monitoring
164167
href: how-to-control-what-traffic-is-monitored.md
168+
- name: Detect Windows workstations and servers by script
169+
href: detect-windows-endpoints-script.md
165170
- name: Configure active monitoring
166171
items:
167172
- name: Planning and prerequisites
@@ -204,6 +209,8 @@
204209
href: how-to-troubleshoot-the-sensor-and-on-premises-management-console.md
205210
- name: Reference
206211
items:
212+
- name: Alert reference
213+
href: alert-engine-messages.md
207214
- name: OT monitoring appliances
208215
items:
209216
- name: Overview
@@ -242,11 +249,9 @@
242249
href: appliance-catalog/hpe-edgeline-el300.md
243250
- name: Neousys Nuvo-500LP (SMB rugged)
244251
href: appliance-catalog/neousys-nuvo-5006lp.md
245-
- name: Alert reference
246-
href: alert-engine-messages.md
247-
- name: Work with Defender for IoT APIs
252+
- name: Defender for IoT APIs
248253
href: references-work-with-defender-for-iot-apis.md
249-
- name: Work with Defender for IoT CLI commands
254+
- name: Defender for IoT CLI commands
250255
href: references-work-with-defender-for-iot-cli-commands.md
251256
- name: Frequently asked questions - service
252257
displayName: FAQ, regulation, internet, connection, hardware, appliances, ports, logs
Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
---
2+
title: Detect Windows workstations and servers with a local script
3+
description: Learn about how to detect Windows workstations and servers on your network using a local script.
4+
ms.date: 07/12/2022
5+
ms.topic: how-to
6+
---
7+
8+
# Detect Windows workstations and servers with a local script
9+
10+
In addition to detecting OT devices on your network, use Defender for IoT to discover Microsoft Windows workstations and servers. Same as other detected devices, detected Windows workstations and servers are displayed in the Device inventory. The **Device inventory** pages on the sensor and on-premises management console show enriched data about Windows devices, including data about the Windows operating system and applications installed, patch-level data, open ports, and more.
11+
12+
This article describes how to configure Defender for IoT to detect Windows workstations and servers with local surveying, performed by distributing and running a script on each device. While you can use active scanning and scheduled WMI scans to obtain this data, working with local scripts bypasses the risks of running WMI polling on an endpoint. Running a local script is also useful for regulated networks that have waterfalls and one-way elements.
13+
14+
For more information, see [Configure Windows Endpoint Monitoring](configure-windows-endpoint-monitoring.md).
15+
16+
## Supported operating systems
17+
18+
The script described in this article is supported for the following Windows operating systems:
19+
20+
- Windows XP
21+
- Windows 2000
22+
- Windows NT
23+
- Windows 7
24+
- Windows 10
25+
- Windows Server 2003/2008/2012/2016
26+
27+
## Prerequisites
28+
29+
Before you start, make sure that you have:
30+
31+
- Administrator permissions on any devices where you intend to run the script
32+
- A Defender for IoT OT sensor already monitoring the network where the device is connected
33+
34+
If an OT network sensor has already learned the device, running the script will retrieve its information and enrichment data.
35+
36+
## Run the script
37+
38+
This procedure describes how to obtain, deploy, and run the script on the Windows workstation and servers that you want to monitor in Defender for IoT.
39+
40+
The script you run to detect enriched Windows data is run as a utility and not as an installed program. Running the script doesn't affect the endpoint.
41+
42+
1. To acquire the script, [contact customer support](mailto:support.microsoft.com).
43+
44+
1. Deploy the script once, or using ongoing automation, using standard automated deployment methods and tools.
45+
46+
1. Copy the script to a local drive and unzip it. The following files appear:
47+
48+
- `start.bat`
49+
- `settings.json`
50+
- `data.bin`
51+
- `run.bat`
52+
53+
1. Run the `run.bat` file.
54+
55+
After the script runs to probe the registry, a CX-snapshot file appears with the registry information. The filename indicates the system name, date, and time of the snapshot with the following syntax: `CX-snaphot_SystemName_Month_Year_Time`
56+
57+
Files generated by the script:
58+
59+
- Remain on the local drive until you delete them.
60+
- Must remain in the same location. Do not separate the generated files.
61+
- Are overwritten if you run the script again.
62+
63+
## Import device details
64+
65+
After having run the script as described [earlier](#run-the-script), import the generated data to your sensor to view the device details in the **Device inventory**.
66+
67+
**To import device details to your sensor**:
68+
69+
1. Use standard, automated methods and tools to move the generated files from each Windows endpoint to a location accessible from your OT sensors.
70+
71+
Do not update filenames or separate the files from each other.
72+
73+
1. On your OT sensor console, select **System Settings** > **Import Settings** > **Windows Information**.
74+
75+
1. Select **Import File**, and then select all the files (Ctrl+A).
76+
77+
1. Select **Close**. The device registry information is imported and a successful confirmation message is shown
78+
79+
If there's a problem uploading one of the files, you'll be informed which file upload failed.
80+
81+
## Next steps
82+
83+
For more information, see [View detected devices on-premises](how-to-investigate-sensor-detections-in-a-device-inventory.md).

articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-sensor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ After activating a sensor, you'll need to apply new activation files as follows:
133133
|Location |Activation process |
134134
|---------|---------|
135135
|**Cloud-connected sensors** | Cloud-connected sensors remain activated for as long as your Azure subscription with your Defender for IoT plan is active. <br><br>However, you'll also need to apply a new activation file when [updating your sensor software](update-ot-software.md#download-and-apply-a-new-activation-file) from a legacy version to version 22.2.x. |
136-
| **Locally-managed** | Apply a new activation file to locally-managed sensors every year. After a sensor's activation file has expired, the sensor will continue to monitor your network, but you'll see a warning message when signing in to the sensor. |
136+
| **Locally managed** | Apply a new activation file to locally managed sensors every year. After a sensor's activation file has expired, the sensor will continue to monitor your network, but you'll see a warning message when signing in to the sensor. |
137137

138138
For more information, see [Manage Defender for IoT subscriptions](how-to-manage-subscriptions.md) and [Manage the on-premises management console](how-to-manage-the-on-premises-management-console.md).
139139

@@ -228,7 +228,7 @@ You can access console tools from the side menu. Tools help you:
228228
| -----------|--|
229229
| Overview | View a dashboard with high-level information about your sensor deployment, alerts, traffic, and more. |
230230
| Device map | View the network devices, device connections, Purdue levels, and device properties in a map. Various zoom, highlight, and filter options are available to help you gain the insight you need. For more information, see [Investigate sensor detections in the Device Map](how-to-work-with-the-sensor-device-map.md#investigate-sensor-detections-in-the-device-map). |
231-
| Device inventory | The **Device inventory** displays a list of device attributes that this sensor detects. Options are available to: <br /> - Sort, or filter the information according to the table fields, and see the filtered information displayed. <br /> - Export information to a CSV file. <br /> - Import Windows registry details. For more information, see [View your device inventory from a sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md).|
231+
| Device inventory | The Device inventory displays a list of device attributes that this sensor detects. Options are available to: <br /> - Sort, or filter the information according to the table fields, and see the filtered information displayed. <br /> - Export information to a CSV file. <br /> - Import Windows registry details. For more information, see [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md).|
232232
| Alerts | Alerts are triggered when sensor engines detect changes or suspicious activity in network traffic that requires your attention. For more information, see [View alerts on your sensor](how-to-view-alerts.md#view-alerts-on-your-sensor).|
233233

234234
### Analyze

0 commit comments

Comments
 (0)