Skip to content

Commit 9603022

Browse files
authored
Merge pull request #232606 from batamig/cm-validation
cm install validation
2 parents b8e9d27 + 2128993 commit 9603022

File tree

4 files changed

+39
-36
lines changed

4 files changed

+39
-36
lines changed
75.8 KB
Loading
207 KB
Loading

articles/defender-for-iot/organizations/ot-deploy/install-software-on-premises-management-console.md

Lines changed: 29 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Install Microsoft Defender for IoT on-premises management console software - Microsoft Defender for IoT
33
description: Learn how to install Microsoft Defender for IoT on-premises management console software. Use this article if you're reinstalling software on a pre-configured appliance, or if you've chosen to install software on your own appliances.
4-
ms.date: 12/13/2022
4+
ms.date: 04/18/2023
55
ms.topic: install-set-up-deploy
66
---
77

@@ -58,39 +58,51 @@ The installation process takes about 20 minutes. After the installation, the sys
5858

5959
- **Virtual mount** – use iLO for HPE appliances, or iDRAC for Dell appliances to boot the ISO file.
6060

61-
1. Select your preferred language for the installation process. For example:
61+
1. The initial console window lists installation languages. Select the language you want to use. For example:
6262

6363
:::image type="content" source="../media/tutorial-install-components/on-prem-language-select.png" alt-text="Screenshot of selecting your preferred language for the installation process.":::
6464

65-
1. From the options displayed, select the management release you want to install based on the hardware profile you're using.
65+
1. The console lists a series of installation options. Select the option that best matches your requirements.
6666

67-
1. Define the following network properties as prompted:
67+
The installation wizard starts running. This step takes several minutes to complete, and includes system reboots.
6868

69-
- For the **Configure management network interface** prompt: For Dell appliances, enter `eth0` and `eth1`. For HP appliances, enter `enu1` and `enu2`, or `possible value`.
69+
When complete, a screen similar to the following appears, prompting you to enter your management interface:
7070

71-
- For the **Configure management network IP address**, **Configure subnet mask**, **Configure DNS**, and **Configure default gateway IP address** prompts, enter the relevant values for each item.
71+
:::image type="content" source="../media/tutorial-install-components/on-prem-first-steps-install.png" alt-text="Screenshot of the management interface prompt.":::
7272

73-
1. **(Optional)** To install a secondary Network Interface Card (NIC), define a hardware profile, and network properties as prompted.
73+
1. At each prompt, enter the following values:
7474

75-
For the **Configure sensor monitoring interface**, enter `eth1` or `possible value`. For other prompts, enter the relevant values for each item.
75+
|Prompt |Value |
76+
|---------|---------|
77+
|`configure management network interface` | Enter your management interface. For the following appliances, enter specific values:<br><br> - **Dell**: Enter `eth0, eth1`<br> - **HP**: Enter `enu1, enu2` <br><br> Other appliances may have different options. |
78+
|`configure management network IP address` | Enter the on-premises management console's IP address. |
79+
|`configure subnet mask` | Enter the on-premises management console's subnet mask address. |
80+
|`configure DNS` | Enter the on-premises management console's DNS address. |
81+
|`configure default gateway IP address` | Enter the IP address for the on-premises management console's default gateway. |
7682

77-
For example:
83+
1. (Optional) Enhance security to your on-premises management console by adding a secondary NIC dedicated for attached sensors within an IP address range. When you use a secondary NIC, the first is dedicated for end-users, and the secondary supports the configuration of a gateway for routed networks.
7884

79-
:::image type="content" source="../media/tutorial-install-components/on-prem-secondary-nic-install.png" alt-text="Screenshot that shows the Secondary NIC install questions.":::
85+
If you're installing a secondary Network Interface Card (NIC), enter the following details for the sensor's monitoring interface as prompted:
8086

81-
If you choose not to install the secondary NIC now, you can [do so at a later time](../how-to-manage-the-on-premises-management-console.md#add-a-secondary-nic-after-installation).
87+
| Prompt |Value |
88+
|---------|---------|
89+
|`configure sensor monitoring interface` | Enter `eth1` or another value as needed for your system. |
90+
|`configure an IP address for the sensor monitoring interface` | Enter the secondary NIC's IP address |
91+
|`configure a subnet mask for the sensor monitoring interface` | Enter the secondary NIC's subnet mask address. |
8292

83-
1. Accept the settings and continue by entering `Y`.
93+
If you choose not to install the secondary NIC now, you can [do so at a later time](#add-a-secondary-nic-after-installation-optional).
8494

85-
1. <a name="users"></a>After about 10 minutes, the two sets of credentials appear. For example:
95+
1. When prompted, enter `Y` to accept the settings. The installation process runs for about 10 minutes.
8696

87-
:::image type="content" source="../media/tutorial-install-components/credentials-screen.png" alt-text="Screenshot of the credentials that appear that must be copied as they won't be presented again.":::
97+
1. <a name="users"></a>When the installation process is complete, an appliance ID is displayed with a set of credentials for the *cyberx* privileged user. Save the credentials carefully as they won't be displayed again.
8898

89-
Save the usernames and passwords, you'll need these credentials to access the platform the first time you use it.
99+
When you're ready, press **ENTER** to continue. An appliance ID is displayed with a set of credentials for the *support* privileged user. Save these credentials carefully as well, as they won't be displayed again either.
90100

91101
For more information, see [Default privileged on-premises users](../roles-on-premises.md#default-privileged-on-premises-users).
92102

93-
1. Select **Enter** to continue.
103+
1. When you're ready, press **ENTER** to continue.
104+
105+
The installation is complete and you're prompted to sign in. Sign in using one of the privileged user credentials you saved from the previous step. At this point, you can also browse to the on-premises management console's IP address in a browser and sign in there.
94106

95107
## Configure network adapters for a VM deployment
96108

@@ -104,7 +116,7 @@ After deploying an on-premises management console sensor on a [virtual appliance
104116
|Adapters |Description |
105117
|---------|---------|
106118
|**Single network adapter** | To use a single network adapter, add **Network adapter 1** to connect to the on-premises management console UI and any connected OT sensors. |
107-
|**Secondary NIC** | To use a secondary NIC in addition to your main network adapter, add: <br> <br> - **Network adapter 1** to connect to the on-premises management console UI <br> - **Network adapter 2**, to connect to connected OT sensors |
119+
|<a name=add-a-secondary-nic-after-installation-optional></a>**Secondary NIC** | To use a secondary NIC in addition to your main network adapter, add: <br> <br> - **Network adapter 1** to connect to the on-premises management console UI <br> - **Network adapter 2**, to connect to connected OT sensors |
108120

109121
For more information, see:
110122

articles/defender-for-iot/organizations/tutorial-onboarding.md

Lines changed: 10 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -2,23 +2,25 @@
22
title: Onboard and activate a virtual OT sensor - Microsoft Defender for IoT.
33
description: This tutorial describes how to set up a virtual OT network sensor to monitor your OT network traffic.
44
ms.topic: tutorial
5-
ms.date: 07/11/2022
5+
ms.date: 04/18/2023
66
---
77

88
# Tutorial: Onboard and activate a virtual OT sensor
99

10-
This tutorial describes how to set up your network for OT system security monitoring, using a virtual, cloud-connected sensor, on a virtual machine (VM), using a trial subscription of Microsoft Defender for IoT.
10+
This tutorial describes the basics of setting up a Microsoft Defender for IoT OT sensor, using a trial subscription of Microsoft Defender for IoT and a virtual machine.
11+
12+
For a full, end-to-end deployment, make sure to follow steps to plan and prepare your system, and also fully calibrate and fine-tune your settings. For more information, see [Deploy Defender for IoT for OT monitoring](ot-deploy/ot-deploy-path.md).
1113

1214
> [!NOTE]
13-
> If you're looking to set up security monitoring for enterprise IoT systems, see [Enable Enterprise IoT security in Defender for Endpoint](eiot-defender-for-endpoint.md) and [Enhance IoT security monitoring with an Enterprise IoT network sensor (Public preview)](eiot-sensor.md).
15+
> If you're looking to set up security monitoring for enterprise IoT systems, see [Enable Enterprise IoT security in Defender for Endpoint](eiot-defender-for-endpoint.md).
1416
1517
In this tutorial, you learn how to:
1618

1719
> [!div class="checklist"]
1820
> * Download software for a virtual sensor
1921
> * Create a VM for the sensor
2022
> * Install the virtual sensor software
21-
> * Configure a SPAN port
23+
> * Configure a virtual SPAN port
2224
> * Verify your cloud connection
2325
> * Onboard and activate the virtual sensor
2426
@@ -222,6 +224,8 @@ Before you can start using your Defender for IoT sensor, you'll need to onboard
222224
|**Site** | Define the site where you want to associate your sensor, or select **Create site** to create a new site. Define a display name for your site and optional tags to help identify the site later. |
223225
|**Zone** | Define the zone where you want to deploy your sensor, or select **Create zone** to create a new one. |
224226

227+
For more information, see [Plan OT sites and zones](best-practices/plan-corporate-monitoring.md#plan-ot-sites-and-zones).
228+
225229
1. Select **Register** to add your sensor to Defender for IoT. A success message is displayed and your activation file is automatically downloaded. The activation file is unique for your sensor and contains instructions about your sensor's management mode.
226230

227231
[!INCLUDE [root-of-trust](includes/root-of-trust.md)]
@@ -269,20 +273,7 @@ This procedure describes how to use the sensor activation file downloaded from D
269273

270274
Your sensor is activated and onboarded to Defender for IoT. In the **Sites and sensors** page, you can see that the **Sensor status** column shows a green check mark, and lists the status as **OK**.
271275

272-
273-
274276
## Next steps
275277

276-
After your OT sensor is connected, continue with any of the following to start analyzing your data:
277-
278-
- [View assets from the Azure portal](how-to-manage-device-inventory-for-organizations.md)
279-
280-
- [Manage alerts from the Azure portal](how-to-manage-cloud-alerts.md)
281-
282-
- [OT threat monitoring in enterprise SOCs](concept-sentinel-integration.md)
283-
284-
- [Detect threats with Microsoft Sentinel](../../sentinel/iot-solution.md?toc=/azure/defender-for-iot/organizations/toc.json&bc=/azure/defender-for-iot/breadcrumb/toc.json)
285-
For more information, see:
286-
287-
- [Defender for IoT installation](how-to-install-software.md)
288-
- [Microsoft Defender for IoT system architecture](architecture.md)
278+
> [!div class="step-by-step"]
279+
> [Full deployment path for OT monitoring](ot-deploy/ot-deploy-path.md)

0 commit comments

Comments
 (0)