Skip to content

Commit 6d14990

Browse files
committed
merge blockers and removing commented text
1 parent 6cb6626 commit 6d14990

11 files changed

+9
-15
lines changed

articles/defender-for-iot/organizations/alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Use the following table to learn more about each alert status and triage option.
111111
|**Active** | - Azure portal only | Set an alert to *Active* to indicate that an investigation is underway, but that the alert can't yet be closed or otherwise triaged. <br><br>This status has no effect elsewhere in Defender for IoT. |
112112
|**Closed** | - Azure portal <br><br>- OT network sensors <br><br>- On-premises management console | Close an alert to indicate that it's fully investigated, and you want to be alerted again the next time the same traffic is detected.<br><br>Closing an alert adds it to the sensor event timeline.<br><br>On the on-premises management console, *New* alerts are called *Acknowledged*. |
113113
|**Learn** | - Azure portal <br><br>- OT network sensors <br><br>- On-premises management console <br><br>*Unlearning* an alert is available only on the OT sensor. | Learn an alert when you want to close it and add it as allowed traffic, so that you aren't alerted again the next time the same traffic is detected. <br><br>For example, when the sensor detects firmware version changes following standard maintenance procedures, or when a new, expected device is added to the network. <br><br>Learning an alert closes the alert and adds an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when calculating other OT sensor reports. <br><br>Learning alerts is available for selected alerts only, mostly those triggered by *Policy* and *Anomaly* engine alerts. |
114-
|**Mute** | - OT network sensors <br><br>- On-premises management console <br><br>*Unmuting* an alert is available only on the OT sensor. | Mute an alert when you want to close it and not see again for the same traffic, but without adding the alert allowed traffic. <br><br>For example, when the Operational engine triggers an alert indicating that the PLC Mode was changed on a device. The new mode may indicate that the PLC isn't secure, but after investigation, it's determined that the new mode is acceptable. <br><br>Muting an alert closes it, but doesn't add an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when when calculating data for other sensor reports. <br><br>Muting an alert is available for selected alerts only, mostly those triggered by the *Anomaly*, *Protocol Violation*, or *Operational* engines. |
114+
|**Mute** | - OT network sensors <br><br>- On-premises management console <br><br>*Unmuting* an alert is available only on the OT sensor. | Mute an alert when you want to close it and not see again for the same traffic, but without adding the alert allowed traffic. <br><br>For example, when the Operational engine triggers an alert indicating that the PLC Mode was changed on a device. The new mode may indicate that the PLC isn't secure, but after investigation, it's determined that the new mode is acceptable. <br><br>Muting an alert closes it, but doesn't add an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when calculating data for other sensor reports. <br><br>Muting an alert is available for selected alerts only, mostly those triggered by the *Anomaly*, *Protocol Violation*, or *Operational* engines. |
115115

116116
> [!TIP]
117117
> If you know ahead of time which events are irrelevant for you, such as during a maintenance window, or if you don't want to track the event in the event timeline, create an alert exclusion rule on an on-premises management console instead.

articles/defender-for-iot/organizations/architecture-connections.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ ms.date: 02/23/2023
77

88
# Methods for connecting sensors to Azure
99

10-
<!--fix according to recipes doc-->
1110
This article is one in a series of articles describing the [deployment path](ot-deploy/ot-deploy-path.md) for OT monitoring with Microsoft Defender for IoT.
1211

1312
Use the content below to learn about the architectures and methods supported for connecting Defender for IoT sensors to the Azure portal in the cloud.

articles/defender-for-iot/organizations/architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Defender for IoT network sensors include the following main analytics engines:
7575
| **Policy Violation** | A policy violation occurs with a deviation from baseline behavior defined in learned or configured settings. | An *"Unauthorized HTTP User Agent"* alert indicates that an application that wasn't learned or approved by policy is used as an HTTP client on a device. This might be a new web browser or application on that device.|
7676
|**Industrial malware detection engine** | Identifies behaviors that indicate the presence of malicious network activity via known malware, such as Conficker, Black Energy, Havex, WannaCry, NotPetya, and Triton. | A *"Suspicion of Malicious Activity (Stuxnet)"* alert indicates that the sensor detected suspicious network activity known to be related to the Stuxnet malware. This malware is an advanced persistent threat aimed at industrial control and SCADA networks. |
7777
|**Anomaly detection engine** | Detects unusual machine-to-machine (M2M) communications and behaviors. <br><br>This engine models ICS networks and therefore requires a shorter learning period than analytics developed for IT. Anomalies are detected faster, with minimal false positives. | A *"Periodic Behavior in Communication Channel"* alert reflects periodic and cyclic behavior of data transmission, which is common in industrial networks. <br>Other examples include excessive SMB sign-in attempts, and PLC scan detected alerts. |
78-
|**Operational incident detection** | Detects operational issues such as intermittent connectivity that can indicate early signs of equipment failure. | A *"Device is Suspected to be Disconnected (Unresponsive)"* alert is triggered when a device isn't responding to any kind of request for a predefined period. This alert might indicate a device shutdown, disconnection, or malfunction. <br>Another example might be the that Siemens S7 stop PLC command was sent alerts. |
78+
|**Operational incident detection** | Detects operational issues such as intermittent connectivity that can indicate early signs of equipment failure. | A *"Device is Suspected to be Disconnected (Unresponsive)"* alert is triggered when a device isn't responding to any kind of request for a predefined period. This alert might indicate a device shutdown, disconnection, or malfunction. <br>Another example might be if the Siemens S7 stop PLC command was sent alerts. |
7979

8080
## Management options
8181

articles/defender-for-iot/organizations/connect-sensors.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,10 @@ This article is one in a series of articles describing the [deployment path](ot-
1313

1414
You can skip this step in the following cases:
1515

16-
- If you're working in air-gapped environment and locally-managed sensors
16+
- If you're working in air-gapped environment and locally managed sensors
1717

1818
- If you're using a [direct connection](architecture-connections.md#direct-connections) between your OT sensor and Azure. In this case, you've already performed all required steps when you [provisioned your sensor for cloud management](ot-deploy/provision-cloud-management.md)
1919

20-
<!--we need to redo this according to the recipes doc-->
21-
2220
## Prerequisites
2321

2422
To perform the steps described in this article, you'll need:

articles/defender-for-iot/organizations/device-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Defender for IoT's device inventory supports the following device classes:
2727
|Devices |For example ... |
2828
|---------|---------|
2929
|**Manufacturing**| Industrial and operational devices, such as pneumatic devices, packaging systems, industrial packaging systems, industrial robots |
30-
|**Building** | Access panels, surveillance devices, HVAC systems, elevators , smart lighting systems |
30+
|**Building** | Access panels, surveillance devices, HVAC systems, elevators, smart lighting systems |
3131
|**Health care** | Glucose meters, monitors |
3232
|**Transportation / Utilities** | Turnstiles, people counters, motion sensors, fire and safety systems, intercoms |
3333
|**Energy and resources** | DCS controllers, PLCs, historian devices, HMIs |

articles/defender-for-iot/organizations/how-to-control-what-traffic-is-monitored.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,6 @@ This step is performed by your deployment teams.
2727

2828
## Define OT and IoT subnets
2929

30-
<!--yonina is updating this section separately-->
31-
3230
Subnet configurations affect how devices are displayed in the sensor's [device maps](how-to-work-with-the-sensor-device-map.md). In the device maps, IT devices are automatically aggregated by subnet, where you can expand and collapse each subnet view to drill down as needed.
3331

3432
While the OT network sensor automatically learns the subnets in your network, we recommend confirming the learned settings and updating them as needed to optimize your map views.

articles/defender-for-iot/organizations/how-to-manage-sensors-from-the-on-premises-management-console.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The selected settings are applied across all connected OT sensors.
4848

4949
## Monitor disconnected OT sensors
5050

51-
If you're working with locally-managed OT network sensors and on-premises management console, we recommend that you forward alerts about OT sensors that are disconnected from the on-premises management console to partner services.
51+
If you're working with locally managed OT network sensors and on-premises management console, we recommend that you forward alerts about OT sensors that are disconnected from the on-premises management console to partner services.
5252

5353
### View OT sensor connection statuses
5454

articles/defender-for-iot/organizations/how-to-work-with-alerts-on-premises-management-console.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This article describes how to view Defender for IoT alerts on an on-premises man
1515

1616
Before performing the procedures in this article, make sure that you have:
1717

18-
- An on-premises management console [installed](ot-deploy/install-software-on-premises-management-console.md), [activated, and configured](ot-deploy/activate-deploy-management.md). To view alerts by location or zone, make sure that you've [configured sites and zones](ot-deploy/sites-and-zones-on-premises.md) on on the on-premises management console.
18+
- An on-premises management console [installed](ot-deploy/install-software-on-premises-management-console.md), [activated, and configured](ot-deploy/activate-deploy-management.md). To view alerts by location or zone, make sure that you've [configured sites and zones](ot-deploy/sites-and-zones-on-premises.md) on the on-premises management console.
1919

2020
- One or more OT sensors [installed](ot-deploy/install-software-ot-sensor.md), [activated, configured](ot-deploy/activate-deploy-sensor.md), and [connected to your on-premises management console](ot-deploy/connect-sensors-to-management.md). To view alerts per zone, make sure that each sensor is assigned to a specific zone.
2121

@@ -71,7 +71,7 @@ To view alerts from connected OT sensors across your entire global network, use
7171

7272
1. Select any site that's red or yellow, and then select the :::image type="icon" source="media/how-to-work-with-alerts-on-premises-management-console/alerts-icon.png" border="false"::: alerts button for a specific OT sensor to jump to that sensor's current alerts. For example:
7373

74-
:::image type="content" source="media/how-to-work-with-alerts-on-premises-management-console/select-alerts-button.png" alt-text="Select the Alerts button to view a list of a yellow OT sensor's alerts.":::
74+
:::image type="content" source="media/how-to-work-with-alerts-on-premises-management-console/select-alerts-button.png" alt-text="Screenshot showing the Alerts button.":::
7575

7676
The **Alerts** page opens, automatically filtered to the selected alerts.
7777

articles/defender-for-iot/organizations/ot-deploy/install-software-on-premises-management-console.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The installation process takes about 20 minutes. After the installation, the sys
6262

6363
:::image type="content" source="../media/tutorial-install-components/on-prem-language-select.png" alt-text="Screenshot of selecting your preferred language for the installation process.":::
6464

65-
1. From the options displayed, select the management release you want to install based on the hardware profile you're using. <!--need to validate this-->
65+
1. From the options displayed, select the management release you want to install based on the hardware profile you're using.
6666

6767
1. Define the following network properties as prompted:
6868

articles/defender-for-iot/organizations/roles-on-premises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The following roles are available on OT network sensors and on-premises manageme
4040
|---------|---------|
4141
|**Admin** | Admin users have access to all tools, including system configurations, creating and managing users, and more. |
4242
|**Security Analyst** | Security Analysts don't have admin-level permissions for configurations, but can perform actions on devices, acknowledge alerts, and use investigation tools. <br><br>Security Analysts can access options on the sensor displayed in the **Discover** and **Analyze** menus on the sensor, and in the **NAVIGATION** and **ANALYSIS** menus on the on-premises management console. |
43-
|**Read Only** | Read-only users perform tasks such as viewing alerts and devices on the device map. <br><br>Read Only users can access options displayed in the **Discover** and **Analyze** menus on the sensor, in read-only mode, and in the **NAVIGATION** menu on the on-premises management console. |
43+
|**Read-Only** | Read-only users perform tasks such as viewing alerts and devices on the device map. <br><br>Read-Only users can access options displayed in the **Discover** and **Analyze** menus on the sensor, in read-only mode, and in the **NAVIGATION** menu on the on-premises management console. |
4444

4545
When first deploying an OT monitoring system, sign in to your sensors and on-premises management console with one of the [default, privileged users](#default-privileged-on-premises-users) described above. Create your first **Admin** user, and then use that user to create other users and assign them to roles.
4646

0 commit comments

Comments
 (0)