Skip to content

Commit 8776799

Browse files
author
Jill Grant
authored
Merge pull request #292402 from tarTech23/cmdelmain4
Cm delete from copied articles Main 4
2 parents 53d27ef + 864336b commit 8776799

29 files changed

+135
-354
lines changed

articles/defender-for-iot/organizations/alerts.md

Lines changed: 14 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Microsoft Defender for IoT alerts
3-
description: Learn about Microsoft Defender for IoT alerts across the Azure portal, OT network sensors, and on-premises management consoles.
3+
description: Learn about Microsoft Defender for IoT alerts across the Azure portal and OT network sensors.
44
ms.date: 08/06/2023
55
ms.topic: how-to
66
ms.custom: enterprise-iot
@@ -22,15 +22,14 @@ Use the details shown on the **Alerts** page, or on an alert details page, to in
2222
2323
## Alert management options
2424

25-
Defender for IoT alerts are available in the Azure portal, OT network sensor consoles, and the on-premises management console. With Enterprise IoT security, alerts are also available for Enterprise IoT devices detected by Defender for Endpoint, in Microsoft 365 Defender.
25+
Defender for IoT alerts are available in the Azure portal or OT network sensor consoles. With Enterprise IoT security, alerts are also available for Enterprise IoT devices detected by Defender for Endpoint, in Microsoft 365 Defender.
2626

2727
While you can view alert details, investigate alert context, and triage and manage alert statuses from any of these locations, each location also offers extra alert actions. The following table describes the alerts supported for each location and the extra actions available from that location only:
2828

2929
|Location |Description | Extra alert actions |
3030
|---------|---------|---------|
3131
|**Azure portal** | Alerts from all cloud-connected OT sensors | - View related MITRE ATT&CK tactics and techniques <br>- Use out-of-the-box workbooks for visibility into high priority alerts <br>- View alerts from Microsoft Sentinel and run deeper investigations with [Microsoft Sentinel playbooks and workbooks](concept-sentinel-integration.md). |
3232
|**OT network sensor consoles** | Alerts generated by that OT sensor | - View the alert's source and destination in the **Device map** <br>- View related events on the **Event timeline** <br>- Forward alerts directly to partner vendors <br>- Create alert comments <br> - Create custom alert rules <br>- Unlearn alerts |
33-
|**An on-premises management console** | Alerts generated by connected OT sensors | - Forward alerts directly to partner vendors <br> - Create alert exclusion rules |
3433
|**Microsoft 365 Defender** | Alerts generated for Enterprise IoT devices detected by Microsoft Defender for Endpoint | - Manage alerts data together with other Microsoft 365 Defender data, including advanced hunting |
3534

3635
> [!TIP]
@@ -55,21 +54,21 @@ Alert options also differ depending on your location and user role. For more inf
5554
Organizations where sensors are deployed between OT and IT networks deal with many alerts, related to both OT and IT traffic. The amount of alerts, some of which are irrelevant, can cause alert fatigue and affect overall performance. To address these challenges, Defender for IoT's detection policy steers its different [alert engines](alert-engine-messages.md#supported-alert-types) to focus on alerts with business impact and relevance to an OT network, and reduce low-value IT related alerts. For example, the **Unauthorized internet connectivity** alert is highly relevant in an OT network, but has relatively low value in an IT network.
5655

5756
To focus the alerts triggered in these environments, all alert engines, except for the *Malware* engine, trigger alerts only if they detect a related OT subnet or protocol.
58-
However, to maintain triggering of alerts that indicate critical scenarios:
57+
However, to maintain triggering of alerts that indicate critical scenarios:
5958

6059
- The *Malware* engine triggers malware alerts regardless of whether the alerts are related to OT or IT devices.
6160
- The other engines include exceptions for critical scenarios. For example, the *Operational* engine triggers alerts related to sensor traffic, regardless of whether the alert is related to OT or IT traffic.
6261

6362
## Managing OT alerts in a hybrid environment
6463

65-
Users working in hybrid environments might be managing OT alerts in [Defender for IoT](https://portal.azure.com/#view/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/~/Getting_started) on the Azure portal, the OT sensor, and an on-premises management console.
64+
Users working in hybrid environments might be managing OT alerts in [Defender for IoT](https://portal.azure.com/#view/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/~/Getting_started) on the Azure portal or the OT sensor.
6665

6766
> [!NOTE]
68-
> While the sensor console displays an alert's **Last detection** field in real-time, Defender for IoT in the Azure portal may take up to one hour to display the updated time. This explains a scenario where the last detection time in the sensor console isn't the same as the last detection time in the Azure portal.
67+
> While the sensor console displays an alert's **Last detection** field in real-time, Defender for IoT in the Azure portal may take up to one hour to display the updated time. This explains a scenario where the last detection time in the sensor console isn't the same as the last detection time in the Azure portal.
6968
70-
Alert statuses are otherwise fully synchronized between the Azure portal and the OT sensor, and between the sensor and the on-premises management console. This means that regardless of where you manage the alert in Defender for IoT, the alert is updated in other locations as well.
69+
Alert statuses are otherwise fully synchronized between the Azure portal and the OT sensor. This means that regardless of where you manage the alert in Defender for IoT, the alert is updated in other locations as well.
7170

72-
Setting an alert status to **Closed** or **Muted** on a sensor or on-premises management console updates the alert status to **Closed** on the Azure portal. On the on-premises management console, the **Closed** alert status is called **Acknowledged**.
71+
Setting an alert status to **Closed** or **Muted** on a sensor updates the alert status to **Closed** on the Azure portal.
7372

7473
> [!TIP]
7574
> If you're working with Microsoft Sentinel, we recommend that you configure the integration to also [synchronize alert status](concept-sentinel-integration.md#defender-for-iot-alerts-in-microsoft-sentinel) with Microsoft Sentinel, and then manage alert statuses together with the related Microsoft Sentinel incidents.
@@ -87,7 +86,7 @@ For more information, see [Securing IoT devices in the enterprise](concept-enter
8786

8887
New alerts are automatically closed if no identical traffic is detected 90 days after the initial detection. If identical traffic is detected within those first 90 days, the 90-day count is reset.
8988

90-
In addition to the default behavior, you might want to help your SOC and OT management teams triage and remediate alerts faster. Sign into an OT sensor or an on-premises management console as an **Admin** user to use the following options:
89+
In addition to the default behavior, you might want to help your SOC and OT management teams triage and remediate alerts faster. Sign into an OT sensor as an **Admin** user to use the following options:
9190

9291
- **Create custom alert rules**. OT sensors only.
9392

@@ -107,42 +106,27 @@ In addition to the default behavior, you might want to help your SOC and OT mana
107106

108107
For more information, see [Create alert comments on an OT sensor](how-to-accelerate-alert-incident-response.md#create-alert-comments-on-an-ot-sensor).
109108

110-
- **Create alert exclusion rules**: On-premises management consoles only.
111-
112-
If you're working with an on-premises management console, define *alert exclusion rules* to ignore events across multiple sensors that meet specific criteria. For example, you might create an alert exclusion rule to ignore all events that would trigger irrelevant alerts during a specific maintenance window.
113-
114-
Alerts ignored by exclusion rules aren't shown on the Azure portal, sensor, or on-premises management console, or in the event logs.
115-
116-
For more information, see [Create alert exclusion rules on an on-premises management console](how-to-accelerate-alert-incident-response.md#create-alert-exclusion-rules-on-an-on-premises-management-console).
117-
118109
- **Forward alert data to partner systems** to partner SIEMs, syslog servers, specified email addresses and more.
119110

120-
Supported from both OT sensors and on-premises management consoles. For more information, see [Forward alert information](how-to-forward-alert-information-to-partners.md).
111+
Supported from the OT sensors, for more information, see [Forward alert information](how-to-forward-alert-information-to-partners.md).
121112

122113
## Alert statuses and triaging options
123114

124115
Use the following alert statuses and triaging options to manage alerts across Defender for IoT.
125116

126117
When triaging an alert, consider that some alerts might reflect valid network changes, such as an authorized device attempting to access a new resource on another device.
127118

128-
While triaging options from the OT sensor and the on-premises management console are available for OT alerts only, options available on the Azure portal are available for both OT and Enterprise IoT alerts.
119+
While triaging options from the OT sensor are available for OT alerts only, options available on the Azure portal are available for both OT and Enterprise IoT alerts.
129120

130121
Use the following table to learn more about each alert status and triage option.
131122

132-
133123
|Status / triage action |Available on |Description |
134124
|---------|---------|---------|
135-
|**New** | - Azure portal <br><br>- OT network sensors <br><br>- On-premises management console | *New* alerts are alerts that haven't yet been triaged or investigated by the team. New traffic detected for the same devices doesn't generate a new alert, but is added to the existing alert. <br><br>On the on-premises management console, *New* alerts are called *Unacknowledged*.<br><br>**Note**: You might see multiple, *New* or *Unacknowledged* alerts with the same name. In such cases, each separate alert is triggered by separate traffic, on different sets of devices. |
125+
|**New** | - Azure portal <br><br>- OT network sensors | *New* alerts are alerts that haven't yet been triaged or investigated by the team. New traffic detected for the same devices doesn't generate a new alert, but is added to the existing alert. <br><br>**Note**: You might see multiple, *New* alerts with the same name. In such cases, each separate alert is triggered by separate traffic, on different sets of devices. |
136126
|**Active** | - Azure portal only | Set an alert to *Active* to indicate that an investigation is underway, but that the alert can't yet be closed or otherwise triaged. <br><br>This status has no effect elsewhere in Defender for IoT. |
137-
|**Closed** | - Azure portal <br><br>- OT network sensors <br><br>- On-premises management console | Close an alert to indicate that it's fully investigated, and you want to be alerted again the next time the same traffic is detected.<br><br>Closing an alert adds it to the sensor event timeline.<br><br>On the on-premises management console, *New* alerts are called *Acknowledged*. |
138-
|**Learn** | - Azure portal <br><br>- OT network sensors <br><br>- On-premises management console <br><br>*Unlearning* an alert is available only on the OT sensor. | Learn an alert when you want to close it and add it as allowed traffic, so that you aren't alerted again the next time the same traffic is detected. <br><br>For example, when the sensor detects firmware version changes following standard maintenance procedures, or when a new, expected device is added to the network. <br><br>Learning an alert closes the alert and adds an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when calculating other OT sensor reports. <br><br>Learning alerts is available for selected alerts only, mostly those triggered by *Policy* and *Anomaly* engine alerts. |
139-
|**Mute** | - OT network sensors <br><br>- On-premises management console <br><br>*Unmuting* an alert is available only on the OT sensor. | Mute an alert when you want to close it and not see again for the same traffic, but without adding the alert allowed traffic. <br><br>For example, when the Operational engine triggers an alert indicating that the PLC Mode was changed on a device. The new mode might indicate that the PLC isn't secure, but after investigation, it's determined that the new mode is acceptable. <br><br>Muting an alert closes it, but doesn't add an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when calculating data for other sensor reports. <br><br>Muting an alert is available for selected alerts only, mostly those triggered by the *Anomaly*, *Protocol Violation*, or *Operational* engines. |
140-
141-
> [!TIP]
142-
> If you know ahead of time which events are irrelevant for you, such as during a maintenance window, or if you don't want to track the event in the event timeline, create an alert exclusion rule on an on-premises management console instead.
143-
>
144-
> For more information, see [Create alert exclusion rules on an on-premises management console](how-to-accelerate-alert-incident-response.md#create-alert-exclusion-rules-on-an-on-premises-management-console).
145-
>
127+
|**Closed** | - Azure portal <br><br>- OT network sensors | Close an alert to indicate that it's fully investigated, and you want to be alerted again the next time the same traffic is detected.<br><br>Closing an alert adds it to the sensor event timeline. |
128+
|**Learn** | - Azure portal <br><br>- OT network sensors <br><br>*Unlearning* an alert is available only on the OT sensor. | Learn an alert when you want to close it and add it as allowed traffic, so that you aren't alerted again the next time the same traffic is detected. <br><br>For example, when the sensor detects firmware version changes following standard maintenance procedures, or when a new, expected device is added to the network. <br><br>Learning an alert closes the alert and adds an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when calculating other OT sensor reports. <br><br>Learning alerts is available for selected alerts only, mostly those triggered by *Policy* and *Anomaly* engine alerts. |
129+
|**Mute** | - OT network sensors <br><br>*Unmuting* an alert is available only on the OT sensor. | Mute an alert when you want to close it and not see again for the same traffic, but without adding the alert allowed traffic. <br><br>For example, when the Operational engine triggers an alert indicating that the PLC Mode was changed on a device. The new mode might indicate that the PLC isn't secure, but after investigation, it's determined that the new mode is acceptable. <br><br>Muting an alert closes it, but doesn't add an item to the sensor event timeline. Detected traffic is included in data mining reports, but not when calculating data for other sensor reports. <br><br>Muting an alert is available for selected alerts only, mostly those triggered by the *Anomaly*, *Protocol Violation*, or *Operational* engines. |
146130

147131
### Triage OT alerts during learning mode
148132

@@ -161,6 +145,3 @@ Review alert types and messages to help you understand and plan remediation acti
161145
162146
> [!div class="nextstepaction"]
163147
> [View and manage alerts on your OT sensor](how-to-view-alerts.md)
164-
165-
> [!div class="nextstepaction"]
166-
> [View and manage alerts on the on-premises management console](legacy-central-management/how-to-work-with-alerts-on-premises-management-console.md)

articles/defender-for-iot/organizations/api/management-alert-apis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -257,7 +257,7 @@ The maintenance windows that define with the `maintenanceWindow` API appear in t
257257

258258

259259
> [!IMPORTANT]
260-
> This API is supported for maintenance purposes only and for a limited time period, and is not meant to be used instead of [alert exclusion rules](../how-to-accelerate-alert-incident-response.md#create-alert-exclusion-rules-on-an-on-premises-management-console). Use this API for one-time, temporary maintenance operations only.
260+
> This API is supported for maintenance purposes only and for a limited time period, and is not meant to be used instead of [alert exclusion rules](../how-to-accelerate-alert-incident-response.md#create-alert-exclusion-rules-on-an-ot-sensor). Use this API for one-time, temporary maintenance operations only.
261261
262262
**URI**: `/external/v1/maintenanceWindow`
263263

articles/defender-for-iot/organizations/appliance-catalog/virtual-sensor-hyper-v-gen-1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ This procedure describes how to create a virtual machine by using Hyper-V.
7676

7777
1. Select **BIOS**, in **Startup order** move **IDE** to the top of the list, select **Apply** and then select **OK**.
7878

79-
1. Connect the management console's ISO image to a virtual DVD drive.
79+
1. Connect the OT sensor's ISO image to a virtual DVD drive.
8080

8181
1. Start the virtual machine.
8282

articles/defender-for-iot/organizations/appliance-catalog/virtual-sensor-hyper-v.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ This procedure describes how to create a virtual machine by using Hyper-V.
7171

7272
1. Select **Firmware**, in **Boot order** move **DVD Drive** to the top of the list, select **Apply** and then select **OK**.
7373

74-
1. Connect the management console's ISO image to a virtual DVD drive.
74+
1. Connect the OT sensor's ISO image to a virtual DVD drive.
7575

7676
1. Start the virtual machine.
7777

0 commit comments

Comments
 (0)