Skip to content

Commit 812e98f

Browse files
Merge pull request #272438 from tarTech23/rtos
Replace azure rtos
2 parents 83cb1dc + e96d136 commit 812e98f

17 files changed

+167
-142
lines changed

.openpublishing.redirection.defender-for-iot.json

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,35 @@
11
{
2-
"redirections": [
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/device-builders/how-to-azure-rtos-security-module.md",
5+
"redirect_url": "/azure/defender-for-iot/device-builders/how-to-threadx-security-module",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-iot/device-builders/iot-security-azure-rtos.md",
10+
"redirect_url": "/azure/defender-for-iot/device-builders/iot-security-threadx",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/defender-for-iot/device-builders/azure-rtos-security-module-api.md",
15+
"redirect_url": "/azure/defender-for-iot/device-builders/threadx-security-module-api",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/defender-for-iot/device-builders/concept-rtos-security-alerts-recommendations.md",
20+
"redirect_url": "/azure/defender-for-iot/device-builders/concept-threadx-security-alerts-recommendations",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/defender-for-iot/device-builders/concept-rtos-security-module.md",
25+
"redirect_url": "/azure/defender-for-iot/device-builders/concept-threadx-security-module",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/defender-for-iot/device-builders/how-to-rtos-security-module.md",
30+
"redirect_url": "/azure/defender-for-iot/device-builders/how-to-threadx-security-module",
31+
"redirect_document_id": false
32+
},
333
{
434
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-manage-proprietary-protocols.md",
535
"redirect_url": "/azure/defender-for-iot/organizations/how-to-manage-individual-sensors#manage-custom-plugins-legacy",

articles/defender-for-iot/device-builders/TOC.yml

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
- name: Concepts
4242
items:
4343
- name: Agent portfolio overview and OS support
44-
displayName: standalone agent, micro agent, RTOS
44+
displayName: standalone agent, micro agent, Eclipse Threadx
4545
href: concept-agent-portfolio-overview-os-support.md
4646
- name: Standalone micro agent overview
4747
displayName: endpoint, posture, distribution, flexible, model
@@ -97,15 +97,15 @@
9797
- name: Create custom alerts
9898
displayName: security group
9999
href: quickstart-create-custom-alerts.md
100-
- name: Defender-IoT-micro-agent for Azure RTOS (Preview)
101-
href: iot-security-azure-rtos.md
100+
- name: Defender-IoT-micro-agent for Eclipse ThreadX (Preview)
101+
href: iot-security-threadx.md
102102
items:
103-
- name: Work with Defender-IoT-micro-agent for Azure RTOS (Preview)
104-
href: how-to-azure-rtos-security-module.md
105-
- name: Understand the Defender-IoT-micro-agent for Azure RTOS (Preview)
106-
href: concept-rtos-security-module.md
107-
- name: Defender-IoT-micro-agent for Azure RTOS alerts and recommendations (Preview)
108-
href: concept-rtos-security-alerts-recommendations.md
103+
- name: Work with Defender-IoT-micro-agent for Eclipse ThreadX (Preview)
104+
href: how-to-threadx-security-module.md
105+
- name: Understand the Defender-IoT-micro-agent for Eclipse ThreadX (Preview)
106+
href: concept-threadx-security-module.md
107+
- name: Defender-IoT-micro-agent for Eclipse ThreadX alerts and recommendations (Preview)
108+
href: concept-threadx-security-alerts-recommendations.md
109109
- name: Manage cloud device inventory
110110
href: how-to-manage-device-inventory-on-the-cloud.md
111111
displayName: device inventory, device, inventory, EIoT, eiot
@@ -182,9 +182,9 @@
182182
href: how-to-investigate-device.md
183183
- name: Reference
184184
items:
185-
- name: Defender-IoT-micro-agent for Azure RTOS API (Preview)
185+
- name: Defender-IoT-micro-agent for Eclipse ThreadX API (Preview)
186186
displayName: prototype, disable
187-
href: azure-rtos-security-module-api.md
187+
href: threadx-security-module-api.md
188188
- name: Frequently asked questions
189189
displayName: FAQ, embedded, dependencies, data, quota, internet,
190190
href: resources-agent-frequently-asked-questions.md
@@ -209,7 +209,4 @@
209209
href: https://azure.microsoft.com/pricing/details/azure-defender/
210210
- name: Videos
211211
href: https://azure.microsoft.com/resources/videos/index/?services=security-center&service=internet-of-things&page=1&sort=newest
212-
- name: Agent-based solution for device builders
213-
items:
214-
- name: Azure RTOS Defender-IoT-micro-agent on Stack Overflow
215-
href: https://stackoverflow.com/questions/tagged/azure-rtos+azure-iot-security-module
212+

articles/defender-for-iot/device-builders/agent-based-security-custom-alerts.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Agent based security custom alerts
33
description: Learn about customizable security alerts and recommended remediation using Defender for IoT device's features and service.
44
ms.topic: conceptual
5-
ms.date: 03/28/2022
5+
ms.date: 04/17/2024
66
---
77

88

@@ -18,12 +18,11 @@ The following lists of Defender for IoT alerts are definable by you based on you
1818

1919
| Severity | Alert name | Data source | Description | Suggested remediation |
2020
|--|--|--|--|--|
21-
| Low | Custom alert - The number of active connections is outside the allowed range | Legacy Defender-IoT-micro-agent, Azure RTOS | Number of active connections within a specific time window is outside the currently configured and allowable range. | Investigate the device logs. Learn where the connection originated and determine if it is benign or malicious. If malicious, remove possible malware and understand source. If benign, add the source to the allowed connection list. |
22-
| Low | Custom alert - The outbound connection created to an IP that isn't allowed | Legacy Defender-IoT-micro-agent, Azure RTOS | An outbound connection was created to an IP that is outside your allowed IP list. | Investigate the device logs. Learn where the connection originated and determine if it is benign or malicious. If malicious, remove possible malware and understand source. If benign, add the source to the allowed IP list. |
23-
| Low | Custom alert - The number of failed local logins is outside the allowed range | Legacy Defender-IoT-micro-agent, Azure RTOS | The number of failed local logins within a specific time window is outside the currently configured and allowable range. | |
24-
| Low | Custom alert - The sign in of a user that is not on the allowed user list | Legacy Defender-IoT-micro-agent, Azure RTOS | A local user outside your allowed user list, logged in to the device. | If you are saving raw data, navigate to your log analytics account and use the data to investigate the device, identify the source, and then fix the allow/block list for those settings. If you are not currently saving raw data, go to the device and fix the allow/block list for those settings. |
25-
| Low | Custom alert - A process was executed that is not allowed | Legacy Defender-IoT-micro-agent, Azure RTOS | A process that is not allowed was executed on the device. | If you are saving raw data, navigate to your log analytics account and use the data to investigate the device, identify the source, and then fix the allow/block list for those settings. If you are not currently saving raw data, go to the device and fix the allow/block list for those settings. |
26-
|
21+
| Low | Custom alert - The number of active connections is outside the allowed range | Legacy Defender-IoT-micro-agent, Eclipse ThreadX | Number of active connections within a specific time window is outside the currently configured and allowable range. | Investigate the device logs. Learn where the connection originated and determine if it's benign or malicious. If malicious, remove possible malware and understand source. If benign, add the source to the allowed connection list. |
22+
| Low | Custom alert - The outbound connection created to an IP that isn't allowed | Legacy Defender-IoT-micro-agent, Eclipse ThreadX | An outbound connection was created to an IP that is outside your allowed IP list. | Investigate the device logs. Learn where the connection originated and determine if it's benign or malicious. If malicious, remove possible malware and understand source. If benign, add the source to the allowed IP list. |
23+
| Low | Custom alert - The number of failed local logins is outside the allowed range | Legacy Defender-IoT-micro-agent, Eclipse ThreadX | The number of failed local logins within a specific time window is outside the currently configured and allowable range. | |
24+
| Low | Custom alert - The sign in of a user that isn't on the allowed user list | Legacy Defender-IoT-micro-agent, Eclipse ThreadX | A local user outside your allowed user list, logged in to the device. | If you're saving raw data, navigate to your log analytics account and use the data to investigate the device, identify the source, and then fix the allow/block list for those settings. If you aren't currently saving raw data, go to the device and fix the allow/block list for those settings. |
25+
| Low | Custom alert - A process was executed that isn't allowed | Legacy Defender-IoT-micro-agent, Eclipse ThreadX | A process that isn't allowed was executed on the device. | If you're saving raw data, navigate to your log analytics account and use the data to investigate the device, identify the source, and then fix the allow/block list for those settings. If you aren't currently saving raw data, go to the device and fix the allow/block list for those settings. |
2726

2827
## Next steps
2928

articles/defender-for-iot/device-builders/concept-agent-portfolio-overview-os-support.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Agent portfolio overview and OS support
33
description: Microsoft Defender for IoT provides a large portfolio of agents based on the device type.
4-
ms.date: 01/09/2022
4+
ms.date: 04/17/2024
55
ms.topic: conceptual
66
---
77

@@ -28,9 +28,9 @@ For additional information on supported operating systems, or to request access
2828

2929
For a more granular view of the micro agent-operating system dependencies, see [Linux dependencies](concept-micro-agent-linux-dependencies.md#linux-dependencies).
3030

31-
## Azure RTOS micro agent
31+
## Eclipse ThreadX micro agent
3232

33-
The Microsoft Defender for IoT micro agent comes built in as part of the Azure RTOS NetX Duo component, and monitors the device's network activity. The micro agent consists of a comprehensive and lightweight security solution that provides coverage for common threats, and potential malicious activities on a real-time operating system (RTOS) devices.
33+
The Microsoft Defender for IoT micro agent comes built in as part of the FileX NetX Duo component, and monitors the device's network activity. The micro agent consists of a comprehensive and lightweight security solution that provides coverage for common threats, and potential malicious activities on a real-time operating system (FileX) devices.
3434

3535
## Next steps
3636

articles/defender-for-iot/device-builders/concept-event-aggregation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Micro agent event collection
33
description: Defender for IoT security agents collect data and system events from your local device, and send the data to the Azure cloud for processing, and analytics.
4-
ms.date: 04/26/2022
4+
ms.date: 04/17/2024
55
ms.topic: conceptual
66
---
77

@@ -54,7 +54,7 @@ Network activity events are considered identical when the local port, remo
5454

5555
The default buffer for a network activity event is 256. For situations where the cache is full:
5656

57-
- **Azure RTOS devices**: No new network events will be cached until the next collection cycle starts.
57+
- **Eclipse ThreadX devices**: No new network events will be cached until the next collection cycle starts.
5858

5959
- **Linux devices**: The oldest event will be replaced by every new event. A warning to increase the cache size will be logged.
6060

articles/defender-for-iot/device-builders/concept-rtos-security-module.md

Lines changed: 0 additions & 56 deletions
This file was deleted.

articles/defender-for-iot/device-builders/concept-standalone-micro-agent-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: Standalone micro agent overview
33
description: The Microsoft Defender for IoT security agents allow you to build security directly into your new IoT devices and Azure IoT projects.
4-
ms.date: 01/12/2023
4+
ms.date: 04/17/2024
55
ms.topic: conceptual
66
---
77

88
# Standalone micro agent overview
99

1010
Security is a near-universal concern for IoT implementers. IoT devices have unique needs for endpoint monitoring, security posture management, and threat detection – all with highly specific performance requirements.
1111

12-
The Microsoft Defender for IoT security agent allows you to build security directly into your new IoT devices and Azure IoT projects. The micro agent has flexible deployment options, including the ability to deploy as a binary package or modify source code, and it's available for standard IoT operating systems like Linux and Azure RTOS.
12+
The Microsoft Defender for IoT security agent allows you to build security directly into your new IoT devices and Azure IoT projects. The micro agent has flexible deployment options, including the ability to deploy as a binary package or modify source code, and it's available for standard IoT operating systems like Linux and Eclipse ThreadX.
1313

1414
The Microsoft Defender for IoT micro agent provides endpoint visibility into security posture management, threat detection, and integration into Microsoft's other security tools for unified security management.
1515

0 commit comments

Comments
 (0)