You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/ot-deploy/install-software-on-premises-management-console.md
+29-17Lines changed: 29 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Install Microsoft Defender for IoT on-premises management console software - Microsoft Defender for IoT
3
3
description: Learn how to install Microsoft Defender for IoT on-premises management console software. Use this article if you're reinstalling software on a pre-configured appliance, or if you've chosen to install software on your own appliances.
4
-
ms.date: 12/13/2022
4
+
ms.date: 04/18/2023
5
5
ms.topic: install-set-up-deploy
6
6
---
7
7
@@ -58,39 +58,51 @@ The installation process takes about 20 minutes. After the installation, the sys
58
58
59
59
-**Virtual mount** – use iLO for HPE appliances, or iDRAC for Dell appliances to boot the ISO file.
60
60
61
-
1.Select your preferred language for the installation process. For example:
61
+
1.The initial console window lists installation languages. Select the language you want to use. For example:
62
62
63
63
:::image type="content" source="../media/tutorial-install-components/on-prem-language-select.png" alt-text="Screenshot of selecting your preferred language for the installation process.":::
64
64
65
-
1.From the options displayed, select the management release you want to install based on the hardware profile you're using.
65
+
1.The console lists a series of installation options. Select the option that best matches your requirements.
66
66
67
-
1. Define the following network properties as prompted:
67
+
The installation wizard starts running. This step takes several minutes to complete, and includes system reboots.
68
68
69
-
- For the **Configure management network interface** prompt: For Dell appliances, enter `eth0` and `eth1`. For HP appliances, enter `enu1` and `enu2`, or `possible value`.
69
+
When complete, a screen similar to the following appears, prompting you to enter your management interface:
70
70
71
-
- For the **Configure management network IP address**, **Configure subnet mask**, **Configure DNS**, and **Configure default gateway IP address** prompts, enter the relevant values for each item.
71
+
:::image type="content" source="../media/tutorial-install-components/on-prem-first-steps-install.png" alt-text="Screenshot of the management interface prompt.":::
72
72
73
-
1.**(Optional)** To install a secondary Network Interface Card (NIC), define a hardware profile, and network properties as prompted.
73
+
1.At each prompt, enter the following values:
74
74
75
-
For the **Configure sensor monitoring interface**, enter `eth1` or `possible value`. For other prompts, enter the relevant values for each item.
75
+
|Prompt |Value |
76
+
|---------|---------|
77
+
|`configure management network interface`| Enter your management interface. For the following appliances, enter specific values:<br><br> - **Dell**: Enter `eth0, eth1`<br> - **HP**: Enter `enu1, enu2` <br><br> Other appliances may have different options. |
78
+
|`configure management network IP address`| Enter the on-premises management console's IP address. |
79
+
|`configure subnet mask`| Enter the on-premises management console's subnet mask address. |
80
+
|`configure DNS`| Enter the on-premises management console's DNS address. |
81
+
|`configure default gateway IP address`| Enter the IP address for the on-premises management console's default gateway. |
76
82
77
-
For example:
83
+
1. (Optional) Enhance security to your on-premises management console by adding a secondary NIC dedicated for attached sensors within an IP address range. When you use a secondary NIC, the first is dedicated for end-users, and the secondary supports the configuration of a gateway for routed networks.
78
84
79
-
:::image type="content" source="../media/tutorial-install-components/on-prem-secondary-nic-install.png" alt-text="Screenshot that shows the Secondary NIC install questions.":::
85
+
If you're installing a secondary Network Interface Card (NIC), enter the following details for the sensor's monitoring interface as prompted:
80
86
81
-
If you choose not to install the secondary NIC now, you can [do so at a later time](../how-to-manage-the-on-premises-management-console.md#add-a-secondary-nic-after-installation).
87
+
| Prompt |Value |
88
+
|---------|---------|
89
+
|`configure sensor monitoring interface`| Enter `eth1` or another value as needed for your system. |
90
+
|`configure an IP address for the sensor monitoring interface`| Enter the secondary NIC's IP address |
91
+
|`configure a subnet mask for the sensor monitoring interface`| Enter the secondary NIC's subnet mask address. |
82
92
83
-
1. Accept the settings and continue by entering `Y`.
93
+
If you choose not to install the secondary NIC now, you can [do so at a later time](#add-a-secondary-nic-after-installation-optional).
84
94
85
-
1.<aname="users"></a>After about 10 minutes, the two sets of credentials appear. For example:
95
+
1.When prompted, enter `Y` to accept the settings. The installation process runs for about 10 minutes.
86
96
87
-
:::image type="content" source="../media/tutorial-install-components/credentials-screen.png" alt-text="Screenshot of the credentials that appear that must be copied as they won't be presented again.":::
97
+
1. <aname="users"></a>When the installation process is complete, an appliance ID is displayed with a set of credentials for the *cyberx* privileged user. Save the credentials carefully as they won't be displayed again.
88
98
89
-
Save the usernames and passwords, you'll need these credentials to access the platform the first time you use it.
99
+
When you're ready, press **ENTER** to continue. An appliance ID is displayed with a set of credentials for the *support* privileged user. Save these credentials carefully as well, as they won't be displayed again either.
90
100
91
101
For more information, see [Default privileged on-premises users](../roles-on-premises.md#default-privileged-on-premises-users).
92
102
93
-
1. Select **Enter** to continue.
103
+
1. When you're ready, press **ENTER** to continue.
104
+
105
+
The installation is complete and you're prompted to sign in. Sign in using one of the privileged user credentials you saved from the previous step. At this point, you can also browse to the on-premises management console's IP address in a browser and sign in there.
94
106
95
107
## Configure network adapters for a VM deployment
96
108
@@ -104,7 +116,7 @@ After deploying an on-premises management console sensor on a [virtual appliance
104
116
|Adapters |Description |
105
117
|---------|---------|
106
118
|**Single network adapter**| To use a single network adapter, add **Network adapter 1** to connect to the on-premises management console UI and any connected OT sensors. |
107
-
|**Secondary NIC**| To use a secondary NIC in addition to your main network adapter, add: <br> <br> - **Network adapter 1** to connect to the on-premises management console UI <br> - **Network adapter 2**, to connect to connected OT sensors |
119
+
|<aname=add-a-secondary-nic-after-installation-optional></a>**Secondary NIC**| To use a secondary NIC in addition to your main network adapter, add: <br> <br> - **Network adapter 1** to connect to the on-premises management console UI <br> - **Network adapter 2**, to connect to connected OT sensors |
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/tutorial-onboarding.md
+10-19Lines changed: 10 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,23 +2,25 @@
2
2
title: Onboard and activate a virtual OT sensor - Microsoft Defender for IoT.
3
3
description: This tutorial describes how to set up a virtual OT network sensor to monitor your OT network traffic.
4
4
ms.topic: tutorial
5
-
ms.date: 07/11/2022
5
+
ms.date: 04/18/2023
6
6
---
7
7
8
8
# Tutorial: Onboard and activate a virtual OT sensor
9
9
10
-
This tutorial describes how to set up your network for OT system security monitoring, using a virtual, cloud-connected sensor, on a virtual machine (VM), using a trial subscription of Microsoft Defender for IoT.
10
+
This tutorial describes the basics of setting up a Microsoft Defender for IoT OT sensor, using a trial subscription of Microsoft Defender for IoT and a virtual machine.
11
+
12
+
For a full, end-to-end deployment, make sure to follow steps to plan and prepare your system, and also fully calibrate and fine-tune your settings. For more information, see [Deploy Defender for IoT for OT monitoring](ot-deploy/ot-deploy-path.md).
11
13
12
14
> [!NOTE]
13
-
> If you're looking to set up security monitoring for enterprise IoT systems, see [Enable Enterprise IoT security in Defender for Endpoint](eiot-defender-for-endpoint.md) and [Enhance IoT security monitoring with an Enterprise IoT network sensor (Public preview)](eiot-sensor.md).
15
+
> If you're looking to set up security monitoring for enterprise IoT systems, see [Enable Enterprise IoT security in Defender for Endpoint](eiot-defender-for-endpoint.md).
14
16
15
17
In this tutorial, you learn how to:
16
18
17
19
> [!div class="checklist"]
18
20
> * Download software for a virtual sensor
19
21
> * Create a VM for the sensor
20
22
> * Install the virtual sensor software
21
-
> * Configure a SPAN port
23
+
> * Configure a virtual SPAN port
22
24
> * Verify your cloud connection
23
25
> * Onboard and activate the virtual sensor
24
26
@@ -222,6 +224,8 @@ Before you can start using your Defender for IoT sensor, you'll need to onboard
222
224
|**Site**| Define the site where you want to associate your sensor, or select **Create site** to create a new site. Define a display name for your site and optional tags to help identify the site later. |
223
225
|**Zone**| Define the zone where you want to deploy your sensor, or select **Create zone** to create a new one. |
224
226
227
+
For more information, see [Plan OT sites and zones](best-practices/plan-corporate-monitoring.md#plan-ot-sites-and-zones).
228
+
225
229
1. Select **Register** to add your sensor to Defender for IoT. A success message is displayed and your activation file is automatically downloaded. The activation file is unique for your sensor and contains instructions about your sensor's management mode.
@@ -269,20 +273,7 @@ This procedure describes how to use the sensor activation file downloaded from D
269
273
270
274
Your sensor is activated and onboarded to Defender for IoT. In the **Sites and sensors** page, you can see that the **Sensor status** column shows a green check mark, and lists the status as **OK**.
271
275
272
-
273
-
274
276
## Next steps
275
277
276
-
After your OT sensor is connected, continue with any of the following to start analyzing your data:
277
-
278
-
-[View assets from the Azure portal](how-to-manage-device-inventory-for-organizations.md)
279
-
280
-
-[Manage alerts from the Azure portal](how-to-manage-cloud-alerts.md)
281
-
282
-
-[OT threat monitoring in enterprise SOCs](concept-sentinel-integration.md)
283
-
284
-
-[Detect threats with Microsoft Sentinel](../../sentinel/iot-solution.md?toc=/azure/defender-for-iot/organizations/toc.json&bc=/azure/defender-for-iot/breadcrumb/toc.json)
285
-
For more information, see:
286
-
287
-
-[Defender for IoT installation](how-to-install-software.md)
288
-
-[Microsoft Defender for IoT system architecture](architecture.md)
278
+
> [!div class="step-by-step"]
279
+
> [Full deployment path for OT monitoring](ot-deploy/ot-deploy-path.md)
0 commit comments