Skip to content

Commit 8ff1018

Browse files
committed
Merge branch 'asc-for-iot-master' of https://github.com/mlottner/azure-docs-pr into asc-for-iot-master
2 parents e7baeed + 58195c4 commit 8ff1018

15 files changed

+95
-72
lines changed

articles/asc-for-iot/architecture.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Azure Security Center for IoT is composed of the following components:
3535
Azure Security Center for IoT works in one of two feature workflows: Built-in and Enhanced
3636

3737
### Built-in
38-
In **Built-in** mode, Azure Security Center for IoT is enabled when you elect to turn on the **Security** option in your IoT Hub. Offering real-time monitoring, recommendations and alerts, Built-in mode offers singe-step device visibility and unmatched security. Built-in mode does not require agent installation on any devices and uses advanced analytics on logged activities to analyze and protect your device field.
38+
In **Built-in** mode, Azure Security Center for IoT is enabled when you elect to turn on the **Security** option in your IoT Hub. Offering real-time monitoring, recommendations and alerts, Built-in mode offers singe-step device visibility and unmatched security. Build-in mode does not require agent installation on any devices and uses advanced analytics on logged activities to analyze and protect your field device.
3939

4040
### Enhanced
4141
In **Enhanced** mode, after turning on the **Security** option in your IoT Hub and installing Azure Security Center for IoT device agents on your devices, the agents collect, aggregate and analyze raw security events from your devices. Raw security events can include IP connections, process creation, user logins, and other security-relevant information. Azure Security Center for IoT device agents also handle event aggregation to help avoid high network throughput. The agents are highly customizable, allowing you to use them for specific tasks, such as sending only important information at the fastest SLA, or for aggregating extensive security information and context into larger segments, avoiding higher service costs.
@@ -62,4 +62,3 @@ In this article, you learned about the basic architecture and workflow of Azure
6262
- [Enable security in IoT Hub](quickstart-onboard-iot-hub.md)
6363
- [Azure Security Center for IoT FAQ](resources-frequently-asked-questions.md)
6464
- [Azure Security Center for IoT security alerts](concept-security-alerts.md)
65-

articles/asc-for-iot/event-aggregation.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ Aggregation is currently available for the following types of events:
3333
* ProcessTerminate (Windows only)
3434

3535
## How does event aggregation work?
36-
When event aggregation is left **On**, Azure Security Center for IoT agents aggregates events for the interval period or time window.
36+
When event aggregation is left **On**, Azure Security Center for IoT agents aggregate events for the interval period or time window.
3737
Once the interval period has passed, the agent sends the aggregated events to the Azure cloud for further analysis.
38-
Each security agent stores the events in the agent memory for the time period before sending them to the Azure cloud.
38+
The aggregated events are stored in memory until being sent to the Azure cloud.
3939

40-
To reduce the memory load on the agent memory, whenever the agent collects an identical event to one that is already being kept in memory, the agent increases the hit count of this specific event. When the time window passes, the agent sends the hit count of each specific type of event that occurred. Event aggregation is simply the aggregation of the hit counts of each collected type of event.
40+
To reduce the memory footprint of the agent, whenever the agent collects an identical event to one that is already being kept in memory, the agent increases the hit count of this specific event. When the aggregation time window passes, the agent sends the hit count of each specific type of event that occurred. Event aggregation is simply the aggregation of the hit counts of each collected type of event.
4141

4242
Events are considered identical only when the following conditions are met:
4343

@@ -92,4 +92,4 @@ To continue getting started with Azure Security Center for IoT deployment, use t
9292
- Select and deploy a [security agent](how-to-deploy-agent.md)
9393
- Review Azure Security Center for IoT [service prerequisites](service-prerequisites.md)
9494
- Learn how to [Enable Azure Security Center for IoT service in your IoT Hub](quickstart-onboard-iot-hub.md)
95-
- Learn more about the service from the [Azure Security Center for IoT FAQ](resources-frequently-asked-questions.md)
95+
- Learn more about the service from the [Azure Security Center for IoT FAQ](resources-frequently-asked-questions.md)

articles/asc-for-iot/getting-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,14 @@ ms.author: mlottner
2020
---
2121
# Get started with Azure Security Center for IoT
2222

23-
This article provides an explanation of the different building blocks of the Azure Security Center for IoT service and explains how to get started with the service using either deployment option.
23+
This article provides an explanation of the different building blocks of the Azure Security Center for IoT service and explains how to get started with the service using two possible deployment options.
2424

2525
## Deployment options
2626

2727
Choose the service scenario that best meets your IoT device and environment requirements.
2828

2929
### Built-in deployment
30-
Using the seamless, built-in deployment option, Azure Security Center for IoT can be quickly integrated into your IoT Hub and provide security analysis of IoT hub configuration, device identity and management, and hub-device communication patterns.
30+
Using the seamless, built-in deployment option, Azure Security Center for IoT can be quickly integrated into your IoT Hub and provide security analysis of the IoT hub configuration, device identity and management, and hub-device communication patterns.
3131

3232
* Start a [Built-in deployment](iot-hub-integration.md) featuring IoT Hub monitoring and recommendations.
3333
<br>

articles/asc-for-iot/how-to-deploy-edge.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Use the following steps to deploy an Azure Security Center for IoT security modu
4040

4141
- In your IoT Hub, make sure your device is [registered as an IoT Edge device](https://docs.microsoft.com/azure/iot-edge/how-to-register-device-portal).
4242

43-
- Azure Security Center for IoT Edge module requires [AuditD framework](https://linux.die.net/man/8/auditd) is installed on the IoT Edge device.
43+
- Azure Security Center for IoT Edge module requires the [AuditD framework](https://linux.die.net/man/8/auditd) be installed on the IoT Edge device.
4444

4545
- Install the framework by running the following command on your IoT Edge device:
4646

@@ -54,7 +54,7 @@ Use the following steps to deploy an Azure Security Center for IoT security modu
5454

5555
### Deployment using Azure portal
5656

57-
1. From Azure portal, open **Marketplace**.
57+
1. From the Azure portal, open **Marketplace**.
5858

5959
1. Select **Internet of Things**, then search for **Azure Security Center for IoT** and select it.
6060

@@ -105,9 +105,6 @@ There are three steps to create an IoT Edge deployment for Azure Security Center
105105
1. Click **Save**.
106106
1. Scroll to the bottom of the tab and select **Configure advanced Edge Runtime settings**.
107107

108-
>[!Note]
109-
> Do **not** disable AMQP communication for the IoT Edge Hub.
110-
> Azure Security Center for IoT module requires AMQP communication with the IoT Edge Hub.
111108

112109
1. Change the **Image** under **Edge Hub** to **mcr.microsoft.com/ascforiot/edgehub:1.0.9-preview**.
113110

@@ -136,14 +133,14 @@ There are three steps to create an IoT Edge deployment for Azure Security Center
136133
#### Step 2: Specify Routes
137134

138135
1. In the **Specify Routes** tab, make sure you have a route (explicit or implicit) that will forward messages from the **azureiotsecurity** module to **$upstream**, then click Next.
139-
```c#
140-
// Default implicit route
136+
137+
~~~Default implicit route
141138
"route": "FROM /messages/* INTO $upstream
142-
```
143-
```c#
144-
// Explicit route
139+
~~~
140+
141+
~~~Explicit route
145142
"ASCForIoTRoute": "FROM /messages/modules/azureiotsecurity/* INTO $upstream
146-
```
143+
~~~
147144

148145
#### Step 3: Review Deployment
149146

@@ -175,7 +172,7 @@ If you encounter an issue, container logs are the best way to learn about the st
175172

176173
`sudo docker logs azureiotsecurity`
177174

178-
1. For more verbose logs, add the following environment variable to **azureiotsecurity** module deployment: `logLevel=Debug`.
175+
1. For more verbose logs, add the following environment variable to the **azureiotsecurity** module deployment: `logLevel=Debug`.
179176

180177
## Next steps
181178

articles/asc-for-iot/how-to-investigate-device.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.author: mlottner
2121

2222
# Investigate a suspicious IoT device
2323

24-
Azure Security Center for IoT service alerts and evidence provide clear indications when IoT devices are suspected of involvement in suspicious activities or when indications exist that a device is compromised.
24+
Azure Security Center for IoT service alerts provide clear indications when IoT devices are suspected of involvement in suspicious activities or when indications exist that a device is compromised.
2525

2626
In this guide, use the investigation suggestions provided to help determine the potential risks to your organization, decide how to remediate, and discover the best ways to prevent similar attacks in the future.
2727

@@ -34,7 +34,7 @@ In this guide, use the investigation suggestions provided to help determine the
3434

3535
By default, Azure Security Center for IoT stores your security alerts and recommendations in your Log Analytics workspace. You can also choose to store your raw security data.
3636

37-
To locate the your Log Analytics workspace for data storage:
37+
To locate your Log Analytics workspace for data storage:
3838

3939
1. Open your IoT hub,
4040
1. Under **Security**, click **Overview**, and then select **Settings**.
@@ -49,9 +49,9 @@ Following configuration, do the following to access data stored in your Log Anal
4949

5050
## Investigation steps for suspicious IoT devices
5151

52-
To access insights and raw data about your IoT devices, go to your Log Analytics workspace [to access your data](#how-can-i-access-my-data).
52+
To view insights and raw data about your IoT devices, go to your Log Analytics workspace [to access your data](#how-can-i-access-my-data).
5353

54-
Check and investigate the device data for the following details and activities using the following kql queries.
54+
See the sample kql queries below to get started with investigating alerts and activities on your device.
5555

5656
### Related alerts
5757

@@ -84,7 +84,7 @@ To find out which users have access to this device use the following kql query:
8484
~~~
8585
Use this data to discover:
8686
1. Which users have access to the device?
87-
2. Do the users with access have the permission levels as expected?
87+
2. Do the users with access have the expected permission levels?
8888

8989
### Open ports
9090

@@ -108,14 +108,14 @@ To find out which ports in the device are currently in use or were used, use the
108108
| summarize MinObservedTime=min(TimestampLocal), MaxObservedTime=max(TimestampLocal), AllowedRemoteIPAddress=makeset(RemoteAddress), AllowedRemotePort=makeset(RemotePort) by Protocol, LocalPort
109109
~~~
110110

111-
Use this data to discover:
111+
Use this data to discover:
112112
1. Which listening sockets are currently active on the device?
113113
2. Should the listening sockets that are currently active be allowed?
114114
3. Are there any suspicious remote addresses connected to the device?
115115

116116
### User logins
117117

118-
To find out users that logged into the device use the following kql query:
118+
To find users that logged into the device use the following kql query:
119119

120120
~~~
121121
let device = "YOUR_DEVICE_ID";
@@ -139,7 +139,7 @@ To find out users that logged into the device use the following kql query:
139139
| summarize CntLoginAttempts=count(), MinObservedTime=min(TimestampLocal), MaxObservedTime=max(TimestampLocal), CntIPAddress=dcount(RemoteAddress), IPAddress=makeset(RemoteAddress) by UserName, Result, LoginHandler
140140
~~~
141141

142-
Use the query results to discover:
142+
Use the query results to discover:
143143
1. Which users logged in to the device?
144144
2. Are the users that logged in, supposed to log in?
145145
3. Did the users that logged in connect from expected or unexpected IP addresses?
@@ -175,12 +175,12 @@ To find out if the process list is as expected, use the following kql query:
175175
| summarize CntExecutions=count(), MinObservedTime=min(TimestampLocal), MaxObservedTime=max(TimestampLocal), ExecutingUsers=makeset(UserIdName), ExecutionCommandLines=makeset(CommandLine) by Executable
176176
~~~
177177

178-
Use the query results to discover:
178+
Use the query results to discover:
179179

180180
1. Were there any suspicious processes running on the device?
181181
2. Were processes executed by appropriate users?
182182
3. Did any command line executions contain the correct and expected arguments?
183183

184184
## Next steps
185185

186-
After investigating a device, and gaining a better understanding of your risks, you may want to consider [Configuring custom alerts](quickstart-create-custom-alerts.md) to improve your IoT solution security posture. If you don't already have a device agent, consider [Deploying a security agent](how-to-deploy-agent.md) or [changing the configuration of an existing device agent](how-to-agent-configuration.md) to improve your results.
186+
After investigating a device, and gaining a better understanding of your risks, you may want to consider [Configuring custom alerts](quickstart-create-custom-alerts.md) to improve your IoT solution security posture. If you don't already have a device agent, consider [Deploying a security agent](how-to-deploy-agent.md) or [changing the configuration of an existing device agent](how-to-agent-configuration.md) to improve your results.

articles/asc-for-iot/how-to-security-data-access.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,10 @@ Azure Security Center for IoT stores security alerts, recommendations, and raw s
2828
To configure which Log Analytics workspace is used:
2929

3030
1. Open your IoT hub.
31-
1. Click **Security**
31+
1. Click the **Overview** blade under the **Security** section
3232
2. Click **Settings**, and change your Log Analytics workspace configuration.
3333

34-
To access your Log Analytics workspace after configuration:
34+
To access your alerts and recommendations in your Log Analytics workspace after configuration:
3535

3636
1. Choose an alert or recommendation in Azure Security Center for IoT.
3737
2. Click **further investigation**, then click **To see which devices have this alert click here and view the DeviceId column**.
@@ -71,10 +71,10 @@ SecurityAlert
7171

7272
### Device summary
7373

74-
Select the number of distinct security alerts detected last week by IoT Hub, device, alert severity, alert type.
74+
Get the number of distinct security alerts detected in the last week, grouped by IoT Hub, device, alert severity, alert type.
7575

7676
```
77-
// Select number of distinct security alerts detected last week by
77+
// Get the number of distinct security alerts detected in the last week, grouped by
7878
// IoT hub, device, alert severity, alert type
7979
//
8080
SecurityAlert
@@ -150,10 +150,10 @@ SecurityRecommendation
150150

151151
### Device summary
152152

153-
Select the number of distinct active security recommendations by IoT Hub, device, recommendation severity, and type.
153+
Get the number of distinct active security recommendations, grouped by IoT Hub, device, recommendation severity, and type.
154154

155155
```
156-
// Select number of distinct active security recommendations by
156+
// Get the number of distinct active security recommendations, grouped by by
157157
// IoT hub, device, recommendation severity and type
158158
//
159159
SecurityRecommendation
@@ -176,4 +176,4 @@ SecurityRecommendation
176176
- Read the Azure Security Center for IoT [Overview](overview.md)
177177
- Learn about Azure Security Center for IoT [Architecture](architecture.md)
178178
- Understand and explore [Azure Security Center for IoT alerts](concept-security-alerts.md)
179-
- Understand and explore [Azure Security Center for IoT recommendation](concept-recommendations.md)
179+
- Understand and explore [Azure Security Center for IoT recommendation](concept-recommendations.md)

articles/asc-for-iot/how-to-send-security-messages.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.author: mlottner
2121

2222
# Send security messages SDK
2323

24-
This how-to guide explains Azure Security Center for IoT service capabilities when you choose to collect and send your device security messages without using an Azure Security Center for IoT agent, and explains how to do so.
24+
This how-to guide explains the Azure Security Center for IoT service capabilities when you choose to collect and send your device security messages without using an Azure Security Center for IoT agent, and explains how to do so.
2525

2626
In this guide, you learn how to:
2727
> [!div class="checklist"]
@@ -42,7 +42,7 @@ Azure Security Center for IoT defines a security message using the following cri
4242
Each security message includes the metadata of the sender such as `AgentId`, `AgentVersion`, `MessageSchemaVersion` and a list of security events.
4343
The schema defines the valid and required properties of the security message including the types of events.
4444

45-
[!NOTE]
45+
>[!Note]
4646
> Messages sent that do not comply with the schema are ignored. Make sure to verify the schema before initiating sending data as ignored messages are not currently stored.
4747
> Messages sent that were not set as a security message using the Azure IoT C/C# SDK will not be routed to the Azure Security Center for IoT pipeline
4848
@@ -84,7 +84,7 @@ Once set as a security message and sent, this message will be processed by Azure
8484

8585
Send security messages without using the Azure Security Center for IoT agent, by using the [Azure IoT C# device SDK](https://github.com/Azure/azure-iot-sdk-csharp/tree/preview) or [Azure IoT C device SDK](https://github.com/Azure/azure-iot-sdk-c/tree/public-preview).
8686

87-
To send the device data from your devices for processing by Azure Security Center for IoT, use one of the following APIs to mark messages for correct routing to Azure Security Center for IoT processing pipeline. Messages sent this way will be processed and displayed as security insights within Azure Security Center for IoT within both IoT Hub or within Azure Security Center.
87+
To send the device data from your devices for processing by Azure Security Center for IoT, use one of the following APIs to mark messages for correct routing to Azure Security Center for IoT processing pipeline.
8888

8989
All data that is sent, even if marked with the correct header, must also comply with the [Azure Security Center for IoT message schema](https://aka.ms/iot-security-schemas).
9090

articles/asc-for-iot/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,11 @@ Azure Security Center for IoT simplifies hybrid workload protection by deliverin
3232

3333
### Unified visibility and control
3434

35-
Get a unified view of security across all of your on-premises and cloud workloads, including your Azure IoT solution. Automatically discover and onboard new devices and apply security policies across your workloads (Leaf devices, Edge devices, IOT Hub) to ensure compliance with security standards.
35+
Get a unified view of security across all of your on-premises and cloud workloads, including your Azure IoT solution. Automatically discover and onboard new devices and apply security policies across your workloads (Leaf devices, Edge devices, IoT Hub) to ensure compliance with security standards.
3636

3737
### Adaptive threat prevention
3838

39-
Use Azure Security Center for IoT to continuously monitor the security of machines, networks, and Azure services, including your Azure IoT solution from edge devices to applications. You can choose to use from hundreds of built-in security assessments or create your own in the central Azure Security Center for IoT Hub dashboard. Optimize your security settings and improve your security score with actionable recommendations across virtual machines, networks, apps and data. With newly added IoT capabilities, you can now reduce attack surface for your Azure IoT solution and remediate issues before they can be exploited.
39+
Use Azure Security Center for IoT to continuously monitor the security of machines, networks, and Azure services, including your Azure IoT solution from edge devices to applications. You can choose from hundreds of built-in security assessments or create your own in the central Azure Security Center for IoT Hub dashboard. Optimize your security settings and improve your security score with actionable recommendations across virtual machines, networks, apps and data. With newly added IoT capabilities, you can now reduce the attack surface for your Azure IoT solution and remediate issues before they can be exploited.
4040

4141
### Intelligent threat detection and response
4242

0 commit comments

Comments
 (0)