Skip to content

Commit 9db2e46

Browse files
authored
Merge pull request #221446 from Shereen-Bhar/data-retention
Data retention documentation
2 parents e70efe5 + 86747c9 commit 9db2e46

11 files changed

+168
-29
lines changed

articles/defender-for-iot/organizations/how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,13 @@ Use the **Device inventory** page from an on-premises management console to mana
1212

1313
For more information, see [What is a Defender for IoT committed device?](architecture.md#what-is-a-defender-for-iot-committed-device)
1414

15-
1615
> [!TIP]
1716
> Alternately, view your device inventory from a [the Azure portal](how-to-manage-device-inventory-for-organizations.md), or from an [OT sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md).
1817
>
1918
2019
## View the device inventory
2120

22-
To view detected devices in the **Device Inventory** page in an on-premises management console, sign-in to your on-premises management console, and then select **Device Inventory**.
21+
To view detected devices in the **Device Inventory** page in an on-premises management console, sign-in to your on-premises management console, and then select **Device Inventory**.
2322

2423
For example:
2524

@@ -160,9 +159,11 @@ The following table describes the device properties shown in the **Device invent
160159
| **Last Activity** | The last activity that the device performed. |
161160
| **Discovered** | When this device was first seen in the network. |
162161
| **PLC mode (preview)** | The PLC operating mode includes the Key state (physical) and run state (logical). Possible **Key** states include, Run, Program, Remote, Stop, Invalid, Programming Disabled.Possible Run. The possible **Run** states are Run, Program, Stop, Paused, Exception, Halted, Trapped, Idle, Offline. if both states are the same, only one state is presented. |
162+
163163
## Next steps
164164

165165
For more information, see:
166166

167167
- [Control what traffic is monitored](how-to-control-what-traffic-is-monitored.md)
168168
- [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md)
169+
- [Device data retention periods](references-data-retention.md#device-data-retention-periods).

articles/defender-for-iot/organizations/how-to-investigate-sensor-detections-in-a-device-inventory.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,12 +81,13 @@ You may need to merge duplicate devices if the sensor has discovered separate ne
8181
Examples of this scenario might include a PLC with four network cards, a laptop with both WiFi and a physical network card, or a single workstation with multiple network cards.
8282

8383
> [!NOTE]
84+
>
8485
> - You can only merge authorized devices.
8586
> - Device merges are irreversible. If you merge devices incorrectly, you'll have to delete the merged device and wait for the sensor to rediscover both devices.
8687
> - Alternately, merge devices from the [Device map](how-to-work-with-the-sensor-device-map.md) page.
8788
When merging, you instruct the sensor to combine the device properties of two devices into one. When you do this, the Device Properties window and sensor reports will be updated with the new device property details.
8889

89-
For example, if you merge two devices, each with an IP address, both IP addresses will appear as separate interfaces in the Device Properties window.
90+
For example, if you merge two devices, each with an IP address, both IP addresses will appear as separate interfaces in the Device Properties window.
9091

9192
**To merge devices from the device inventory:**
9293

@@ -98,7 +99,7 @@ For example, if you merge two devices, each with an IP address, both IP addresse
9899

99100
## View inactive devices
100101

101-
You may want to view devices in your network that have been inactive and delete them.
102+
You may want to view devices in your network that have been inactive and delete them.
102103

103104
For example, devices may become inactive because of misconfigured SPAN ports, changes in network coverage, or by unplugging them from the network
104105

@@ -178,3 +179,4 @@ For more information, see:
178179

179180
- [Control what traffic is monitored](how-to-control-what-traffic-is-monitored.md)
180181
- [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md)
182+
- [Device data retention periods](references-data-retention.md#device-data-retention-periods)

articles/defender-for-iot/organizations/how-to-manage-cloud-alerts.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Microsoft Defender for IoT alerts enhance your network security and operations w
1313

1414
- [Integrate with Microsoft Sentinel](iot-solution.md) to view Defender for IoT alerts in Microsoft Sentinel and manage them together with security incidents.
1515

16-
- If you have an [Enterprise IoT plan](eiot-defender-for-endpoint.md) with Microsoft Defender for Endpoint, alerts for Enterprise IoT devices detected by Microsoft Defender for Endpoint are available in Defender for Endpoint only.
16+
- If you have an [Enterprise IoT plan](eiot-defender-for-endpoint.md) with Microsoft Defender for Endpoint, alerts for Enterprise IoT devices detected by Microsoft Defender for Endpoint are available in Defender for Endpoint only.
1717

1818
For more information, see [Securing IoT devices in the enterprise](concept-enterprise.md) and the [Alerts queue in Microsoft 365 Defender](/microsoft-365/security/defender-endpoint/alerts-queue-endpoint-detection-response).
1919

@@ -115,8 +115,8 @@ For more information, see [Alert statuses and triaging options](alerts.md#alert-
115115

116116
In Defender for IoT in the Azure portal, select the **Alerts** page on the left, and then do one of the following:
117117

118-
- Select one or more learnable alerts in the grid and then select :::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/learn-icon.png" border="false"::: **Learn** in the toolbar.
119-
- On an alert details page for a learnable alert, in the **Take Action** tab, select **Learn**.
118+
- Select one or more learnable alerts in the grid and then select :::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/learn-icon.png" border="false"::: **Learn** in the toolbar.
119+
- On an alert details page for a learnable alert, in the **Take Action** tab, select **Learn**.
120120

121121
## Access alert PCAP data
122122

@@ -144,7 +144,6 @@ You may want to export a selection of alerts to a CSV file for offline sharing a
144144

145145
The file is generated, and you're prompted to save it locally.
146146

147-
148147
## Next steps
149148

150149
> [!div class="nextstepaction"]
@@ -154,4 +153,7 @@ The file is generated, and you're prompted to save it locally.
154153
> [OT monitoring alert types and descriptions](alert-engine-messages.md)
155154
156155
> [!div class="nextstepaction"]
157-
> [Microsoft Defender for IoT alerts](alerts.md)
156+
> [Microsoft Defender for IoT alerts](alerts.md)
157+
158+
> [!div class="nextstepaction"]
159+
> [Data retention across Microsoft Defender for IoT](references-data-retention.md)

articles/defender-for-iot/organizations/how-to-manage-device-inventory-for-organizations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,6 @@ On the **Device inventory page**, select **Export** :::image type="icon" source=
123123

124124
The device inventory is exported with any filters currently applied, and you can save the file locally.
125125

126-
127126
## Delete a device
128127

129128
If you have devices no longer in use, delete them from the device inventory so that they're no longer connected to Defender for IoT.
@@ -193,3 +192,4 @@ For more information, see:
193192

194193
- [Control what traffic is monitored](how-to-control-what-traffic-is-monitored.md)
195194
- [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md)
195+
- [Device data retention periods](references-data-retention.md#device-data-retention-periods).

articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -248,9 +248,9 @@ You can configure the sensor's time and region so that all the users see the sam
248248

249249
## Set up backup and restore files
250250

251-
System backup is performed automatically at 3:00 AM daily. The data is saved on a different disk in the sensor. The default location is `/var/cyberx/backups`.
251+
System backup is performed automatically at 3:00 AM daily. The data is saved on a different disk in the sensor. The default location is `/var/cyberx/backups`. You can automatically transfer this file to the internal network.
252252

253-
You can automatically transfer this file to the internal network.
253+
For more information, see [On-premises backup file capacity](references-data-retention.md#on-premises-backup-file-capacity).
254254

255255
> [!NOTE]
256256
>
@@ -466,7 +466,7 @@ Use Defender for IoT data mining reports on an OT network sensor to retrieve for
466466
- Event timeline data
467467
- Log files
468468

469-
Each type of data has a different retention period and maximum capacity. For more information see [Create data mining queries](how-to-create-data-mining-queries.md).
469+
Each type of data has a different retention period and maximum capacity. For more information see [Create data mining queries](how-to-create-data-mining-queries.md) and [Data retention across Microsoft Defender for IoT](references-data-retention.md).
470470

471471
## Clearing sensor data
472472

articles/defender-for-iot/organizations/how-to-manage-sensors-from-the-on-premises-management-console.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ Use Defender for IoT data mining reports on an OT network sensor to retrieve for
125125
- Event timeline data
126126
- Log files
127127

128-
Each type of data has a different retention period and maximum capacity. For more information see [Create data mining queries](how-to-create-data-mining-queries.md).
128+
Each type of data has a different retention period and maximum capacity. For more information see [Create data mining queries](how-to-create-data-mining-queries.md) and [Data retention across Microsoft Defender for IoT](references-data-retention.md).
129129

130130
## Define sensor backup schedules
131131

articles/defender-for-iot/organizations/how-to-manage-sensors-on-the-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Use Azure Monitor workbooks on an OT network sensor to retrieve forensic data fr
8787
- Event timeline data
8888
- Log files
8989

90-
Each type of data has a different retention period and maximum capacity. For more information see [Visualize Microsoft Defender for IoT data with Azure Monitor workbooks](workbooks.md).
90+
Each type of data has a different retention period and maximum capacity. For more information see [Visualize Microsoft Defender for IoT data with Azure Monitor workbooks](workbooks.md) and [Data retention across Microsoft Defender for IoT](references-data-retention.md).
9191

9292
## Reactivate an OT sensor
9393

articles/defender-for-iot/organizations/how-to-track-sensor-activity.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99

1010
Activity that your sensor detects is recorded in the event timeline. Activity includes alerts and alert actions, network events, and user operations such as user sign in or user deletion.
1111

12-
The event timeline provides a chronological view of events. Use the timeline during investigations, to understand and analyze the chain of events that preceded and followed an attack or incident.
12+
The event timeline provides a chronological view of events. Use the timeline during investigations, to understand and analyze the chain of events that preceded and followed an attack or incident.
1313

1414
## Before you start
1515

@@ -32,18 +32,19 @@ You need to have Administrator or Security Analyst permissions to perform the pr
3232
- **Date**: Search for events in a specific date range.
3333
1. Select **Apply* to set the filter.
3434
1. Select **Export** to export the event timeline to a CSV file.
35-
35+
3636
## Add an event
3737

3838
In addition to viewing the events that the sensor has detected, you can manually add events to the timeline. This process is useful if an external system event impacts your network, and you want to record it on the timeline.
3939

4040
1. Select **Create Event**.
41-
1. In the **Create Event** dialog, specify the event type (Info, Notice, or Alert)
41+
1. In the **Create Event** dialog, specify the event type (Info, Notice, or Alert)
4242
1. Set a timestamp for the event, the device it should be connected with, and provide a description.
4343
1. Select **Save** to add the event to the timeline.
4444

45-
46-
4745
## Next steps
4846

49-
For more information, see [View alerts](how-to-view-alerts.md).
47+
For more information, see:
48+
49+
- [View alerts](how-to-view-alerts.md).
50+
- [OT event timeline retention](references-data-retention.md#ot-event-timeline-retention).

articles/defender-for-iot/organizations/how-to-view-alerts.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -107,8 +107,8 @@ For more information, see [Alert statuses and triaging options](alerts.md#alert-
107107

108108
Sign into your OT sensor console and select the **Alerts** page on the left, and then do one of the following:
109109

110-
- Select one or more learnable alerts in the grid and then select :::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/learn-icon.png" border="false"::: **Learn** in the toolbar.
111-
- On an alert details page, in the **Take Action** tab, select **Learn**.
110+
- Select one or more learnable alerts in the grid and then select :::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/learn-icon.png" border="false"::: **Learn** in the toolbar.
111+
- On an alert details page, in the **Take Action** tab, select **Learn**.
112112

113113
- **To mute an alert**:
114114

@@ -124,7 +124,6 @@ For more information, see [Alert statuses and triaging options](alerts.md#alert-
124124

125125
After you unlearn or unmute an alert, alerts are re-triggered whenever the sensor senses the selected traffic combination.
126126

127-
128127
## Access alert PCAP data
129128

130129
You might want to access raw traffic files, also known as *packet capture files* or *PCAP* files as part of your investigation.
@@ -179,7 +178,6 @@ If your admin has [created custom comments](how-to-accelerate-alert-incident-res
179178

180179
For more information, see [Accelerating OT alert workflows](alerts.md#accelerating-ot-alert-workflows).
181180

182-
183181
## Next steps
184182

185183
> [!div class="nextstepaction"]
@@ -198,4 +196,7 @@ For more information, see [Accelerating OT alert workflows](alerts.md#accelerati
198196
> [OT monitoring alert types and descriptions](alert-engine-messages.md)
199197
200198
> [!div class="nextstepaction"]
201-
> [Microsoft Defender for IoT alerts](alerts.md)
199+
> [Microsoft Defender for IoT alerts](alerts.md)
200+
201+
> [!div class="nextstepaction"]
202+
> [Data retention across Microsoft Defender for IoT](references-data-retention.md)

articles/defender-for-iot/organizations/how-to-work-with-alerts-on-premises-management-console.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,6 @@ You may want to export a selection of alerts to a CSV file for offline sharing a
7070

7171
The CSV file is generated, and you're prompted to save it locally.
7272

73-
74-
7573
## Next steps
7674

7775
> [!div class="nextstepaction"]
@@ -87,4 +85,7 @@ The CSV file is generated, and you're prompted to save it locally.
8785
> [Forward alert information](how-to-forward-alert-information-to-partners.md)
8886
8987
> [!div class="nextstepaction"]
90-
> [Microsoft Defender for IoT alerts](alerts.md)
88+
> [Microsoft Defender for IoT alerts](alerts.md)
89+
90+
> [!div class="nextstepaction"]
91+
> [Data retention across Microsoft Defender for IoT](references-data-retention.md)

0 commit comments

Comments
 (0)