|
1 | 1 | ---
|
2 | 2 | title: Standalone micro agent overview (Preview)
|
3 | 3 | description: The Azure Defender for IoT security agents allows you to build security directly into your new IoT devices and Azure IoT projects.
|
4 |
| -ms.date: 1/19/2021 |
| 4 | +ms.date: 11/04/2021 |
5 | 5 | ms.topic: article
|
6 | 6 | ---
|
7 | 7 |
|
8 | 8 | # Standalone micro agent overview (Preview)
|
9 | 9 |
|
10 |
| -Security is a near-universal concern for IoT implementers. IoT devices have unique needs for endpoint monitoring, security posture management, and threat detection – all with highly specific performance requirements. |
| 10 | +Security is a near-universal concern for IoT implementers. IoT devices have unique needs for endpoint monitoring, security posture management, and threat detection – all with highly specific performance requirements. |
11 | 11 |
|
12 |
| -The Azure Defender for IoT security agents allows you to build security directly into your new IoT devices and Azure IoT projects. The micro agent has flexible deployment options, including the ability to deploy as a binary package or modify source code. And the micro agent is available for standard IoT operating systems like Linux and Azure RTOS. |
| 12 | +The Azure Defender for IoT security agents allows you to build security directly into your new IoT devices and Azure IoT projects. The micro agent has flexible deployment options, including the ability to deploy as a binary package or modify source code. And the micro agent is available for standard IoT operating systems like Linux and Azure RTOS. |
13 | 13 |
|
14 |
| -The Azure Defender for IoT micro agent provides endpoint visibility into security posture management, threat detection, and integration into Microsoft's other security tools for unified security management. |
| 14 | +The Azure Defender for IoT micro agent provides endpoint visibility into security posture management, threat detection, and integration into Microsoft's other security tools for unified security management. |
15 | 15 |
|
16 |
| -## Security posture management |
| 16 | +## Security posture management |
17 | 17 |
|
18 |
| -Proactively monitor the security posture of your IoT devices. Azure Defender for IoT provides security posture recommendations based on the CIS benchmark, along with device-specific recommendations. Get visibility into operating system security, including OS configuration, firewall configuration, and permissions. |
| 18 | +Proactively monitor the security posture of your IoT devices. Azure Defender for IoT provides security posture recommendations based on the CIS benchmark, along with device-specific recommendations. Get visibility into operating system security, including OS configuration, firewall configuration, and permissions. |
19 | 19 |
|
20 |
| -## Endpoint IoT and OT threat detection |
| 20 | +## Endpoint IoT and OT threat detection |
21 | 21 |
|
22 |
| -Detect threats like botnets, brute force attempts, crypto miners, and suspicious network activity. Create custom alerts to target the most important threats in your unique organization. |
| 22 | +Detect threats like botnets, brute force attempts, crypto miners, and suspicious network activity. Create custom alerts to target the most important threats in your unique organization. |
23 | 23 |
|
24 |
| -## Flexible distribution and deployment models |
| 24 | +## Flexible distribution and deployment models |
25 | 25 |
|
26 |
| -The Azure Defender for IoT micro agent includes source code, allowing you to incorporate the micro agent into firmware, or customize it to include only what you need. Micro agent is also available as a binary package, or integrated directly into other Azure IoT solutions. |
| 26 | +The Azure Defender for IoT micro agent includes source code, allowing you to incorporate the micro agent into firmware, or customize it to include only what you need. Micro agent is also available as a binary package, or integrated directly into other Azure IoT solutions. |
27 | 27 |
|
28 |
| -## Meets the needs of your IoT devices, with minimal impact |
| 28 | +## Meets the needs of your IoT devices, with minimal impact |
29 | 29 |
|
30 | 30 | The Azure Defender for IoT micro agent is easy to deploy, and has minimal performance impact on the endpoint. With Defender for IoT micro agent you can:
|
31 | 31 |
|
32 | 32 | - **Optimize for performance**: The Azure Defender for IoT micro agent has a small footprint and low CPU consumption.
|
33 | 33 |
|
34 |
| -- **Plug and Play**: There are no specific OS kernel dependencies, or support necessary for all major IoT operating systems. Azure Defender for IoT micro agent meets your devices where they are. |
| 34 | +- **Plug and Play**: There are no specific OS kernel dependencies, or support necessary for all major IoT operating systems. Azure Defender for IoT micro agent meets your devices where they are. |
35 | 35 |
|
36 | 36 | - **Flexible deployment**: As a standalone agent, Azure Defender for IoT’s micro agent supports different distribution models and flexible deployment.
|
37 | 37 |
|
| 38 | +## Data processing and residency |
| 39 | + |
| 40 | +> [!Note] |
| 41 | +> Azure Defender for IoT data processing and residency may take place in a region that is different than the IoT Hub region. Azure Defender for IoT is using device twin, unmasked IP and additional configuration data as part of its security detection logic. |
| 42 | +
|
| 43 | +Azure Defender for IoT data processing, and residency can occur in regions that are different than the IoT Hub's region. The mapping between the IoT Hub, and Azure Defender for IoT regions is as follows; |
| 44 | + |
| 45 | +- For a Hub located in Europe, the data is stored in the *West Europe* region. |
| 46 | + |
| 47 | +- For a Hub located outside Europe, the data is stored in the *East US* region. |
| 48 | + |
| 49 | +Azure Defender for IoT, uses the device twin, unmasked IP addresses, and additional configuration data as part of its security detection logic by default. To disable the device twin, and unmask the IP address collection, navigate to the data collection's settings page. |
| 50 | + |
| 51 | +:::image type="content" source="media/data-collection-settings.png" alt-text="Screenshot of the data collections setting page."::: |
| 52 | + |
| 53 | +For additional details, see how to [customize your Defender for IoT solution](concept-micro-agent-configuration.md). |
| 54 | + |
38 | 55 | ## Next steps
|
39 | 56 |
|
40 | 57 | Check your [Micro agent authentication methods (Preview)](concept-security-agent-authentication.md).
|
0 commit comments