Skip to content

Commit 8cea98c

Browse files
committed
edits
1 parent cacd3fd commit 8cea98c

File tree

4 files changed

+24
-19
lines changed

4 files changed

+24
-19
lines changed

articles/defender-for-iot/organizations/alerts.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -50,23 +50,22 @@ For more information, see:
5050

5151
Alert options also differ depending on your location and user role. For more information, see [Azure user roles and permissions](roles-azure.md) and [On-premises users and roles](roles-on-premises.md).
5252

53-
<!-- placing here for initial ease and finding - where should this really go?-->
54-
## Aggregated alerts / Alert grouping
53+
## Aggregating alerts
5554

56-
Alert fatigue caused by excessive number of identical alerts could lead to your team failing to see or remediate vital alerts. Alert grouping reduces the number of alerts reported by listing identical alert types that have the same parameters as one alert report. The matching parameters differ depending on the type of alert. For example, the alert *Unpermitted Usage of Modbus Function Code* needs to have the same source and destination IP addresses.
55+
Alert fatigue caused by excessive number of identical alerts could lead to your team failing to see or remediate vital alerts. Aggregating alerts reduces the number of alerts reported by listing identical alert types with the same parameter settings as one alert. The matching parameters differ depending on the type of alert. For example, the alert *Unpermitted Usage of Modbus Function Code* needs to have the same source and destination IP addresses.
5756

58-
The alert grouping includes alerts with different alert codes and these will be shown in the **Violations** tab of the alert details. The full list of alerts can be downloaded as a CSV file, displaying the relevant parameters and functions. Each set of aggregated alerts is remediated as a group using the **Learn** button and therefore the **Violations** feature only applies to alerts which have the same remediation process. Alerts can still be viewed individually within their respective devices.
57+
The aggregated alert includes alerts with different alert codes, such as read and write codes. You access this data in the **Violations** tab of the alert details where you download it as a CSV file that lists the relevant parameters and functions. You can then remediate the alert. Only alerts that have the same remediation process are grouped. Alerts can still be viewed individually within their respective devices.
5958

60-
The alerts that can be grouped are listed in the [Alert reference](alert-engine-messages.md) tables under the **Aggregated heading.
59+
The alerts that can be grouped are listed in the [Alert reference](alert-engine-messages.md) tables under the **Grouped** heading.
6160

62-
Alert grouping appears in both the OT sensor console and the Azure portal. For more information, see [alert grouping in Sensor console](how-to-view-alerts.md#remediate-aggregated-alerts) and [alert grouping in Azure portal](how-to-manage-cloud-alerts.md#remediate-aggregated-alerts)
61+
Alert grouping appears in both the OT sensor console and the Azure portal. For more information, see [remediate aggregated alerts in Sensor console](how-to-view-alerts.md#remediate-aggregated-alerts) and [remediate aggregated alerts in Azure portal](how-to-manage-cloud-alerts.md#remediate-aggregated-alerts).
6362

6463
## Focused alerts in OT/IT environments
6564

6665
Organizations where sensors are deployed between OT and IT networks deal with many alerts, related to both OT and IT traffic. The amount of alerts, some of which are irrelevant, can cause alert fatigue and affect overall performance. To address these challenges, Defender for IoT's detection policy steers its different [alert engines](alert-engine-messages.md#supported-alert-types) to focus on alerts with business impact and relevance to an OT network, and reduce low-value IT related alerts. For example, the **Unauthorized internet connectivity** alert is highly relevant in an OT network, but has relatively low value in an IT network.
6766

68-
To focus the alerts triggered in these environments, all alert engines, except for the *Malware* engine, trigger alerts only if they detect a related OT subnet or protocol.
69-
However, to maintain triggering of alerts that indicate critical scenarios:
67+
To focus the alerts triggered in these environments, all alert engines, except for the *Malware* engine, trigger alerts only if they detect a related OT subnet or protocol.
68+
However, to maintain triggering of alerts that indicate critical scenarios:
7069

7170
- The *Malware* engine triggers malware alerts regardless of whether the alerts are related to OT or IT devices.
7271
- The other engines include exceptions for critical scenarios. For example, the *Operational* engine triggers alerts related to sensor traffic, regardless of whether the alert is related to OT or IT traffic.
@@ -76,7 +75,7 @@ However, to maintain triggering of alerts that indicate critical scenarios:
7675
Users working in hybrid environments might be managing OT alerts in [Defender for IoT](https://portal.azure.com/#view/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/~/Getting_started) on the Azure portal, the OT sensor, and an on-premises management console.
7776

7877
> [!NOTE]
79-
> While the sensor console displays an alert's **Last detection** field in real-time, Defender for IoT in the Azure portal may take up to one hour to display the updated time. This explains a scenario where the last detection time in the sensor console isn't the same as the last detection time in the Azure portal.
78+
> While the sensor console displays an alert's **Last detection** field in real-time, Defender for IoT in the Azure portal may take up to one hour to display the updated time. This explains a scenario where the last detection time in the sensor console isn't the same as the last detection time in the Azure portal.
8079
8180
Alert statuses are otherwise fully synchronized between the Azure portal and the OT sensor, and between the sensor and the on-premises management console. This means that regardless of where you manage the alert in Defender for IoT, the alert is updated in other locations as well.
8281

articles/defender-for-iot/organizations/how-to-manage-cloud-alerts.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,12 +155,14 @@ To reduce alert fatigue, multiple versions of the same alert with identical para
155155
:::image type="content" source="media/how-to-manage-cloud-alerts/alert-details-aggregated.png" alt-text="Screenshot of the alerts detail pane showing the aggregated alerts message, the ViolationsCount and the Violations tab.":::
156156

157157
1. Select the **Violations** tab.
158+
158159
1. Export the data to a CSV file using the **Export** button. Open the file and examine the data. For example:
159160

160161
:::image type="content" source="media/how-to-manage-cloud-alerts/alert-details-aggregated-csv.png" alt-text="Screenshot of example data from the csv file containing the list of multiple alerts that make up the content of the aggregated alert listed in the alert detail pane.":::
161162

162163
1. Select the **Take action** tab. Follow the **Remediation steps**.
163-
1. Select the **Learn** button, if appropriate, so that Defender for IoT learns that this network activity doesn't need to create an alert item in the future.
164+
165+
1. Select **Learn**, if needed. For more information, see [learning an alert](alerts.md#alert-statuses-and-triaging-options).
164166

165167
## Next steps
166168

articles/defender-for-iot/organizations/how-to-view-alerts.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -182,15 +182,19 @@ For more information, see [Accelerating OT alert workflows](alerts.md#accelerati
182182
To reduce alert fatigue, multiple versions of the same alert with identical parameters are listed as one item in the Alerts inventory. As you investigate alerts, an aggregated alert is identified by the *Multiple violations* message that appears under the Source device IP. Use the **Violations** tab to investigate further and the **Take action** tab to remediate the alerts.
183183

184184
1. Sign into your OT sensor console and select the **Alerts** page on the left.
185-
1. For an Aggregated alert the *Multiple violations* message appears underneath the Source device IP address, and the **Violations** tab is displayed.
186185

187-
:::image type="content" source="media/how-to-manage-cloud-alerts/alert-details-aggregated.png" alt-text="Screenshot of the alerts detail pane showing the aggregated alerts message, the ViolationsCount and the Violations tab.":::
188-
<!-- change the image to one for an OT sensor -->
186+
1. For an Aggregated alert the *Multiple violations* message appears underneath the Source device IP address, and the **Violations** tab is displayed. <!-- add OT sensor image :::image type="content" source="media/how-to-manage-cloud-alerts/alert-details-aggregated.png" alt-text="Screenshot of the alerts detail pane showing the aggregated alerts message, the ViolationsCount and the Violations tab.":::-->
187+
189188
1. Select the **Violations** tab.
190-
1. An inventory table displays the first 10 alerts from this aggregated alert group. Export the data to a CSV file using the **Export** button. Open the file and examine the data.
189+
190+
An inventory table displays the first 10 alerts from this aggregated alert group.
191+
192+
1. Select **Export** to download the CSV data file. Open the file and examine the data.
193+
191194
1. Select the **Take action** tab. Follow the **Remediation steps**.
192-
1. Select the **Learn** button, if appropriate, so that Defender for IoT learns that this network activity doesn't need to create an alert item in the future.
193-
<!-- go over this with the OT sensor and data that shows this feature and check this is correct -->
195+
196+
1. Select **Learn**, if needed. For more information, see [learning an alert](alerts.md#alert-statuses-and-triaging-options).
197+
194198
## Next steps
195199

196200
> [!div class="nextstepaction"]

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,11 @@ Features released earlier than nine months ago are described in the [What's new
2222

2323
|Service area |Updates |
2424
|---------|---------|
25-
| **OT networks** | - [Group multiple alerts with the same parameters](#aggregate-group-multiple-alerts-with-the-same-parameters)|
25+
| **OT networks** | - [Aggregating multiple alerts with the same parameters](#aggregating-multiple-alerts-with-the-same-parameters)|
2626

27-
### Aggregate/ Group multiple alerts with the same parameters
27+
### Aggregating multiple alerts with the same parameters
2828

29-
To reduce alert fatigue, multiple versions of the same alert and with the same parameters are grouped together and listed in the alerts table as one item. The alert details lists the each of the identical alerts as **violations** and the appropriate remediation or Learn actions are listed. For more information, see [Group multiple alerts with the same parameters](alerts.md#aggregated-alerts--alert-grouping). <!-- fix this when the title is chosen -->
29+
To reduce alert fatigue, multiple versions of the same alert and with the same parameters are grouped together and listed in the alerts table as one item. The alert details lists the each of the identical alerts as **Violations** and the appropriate remediation actions are listed. For more information, see [aggregating alerts with the same parameters](alerts.md#aggregating-alerts).
3030

3131
## October 2024
3232

0 commit comments

Comments
 (0)