Skip to content

Commit 97b4f07

Browse files
Merge pull request #106458 from mlottner/Live-publish_1
Reco and alert updates
2 parents 2a1afdc + cb94d32 commit 97b4f07

File tree

5 files changed

+28
-22
lines changed

5 files changed

+28
-22
lines changed

articles/asc-for-iot/concept-customizable-security-alerts.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 1/27/2020
16+
ms.date: 03/04/2020
1717
ms.author: mlottner
1818

1919
---
@@ -25,7 +25,7 @@ We encourage you to create custom alerts based on your knowledge of expected dev
2525

2626
The following list of Azure Security Center for IoT alerts are definable by you based on your expected IoT Hub and/or device behavior. For more details about how to customize each alert, see [create custom alerts](quickstart-create-custom-alerts.md).
2727

28-
## Azure Security Center for IoT alerts available for customization
28+
## IoT Hub alerts available for customization
2929

3030

3131

@@ -45,14 +45,19 @@ The following list of Azure Security Center for IoT alerts are definable by you
4545
| Low | Custom alert - number of command queue purges is outside the allowed range | IoT Hub | The amount of command queue purges within a specific time window is outside the currently configured and allowable range.||
4646
| Low | Custom alert - number of module twin updates is outside the allowed range | IoT Hub | The amount of module twin updates within a specific time window is outside the currently configured and allowable range.|
4747
| Low | Custom alert - number of unauthorized operations is outside the allowed range | IoT Hub | The amount of unauthorized operations within a specific time window is outside the currently configured and allowable range.|
48+
|
49+
50+
## Agent alerts available for customization
51+
52+
| Severity | Alert name | Data source | Description | Suggested remediation|
53+
|---|---|---|---|---|
4854
| Low | Custom alert - number of active connections is outside the allowed range | Agent | Number of active connections within a specific time window is outside the currently configured and allowable range.| Investigate the device logs. Learn where the connection originated and determine if it is benign or malicious. If malicious, remove possible malware and understand source. If benign, add the source to the allowed connection list. |
4955
| Low | Custom alert - outbound connection created to an IP that isn't allowed | Agent | An outbound connection was created to an IP that is outside your allowed IP list. |Investigate the device logs. Learn where the connection originated and determine if it is benign or malicious. If malicious, remove possible malware and understand source. If benign, add the source to the allowed IP list. |
5056
| Low | Custom alert - number of failed local logins is outside the allowed range | Agent | The amount of failed local logins within a specific time window is outside the currently configured and allowable range. | |
5157
| Low | Custom alert - login of a user that is not on the allowed user list | Agent | A local user outside your allowed user list, logged in to the device.| If you are saving raw data, navigate to your log analytics account and use the data to investigate the device, identify the source and then fix the allow/block list for those settings. If you are not currently saving raw data, go to the device and fix the allow/block list for those settings.|
5258
| Low | Custom alert - a process was executed that is not allowed | Agent | A process that is not allowed was executed on the device. |If you are saving raw data, navigate to your log analytics account and use the data to investigate the device, identify the source and then fix the allow/block list for those settings. If you are not currently saving raw data, go to the device and fix the allow/block list for those settings. |
5359
|
5460

55-
5661
## Next steps
5762

5863
- Learn how to [customize an alert](quickstart-create-custom-alerts.md)

articles/asc-for-iot/concept-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Operational recommendations provide insights and suggestions to improve security
4747
| Low | Agent sends unutilized messages | Agent | 10% or more of security messages were smaller than 4 KB during the last 24 hours. |
4848
| Low | Security twin configuration not optimal | Agent | Security twin configuration is not optimal. |
4949
| Low | Security twin configuration conflict | Agent | Conflicts were identified in the security twin configuration. | |
50-
50+
|
5151

5252
## Recommendations for IoT Hub
5353

articles/asc-for-iot/concept-security-alerts.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 1/27/2020
17+
ms.date: 03/04/2020
1818
ms.author: mlottner
1919

2020
---
@@ -28,6 +28,8 @@ In this article, you will find a list of built-in alerts which can be triggered
2828
In addition to built-in alerts, Azure Security Center for IoT allows you to define custom alerts based on expected IoT Hub and/or device behavior.
2929
For more details, see [customizable alerts](concept-customizable-security-alerts.md).
3030

31+
32+
3133
## Built-in alerts for IoT devices
3234

3335
| Name | Severity | Data Source | Description | Suggested remediation steps|
@@ -66,15 +68,11 @@ For more details, see [customizable alerts](concept-customizable-security-alerts
6668
| Suspected malicious credentials access tools detected | Medium | Agent | Detection usage of a tool commonly associated with malicious attempts to access credentials. | Review with the user that ran the command if this was legitimate activity that you expect to see on the device. If not, escalate the alert to the information security team.|
6769
| Suspicious compilation detected | Medium | Agent | Suspicious compilation detected. Malicious actors often compile exploits on a compromised machine to escalate privileges. |Review with the user that ran the command if this was legitimate activity that you expect to see on the device. If not, escalate the alert to the information security team.
6870
| Suspicious file download followed by file run activity | Medium| Agent| Analysis of host data detected a file that was downloaded and run in the same command. This technique is commonly used by malicious actors to get infected files onto victim machines. |Review with the user that ran the command if this was legitimate activity that you expect to see on the device. If not, escalate the alert to the information security team.|
69-
| Suspicious IP address communication | Medium | Agent | Communication with a suspicious IP address detected. |Verify if the connection is legitimate. Consider blocking communication with the suspicious IP.
70-
| x.509 device certificate thumbprint mismatch | Medium | IoT Hub | x.509 device certificate thumbprint did not match configuration. |Review alerts on the devices. No further action required. |
71-
| x.509 certificate expired | Medium | IoT Hub | X.509 device certificate has expired. | This could be a legitimate device with an expired certificate or an attempt to impersonate a legitimate device. If the legitimate device is currently communicating correctly this is likely an impersonation attempt. ||
71+
| Suspicious IP address communication | Medium | Agent | Communication with a suspicious IP address detected. |Verify if the connection is legitimate. Consider blocking communication with the suspicious IP. |
7272
|**LOW** severity| | | |
7373
| Bash history cleared | Low | Agent | Bash history log cleared. Malicious actors commonly erase bash history to hide their own commands from appearing in the logs. |Review with the user that ran the command that the activity in this alert to see if you recognize this as legitimate administrative activity. If not, escalate the alert to the information security team.
74-
| Device silent | Low | Agent | Device has not sent any telemetry data in the last 72 hours.|Make sure device is online and sending data. Check that the Azure Security Agent is running on the device.
75-
| Expired SAS Token | Low | IoT Hub | Expired SAS token used by a device |May be a legitimate device with an expired token, or an attempt to impersonate a legitimate device. If the legitimate device is currently communicating correctly, this is likely an impersonation attempt.
74+
| Device silent | Low | Agent | Device has not sent any telemetry data in the last 72 hours.|Make sure device is online and sending data. Check that the Azure Security Agent is running on the device.|
7675
| Failed Bruteforce attempt | Low | Agent | Multiple unsuccessful login attempts identified. Potential Bruteforce attack attempt failed on the device. |Review SSH Bruteforce alerts and the activity on the device. No further action required.|
77-
| Invalid SAS token signature | Low | IoT Hub | A SAS token used by a device has an invalid signature. The signature does not match either the primary or secondary key.| Review the alerts on the devices. No further action required. |
7876
| Local user added to one or more groups | Low | Agent | New local user added to a group on this device. Changes to user groups are uncommon, and can indicate a malicious actor may be collecting additional permissions.| Verify if the change is consistent with the permissions required by the affected user. If the change is inconsistent, escalate to your Information Security team. |
7977
| Local user deleted from one or more groups | Low | Agent | A local user was deleted from one or more groups. Malicious actors are known to use this method in an attempt to deny access to legitimate users or to delete the history of their actions.| Verify if the change is consistent with the permissions required by the affected user. If the change is inconsistent, escalate to your Information Security team. |
8078
| Local user deletion detected | Low | Agent | Deletion of a local user detected. Local user deletion is uncommon, a malicious actor may be trying to deny access to legitimate users or to delete the history of their actions.| Verify if the change is consistent with the permissions required by the affected user. If the change is inconsistent, escalate to your Information Security team. |
@@ -84,13 +82,17 @@ For more details, see [customizable alerts](concept-customizable-security-alerts
8482
| Severity | Name | Description | Suggested remediation|
8583
|----------|------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------|
8684
|**Medium** severity| | | |
87-
| New certificate added to an IoT Hub | Medium |A certificate was added to an IoT Hub. If this action was made by an unauthorized party, it may indicate malicious activity.| 1. Make sure the certificate was added by an authorized party. <br> 2. If it was not added by an authorized party, remove the certificate and escalate the alert to the organizational security team. |
88-
| Certificate deleted from an IoT Hub | Medium | A certificate was deleted from an IoT Hub. If this action was made by an unauthorized party, it may indicate a malicious activity.| 1. Make sure the certificate was removed by an authorized party. <br> 2. If the certificate was not removed by an authorized party, add the certificate back, and escalate the alert to the organizational security team. |
89-
| Unsuccessful attempt detected to add a certificate to an IoT Hub | Medium | There was an unsuccessful attempt to add a certificate to an IoT Hub. If this action was made by an unauthorized party, it may indicate malicious activity.| Make sure permissions to change certificates are only granted to authorized parties. |
90-
| Unsuccessful attempt detected to delete a certificate from an IoT Hub | Medium | There was an unsuccessful attempt to delete a certificate from an IoT Hub. If this action was made by an unauthorized party, it may indicate malicious activity. |Make sure permissions to change certificates are only granted to an authorized party.
85+
| New certificate added to an IoT Hub | Medium |A certificate named \'%{DescCertificateName}\' was added to IoT Hub \'%{DescIoTHubName}\'. If this action was made by an unauthorized party, it may indicate malicious activity.| 1. Make sure the certificate was added by an authorized party. <br> 2. If it was not added by an authorized party, remove the certificate and escalate the alert to the organizational security team. |
86+
| Certificate deleted from an IoT Hub | Medium | A certificate named \'%{DescCertificateName}\' was deleted from IoT Hub \'%{DescIoTHubName}\'. If this action was made by an unauthorized party, it may indicate a malicious activity.| 1. Make sure the certificate was removed by an authorized party. <br> 2. If the certificate was not removed by an authorized party, add the certificate back, and escalate the alert to the organizational security team. |
87+
| Unsuccessful attempt detected to add a certificate to an IoT Hub | Medium | There was an unsuccessful attempt to add certificate \'%{DescCertificateName}\' to IoT Hub \'%{DescIoTHubName}\'. If this action was made by an unauthorized party, it may indicate malicious activity.| Make sure permissions to change certificates are only granted to authorized parties. |
88+
| Unsuccessful attempt detected to delete a certificate from an IoT Hub | Medium | There was an unsuccessful attempt to delete certificate \'%{DescCertificateName}\' from IoT Hub \'%{DescIoTHubName}\'. If this action was made by an unauthorized party, it may indicate malicious activity. |Make sure permissions to change certificates are only granted to an authorized party.|
89+
| x.509 device certificate thumbprint mismatch | Medium | x.509 device certificate thumbprint did not match configuration. |Review alerts on the devices. No further action required. |
90+
| x.509 certificate expired | Medium |X.509 device certificate has expired. | This could be a legitimate device with an expired certificate or an attempt to impersonate a legitimate device. If the legitimate device is currently communicating correctly this is likely an impersonation attempt. |
9191
|**Low** severity| | | |
92-
| Attempt to add or edit a diagnostic setting of an IoT Hub detected | Low | Attempt to add or edit the diagnostic settings of an IoT Hub has been detected. Diagnostic settings enable you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. If this action was not made by an authorized party, it may indicate malicious activity. |Make sure permissions to change diagnostics settings are granted only to an authorized party.
93-
| Attempt to delete a diagnostic setting from an IoT Hub detected | Low | There was an attempt to add or edit a diagnostic setting of an IoT Hub. Diagnostic setting enables you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. If this action was not made by an authorized party, it may indicate a malicious activity. |Make sure permissions to change diagnostics settings are granted only to an authorized party.
92+
| Attempt to add or edit a diagnostic setting of an IoT Hub detected | Low | Attempt to add or edit the diagnostic settings of an IoT Hub has been detected. Diagnostic settings enable you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. If this action was not made by an authorized party, it may indicate malicious activity. |1. Make sure the certificate was removed by an authorized party.<br> 2. If the certificate was not removed by an authorized party, add the certificate back and escalate the alert to your information security team.
93+
| Attempt to delete a diagnostic setting from an IoT Hub detected | Low | There was %{DescAttemptStatusMessage}\' attempt to add or edit diagnostic setting \'%{DescDiagnosticSettingName}\' of IoT Hub \'%{DescIoTHubName}\'. Diagnostic setting enables you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. If this action was not made by an authorized party, it may indicate a malicious activity. |Make sure permissions to change diagnostics settings are granted only to an authorized party.|
94+
| Expired SAS Token | Low | Expired SAS token used by a device |May be a legitimate device with an expired token, or an attempt to impersonate a legitimate device. If the legitimate device is currently communicating correctly, this is likely an impersonation attempt.|
95+
| Invalid SAS token signature | Low | A SAS token used by a device has an invalid signature. The signature does not match either the primary or secondary key.| Review the alerts on the devices. No further action required. |
9496
|
9597

9698
## Next steps

articles/asc-for-iot/how-to-configure-with-sentinel.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Security Center for IoT guide for configuration with Azure Sentinel (preview)| Microsoft Docs
3-
description: This how to guide explains how to configure Azure Sentinel to receive data from your Azure Security Center for IoT solution.
3+
description: Explains how to configure Azure Sentinel to receive data from your Azure Security Center for IoT solution.
44
services: asc-for-iot
55
ms.service: asc-for-iot
66
documentationcenter: na
@@ -48,10 +48,10 @@ Connect alerts from Azure Security Center for IoT and stream them directly into
4848
## Connect to Azure Security Center for IoT
4949

5050
1. In Azure Sentinel, select **Data connectors** and then click the **Azure Security Center for IoT** tile.
51-
1. From the bottom right pane, click **Open connector page**.
51+
1. From the bottom of the right pane, click **Open connector page**.
5252
1. Click **Connect**, next to each IoT Hub subscription whose alerts and device alerts you want to stream into Azure Sentinel.
53-
- If Azure Security Center for IoT is not enabled on that Hub, you’ll see an Enable warning message. Click the **Enable** link to start the service.
54-
1. You can decide whether you want the alerts from Azure Security Center for IoT to automatically generate incidents in Azure Sentinel. Under **Create incidents**, select **Enable** to enable the default analytic rule to create incidents automatically from alerts generated in the connected security service.This rule can be changed or edited under **Analytics** > **Active** rules.
53+
- If Azure Security Center for IoT isn't enabled on that Hub, you’ll see an Enable warning message. Click the **Enable** link to start and enable the service.
54+
1. You can decide whether you want the alerts from Azure Security Center for IoT to automatically generate incidents in Azure Sentinel. Under **Create incidents**, select **Enable** to enable the rule to automatically create incidents from the generated alerts. This rule can be changed or edited under **Analytics** > **Active** rules.
5555

5656
> [!NOTE]
5757
>It can take 10 seconds or more to refresh the hub list after making connection changes.

articles/asc-for-iot/quickstart-create-custom-alerts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,6 @@ Use security groups to group your devices into logical categories. After creatin
7777
## Alerts available for customization
7878

7979
Azure Security Center for IoT offers a large number of alerts which can be customized according to your specific needs. Review the [customizable alert table](concept-customizable-security-alerts.md) for alert severity, data source, description and our suggested remediation steps if and when each alert is received.
80-
|
8180

8281

8382
## Next steps

0 commit comments

Comments
 (0)