Skip to content

Commit 7552718

Browse files
authored
Merge pull request #178706 from ElazarK/data-policy
added data policy
2 parents 93cbae6 + 4a2928b commit 7552718

File tree

2 files changed

+29
-12
lines changed

2 files changed

+29
-12
lines changed
Lines changed: 29 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,57 @@
11
---
22
title: Standalone micro agent overview (Preview)
33
description: The Azure Defender for IoT security agents allows you to build security directly into your new IoT devices and Azure IoT projects.
4-
ms.date: 1/19/2021
4+
ms.date: 11/04/2021
55
ms.topic: article
66
---
77

88
# Standalone micro agent overview (Preview)
99

10-
Security is a near-universal concern for IoT implementers. IoT devices have unique needs for endpoint monitoring, security posture management, and threat detection – all with highly specific performance requirements.
10+
Security is a near-universal concern for IoT implementers. IoT devices have unique needs for endpoint monitoring, security posture management, and threat detection – all with highly specific performance requirements.
1111

12-
The Azure Defender for IoT security agents allows you to build security directly into your new IoT devices and Azure IoT projects. The micro agent has flexible deployment options, including the ability to deploy as a binary package or modify source code. And the micro agent is available for standard IoT operating systems like Linux and Azure RTOS.
12+
The Azure Defender for IoT security agents allows you to build security directly into your new IoT devices and Azure IoT projects. The micro agent has flexible deployment options, including the ability to deploy as a binary package or modify source code. And the micro agent is available for standard IoT operating systems like Linux and Azure RTOS.
1313

14-
The Azure Defender for IoT micro agent provides endpoint visibility into security posture management, threat detection, and integration into Microsoft's other security tools for unified security management.
14+
The Azure Defender for IoT micro agent provides endpoint visibility into security posture management, threat detection, and integration into Microsoft's other security tools for unified security management.
1515

16-
## Security posture management
16+
## Security posture management
1717

18-
Proactively monitor the security posture of your IoT devices. Azure Defender for IoT provides security posture recommendations based on the CIS benchmark, along with device-specific recommendations. Get visibility into operating system security, including OS configuration, firewall configuration, and permissions.
18+
Proactively monitor the security posture of your IoT devices. Azure Defender for IoT provides security posture recommendations based on the CIS benchmark, along with device-specific recommendations. Get visibility into operating system security, including OS configuration, firewall configuration, and permissions.
1919

20-
## Endpoint IoT and OT threat detection
20+
## Endpoint IoT and OT threat detection
2121

22-
Detect threats like botnets, brute force attempts, crypto miners, and suspicious network activity. Create custom alerts to target the most important threats in your unique organization.
22+
Detect threats like botnets, brute force attempts, crypto miners, and suspicious network activity. Create custom alerts to target the most important threats in your unique organization.
2323

24-
## Flexible distribution and deployment models
24+
## Flexible distribution and deployment models
2525

26-
The Azure Defender for IoT micro agent includes source code, allowing you to incorporate the micro agent into firmware, or customize it to include only what you need. Micro agent is also available as a binary package, or integrated directly into other Azure IoT solutions.
26+
The Azure Defender for IoT micro agent includes source code, allowing you to incorporate the micro agent into firmware, or customize it to include only what you need. Micro agent is also available as a binary package, or integrated directly into other Azure IoT solutions.
2727

28-
## Meets the needs of your IoT devices, with minimal impact
28+
## Meets the needs of your IoT devices, with minimal impact
2929

3030
The Azure Defender for IoT micro agent is easy to deploy, and has minimal performance impact on the endpoint. With Defender for IoT micro agent you can:
3131

3232
- **Optimize for performance**: The Azure Defender for IoT micro agent has a small footprint and low CPU consumption.
3333

34-
- **Plug and Play**: There are no specific OS kernel dependencies, or support necessary for all major IoT operating systems. Azure Defender for IoT micro agent meets your devices where they are.
34+
- **Plug and Play**: There are no specific OS kernel dependencies, or support necessary for all major IoT operating systems. Azure Defender for IoT micro agent meets your devices where they are.
3535

3636
- **Flexible deployment**: As a standalone agent, Azure Defender for IoT’s micro agent supports different distribution models and flexible deployment.
3737

38+
## Data processing and residency
39+
40+
> [!Note]
41+
> Azure Defender for IoT data processing and residency may take place in a region that is different than the IoT Hub region. Azure Defender for IoT is using device twin, unmasked IP and additional configuration data as part of its security detection logic.
42+
43+
Azure Defender for IoT data processing, and residency can occur in regions that are different than the IoT Hub's region. The mapping between the IoT Hub, and Azure Defender for IoT regions is as follows;
44+
45+
- For a Hub located in Europe, the data is stored in the *West Europe* region.
46+
47+
- For a Hub located outside Europe, the data is stored in the *East US* region.
48+
49+
Azure Defender for IoT, uses the device twin, unmasked IP addresses, and additional configuration data as part of its security detection logic by default. To disable the device twin, and unmask the IP address collection, navigate to the data collection's settings page.
50+
51+
:::image type="content" source="media/data-collection-settings.png" alt-text="Screenshot of the data collections setting page.":::
52+
53+
For additional details, see how to [customize your Defender for IoT solution](concept-micro-agent-configuration.md).
54+
3855
## Next steps
3956

4057
Check your [Micro agent authentication methods (Preview)](concept-security-agent-authentication.md).
53.2 KB
Loading

0 commit comments

Comments
 (0)