You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-set-up-your-network.md
+68-43Lines changed: 68 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,23 @@
1
1
---
2
2
title: Set up your network
3
3
description: Learn about solution architecture, network preparation, prerequisites, and other information needed to ensure that you successfully set up your network to work with Azure Defender for IoT appliances.
4
-
ms.date: 07/25/2021
4
+
ms.date: 11/07/2021
5
5
ms.topic: how-to
6
6
---
7
7
8
8
# About Azure Defender for IoT network setup
9
9
10
10
Azure Defender for IoT delivers continuous ICS threat monitoring and device discovery. The platform includes the following components:
11
11
12
-
**Defender for IoT sensors:** Sensors collect ICS network traffic by using passive (agentless) monitoring. Passive and nonintrusive, the sensors have zero performance impact on OT and IoT networks and devices. The sensor connects to a SPAN port or network TAP and immediately begins monitoring your network. Detections are displayed in the sensor console. There, you can view, investigate, and analyze them in a network map, a device inventory, and an extensive range of reports. Examples include risk assessment reports, data mining queries, and attack vectors.
12
+
**Defender for IoT sensors:** Sensors collect ICS network traffic by using passive (agentless) monitoring. Passive and nonintrusive, the sensors have zero performance impact on OT and IoT networks and devices. The sensor connects to a SPAN port or network TAP and immediately begins monitoring your network. Detections are displayed in the sensor console. There, you can view, investigate, and analyze them in a network map, a device inventory, and an extensive range of reports. Examples include risk assessment reports, data mining queries, and attack vectors.
13
13
14
-
**Defender for IoT on-premises management console**: The on-premises management console provides a consolidated view of all network devices. It delivers a real-time view of key OT and IoT risk indicators and alerts across all your facilities. Tightly integrated with your SOC workflows and playbooks, it enables easy prioritization of mitigation activities and cross-site correlation of threats.
14
+
**Defender for IoT on-premises management console**: The on-premises management console provides a consolidated view of all network devices. It delivers a real-time view of key OT and IoT risk indicators and alerts across all your facilities. Tightly integrated with your SOC workflows and playbooks, it enables easy prioritization of mitigation activities and cross-site correlation of threats.
15
15
16
-
**Defender for IoT portal:** The Defender for IoT application can help you purchase solution appliances, install and update software, and update TI packages.
16
+
**Defender for IoT portal:** The Defender for IoT application can help you purchase solution appliances, install and update software, and update TI packages.
17
17
18
18
This article provides information about solution architecture, network preparation, prerequisites, and more to help you successfully set up your network to work with Defender for IoT appliances. Readers working with the information in this article should be experienced in operating and managing OT and IoT networks. Examples include automation engineers, plant managers, OT network infrastructure service providers, cybersecurity teams, CISOs, or CIOs.
19
19
20
-
For assistance or support, contact [Microsoft Support](https://support.microsoft.com/en-us/supportforbusiness/productselection?sapId=82c88f35-1b8e-f274-ec11-c6efdd6dd099).
20
+
For assistance or support, contact [Microsoft Support](https://support.microsoft.com/supportforbusiness/productselection?sapId=82c88f35-1b8e-f274-ec11-c6efdd6dd099).
21
21
22
22
## On-site deployment tasks
23
23
@@ -87,7 +87,7 @@ The following browsers are supported for the sensors and on-premises management
87
87
88
88
- Firefox (latest version)
89
89
90
-
For more information on supported browsers, see [Recommended browsers](../../azure-portal/azure-portal-supported-browsers-devices.md#recommended-browsers).
90
+
For more information on supported browsers, see [recommended browsers](../../azure-portal/azure-portal-supported-browsers-devices.md#recommended-browsers).
91
91
92
92
### Set up certificates
93
93
@@ -97,22 +97,42 @@ Following sensor and on-premises management console installation, a local self-s
97
97
98
98
Verify that your organizational security policy allows access to the following:
99
99
100
+
#### User access to the sensor and management console
101
+
102
+
| Protocol | Transport | In/Out | Port | Used | Purpose | Source | Destination |
103
+
|--|--|--|--|--|--|--|--|
104
+
| HTTPS | TCP | In/Out | 443 | To access the sensor, and on-premises management console web console. | Access to Web console | Client | Sensor and on-premises management console |
105
+
| SSH | TCP | In/Out | 22 | CLI | To access the CLI. | Client | Sensor and on-premises management console |
106
+
107
+
#### Sensor access to Azure portal
108
+
109
+
| Protocol | Transport | In/Out | Port | Used | Purpose | Source | Destination |
110
+
|--|--|--|--|--|--|--|--|
111
+
| HTTPS / Websocket | TCP | In/Out | 443 | Gives the sensor access to the Azure portal. (Optional) Access can be granted through a proxy. | Access to Azure portal | Sensor | Azure portal |
112
+
113
+
#### Sensor access to the on-premises management console
114
+
115
+
| Protocol | Transport | In/Out | Port | Used | Purpose | Source | Destination |
116
+
|--|--|--|--|--|--|--|--|
117
+
| SSL | TCP | In/Out | 443 | Give the sensor access to the on-premises management console. | The connection between the sensor, and the on-premises management console | Sensor | On-premises management console |
118
+
| NTP | UDP | In/Out | 123 | Time Sync | Connects the NTP to the on-premises management console. | Sensor | On-premises management console |
119
+
120
+
#### Additional firewall rules for external services (optional)
121
+
122
+
Open these ports to allow extra services for Defender for IoT.
123
+
100
124
| Protocol | Transport | In/Out | Port | Used | Purpose | Source | Destination |
101
125
|--|--|--|--|--|--|--|--|
102
-
| HTTPS | TCP | IN/OUT | 443 | Sensor and On-Premises Management Console Web Console | Access to Web console | Client | Sensor and on-premises management console |
103
-
| SSH | TCP | IN/OUT | 22 | CLI | Access to the CLI | Client | Sensor and on-premises management console |
104
-
| SSL | TCP | IN/OUT | 443 | Sensor and on-premises management console | Connection Between CyberX platform and the Central Management platform | sensor | On-premises management console |
105
-
| NTP | UDP | IN | 123 | Time Sync | On-premises management console use as NTP to sensor | sensor | on-premises management console |
106
-
| NTP | UDP | IN/OUT | 123 | Time Sync | Sensor connected to external NTP server, when there is no on-premises management console installed | sensor | NTP |
107
-
| SMTP | TCP | OUT | 25 | Email | The connection between CyberX platform and the Management platform and the mail server | Sensor and On-premises management console | Email server |
108
-
| Syslog | UDP | OUT | 514 | LEEF | Logs that send from the on-premises management console to Syslog server | On-premises management console and Sensor | Syslog server |
109
-
| DNS || IN/OUT | 53 | DNS | DNS Server Port | On-premises management console and Sensor | DNS server |
110
-
| LDAP | TCP | IN/OUT | 389 | Active Directory | The connection between CyberX platform and the Management platform to the Active Directory | On-premises management console and Sensor | LDAP server |
111
-
| LDAPS | TCP | IN/OUT | 636 | Active Directory | The connection between CyberX platform and the Management platform to the Active Directory | On-premises management console and Sensor | LDAPS server |
112
-
| SNMP | UDP | OUT | 161 | Monitoring | Remote SNMP collectors. | On-premises management console and Sensor | SNMP server |
113
-
| WMI | UDP | OUT | 135 | monitoring | Windows Endpoint Monitoring | Sensor | Relevant network element |
114
-
| Tunneling | TCP | IN | 9000 <br /><br />- on top of port 443 <br /><br />From end user to the on-premises management console. <br /><br />- Port 22 from sensor to the on-premises management console | monitoring | Tunneling | Sensor | On-premises management console |
115
-
| HTTP| TCP | OUT | 80 | Certificate validation | Download CRL file | Sensor | CRL server |
126
+
| HTTP | TCP | Out | 80 | The CRL download for certificate validation when uploading certificates. | Access to the CRL server | Sensor and on-premises management console | CRL server |
127
+
| LDAP | TCP | In/Out | 389 | Active Directory | Allows Active Directory management of users that have access, to log in to the system. | On-premises management console and Sensor | LDAP server |
128
+
| LDAPS | TCP | In/Out | 636 | Active Directory | Allows Active Directory management of users that have access, to log in to the system. | On-premises management console and Sensor | LDAPS server |
129
+
|[SNMP](how-to-set-up-snmp-mib-monitoring.md)| UDP | Out | 161 | Monitoring | Monitors the sensor's health. | On-premises management console and Sensor | SNMP server |
130
+
| SMTP | TCP | Out | 25 | Email | Used to open the customer's mail server, in order to send emails for alerts, and events. | Sensor and On-premises management console | Email server |
131
+
| Syslog | UDP | Out | 514 | LEEF | The logs that are sent from the on-premises management console to Syslog server. | On-premises management console and Sensor | Syslog server |
132
+
| DNS | TCP/UDP | In/Out | 53 | DNS | The DNS server port. | On-premises management console and Sensor | DNS server |
133
+
|[WMI](how-to-configure-windows-endpoint-monitoring.md)| TCP/UDP | Out | 135, 1025-65535 | Monitoring | Windows Endpoint Monitoring. | Sensor | Relevant network element |
134
+
| Tunneling | TCP | In | 9000 </br></br> in addition to port 443 </br></br> Allows access from the sensor, or end user, to the on-premises management console. </br></br> Port 22 from the sensor to the on-premises management console. | Monitoring | Tunneling | Sensor | On-premises management console |
135
+
| Proxy | TCP/UDP | In/Out | 443 | Proxy | To connect the sensor to a proxy server | On-premises management console and Sensor | Proxy server |
116
136
117
137
### Plan rack installation
118
138
@@ -123,10 +143,15 @@ To plan your rack installation:
123
143
1. Allocate the rack space for the appliance.
124
144
125
145
1. Have AC power available for the appliance.
146
+
126
147
1. Prepare the LAN cable for connecting the management to the network switch.
127
-
1. Prepare the LAN cables for connecting switch SPAN (mirror) ports and or network taps to the Defender for IoT appliance.
148
+
149
+
1. Prepare the LAN cables for connecting switch SPAN (mirror) ports, and network taps to the Defender for IoT appliance.
150
+
128
151
1. Configure, connect, and validate SPAN ports in the mirrored switches as described in the architecture review session.
152
+
129
153
1. Connect the configured SPAN port to a computer running Wireshark and verify that the port is configured correctly.
154
+
130
155
1. Open all the relevant firewall ports.
131
156
132
157
## About passive network monitoring
@@ -359,7 +384,7 @@ An active or passive aggregation TAP is installed inline to the network cable. I
359
384
360
385
The terminal access point (TAP) is a hardware device that allows network traffic to flow from port A to port B, and from port B to port A, without interruption. It creates an exact copy of both sides of the traffic flow, continuously, without compromising network integrity. Some TAPs aggregate transmit and receive traffic by using switch settings if desired. If aggregation is not supported, each TAP uses two sensor ports to monitor send and receive traffic.
361
386
362
-
TAPs are advantageous for various reasons. They're hardware-based and can't be compromised. They pass all traffic, even damaged messages, which switches often drop. They're not processor sensitive, so packet timing is exact where switches handle the mirror function as a low-priority task that can affect the timing of the mirrored packets. For forensic purposes, a TAP is the best device.
387
+
TAPs are advantageous for various reasons. They're hardware-based and can't be compromised. They pass all traffic, even damaged messages, which the switches often drop. They're not processor sensitive, so packet timing is exact where switches handle the mirror function as a low-priority task that can affect the timing of the mirrored packets. For forensic purposes, a TAP is the best device.
363
388
364
389
TAP aggregators can also be used for port monitoring. These devices are processor-based and are not as intrinsically secure as hardware TAPs. They might not reflect exact packet timing.
365
390
@@ -553,7 +578,7 @@ Review this list before site deployment:
553
578
| 13 | Rack and cable the appliances. | ☐ ||
554
579
| 14 | Allocate site resources to support deployment. | ☐ ||
555
580
| 15 | Create Active Directory groups or local users. | ☐ ||
556
-
| 16 | Set-up training (self-learning). | ☐ ||
581
+
| 16 | Setup training (self-learning). | ☐ ||
557
582
| 17 | Go or no-go. | ☐ ||
558
583
| 18 | Schedule the deployment date. | ☐ ||
559
584
@@ -568,7 +593,7 @@ Review this list before site deployment:
568
593
569
594
An overview of the industrial network diagram will allow you to define the proper location for the Defender for IoT equipment.
570
595
571
-
1.**Global network diagram** - View a global network diagram of the industrial OT environment. For example:
596
+
1.**Global network diagram** - View a global network diagram of the industrial OT environment. For example:
572
597
573
598
:::image type="content" source="media/how-to-set-up-your-network/backbone-switch.png" alt-text="Diagram of the industrial OT environment for the global network.":::
574
599
@@ -577,7 +602,7 @@ An overview of the industrial network diagram will allow you to define the prope
577
602
578
603
1.**Committed devices** - Provide the approximate number of network devices that will be monitored. You will need this information when onboarding your subscription to the Azure Defender for IoT portal. During the onboarding process, you will be prompted to enter the number of devices in increments of 1000.
579
604
580
-
1.**(Optional) Subnet list** - Provide a subnet list for the production networks and a description (optional).
605
+
1.**(Optional) Subnet list** - Provide a subnet list for the production networks and a description (optional).
581
606
582
607
|**#**|**Subnet name**|**Description**|
583
608
|--| --------------- | --------------- |
@@ -617,25 +642,25 @@ An overview of the industrial network diagram will allow you to define the prope
617
642
- Rockwell automation – Ethernet or IP
618
643
619
644
- Emerson – DeltaV, Ovation
620
-
621
-
1.**Serial connection** - Are there devices that communicate via a serial connection in the network? Yes or No
622
645
623
-
If yes, specify which serial communication protocol: ________________
646
+
1.**Serial connection** - Are there devices that communicate via a serial connection in the network? Yes or No
647
+
648
+
If yes, specify which serial communication protocol: ________________
624
649
625
-
If yes, mark on the network diagram what devices communicate with serial protocols, and where they are:
626
-
627
-
*Add your network diagram with marked serial connection*
650
+
If yes, mark on the network diagram what devices communicate with serial protocols, and where they are:
628
651
629
-
1.**Quality of Service** - For Quality of Service (QoS), the default setting of the sensor is 1.5 Mbps. Specify if you want to change it: ________________
652
+
*Add your network diagram with marked serial connection*
630
653
631
-
Business unit (BU): ________________
654
+
1.**Quality of Service** - For Quality of Service (QoS), the default setting of the sensor is 1.5 Mbps. Specify if you want to change it: ________________
632
655
633
-
1.**Sensor** - Specifications for site equipment
656
+
Business unit (BU): ________________
657
+
658
+
1.**Sensor** - Specifications for site equipment
634
659
635
660
The sensor appliance is connected to switch SPAN port through a network adapter. It's connected to the customer's corporate network for management through another dedicated network adapter.
636
-
637
-
Provide address details for the sensor NIC that will be connected in the corporate network:
638
-
661
+
662
+
Provide address details for the sensor NIC that will be connected in the corporate network:
Are you planning to use an SSL certificate? Yes or No
681
-
706
+
682
707
If yes, what service will you use to generate it? What attributes will you include in the certificate (for example, domain or IP address)?
683
708
684
709
1.**SMTP authentication**
685
710
686
711
Are you planning to use SMTP to forward alerts to an email server? Yes or No
687
-
712
+
688
713
If yes, what authentication method you will use?
689
-
714
+
690
715
1.**Active Directory or local users**
691
716
692
-
Contact an Active Directory administrator to create an Active Directory site user group or create local users. Be sure to have your users ready for the deployment day.
717
+
Contact an Active Directory administrator to create an Active Directory site user group or create local users. Be sure to have your users ready for the deployment day.
0 commit comments