Skip to content

Commit a177a55

Browse files
authored
Merge pull request #191249 from batamig/custom-alert-protocols
updated custom alert proc
2 parents fd623aa + 331da45 commit a177a55

File tree

2 files changed

+28
-103
lines changed

2 files changed

+28
-103
lines changed

articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md

Lines changed: 25 additions & 103 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Accelerate alert workflows
33
description: Improve alert and incident workflows.
4-
ms.date: 11/09/2021
4+
ms.date: 03/10/2022
55
ms.topic: how-to
66
---
77

@@ -93,125 +93,47 @@ Alert groups are predefined. For details about alerts associated with alert grou
9393

9494
## Customize alert rules
9595

96-
Use custom alert rules to more specifically pinpoint activity of interest to you.
97-
You can add custom alert rules based on:
96+
Add custom alert rule to pinpoint specific activity as needed for your organization such as for specific protocols, source or destination addresses, or a combination of parameters.
9897

99-
- A category, for example a standard protocol, or port or file.
98+
For example, you might want to define an alert for an environment running MODBUS to detect any write commands to a memory register, on a specific IP address and ethernet destination. Another example would be an alert for any access to a specific IP address.
10099

101-
- Traffic detections based proprietary protocols developed in a Horizon plugin. (Horizon Open Development Environment ODE).
100+
Use custom alert rule actions to instruct Defender for IT to take specific action when the alert is triggered, such as allowing users to access PCAP files from the alert, assigning alert severity, or generating an event that shows in the event timeline. Alert messages indicate that the alert was generated from a custom alert rule.
102101

103-
- Source and destination addresses
102+
**To create a custom alert rule**:
104103

105-
- A combination of protocol fields from all protocol layers. For example, in an environment running MODBUS, you may want to generate an alert when the sensor detects a write command to a memory register on a specific IP address and ethernet destination, or an alert when any access is performed to a specific IP address.
104+
1. On the sensor console, select **Custom alert rules** > **+ Create rule**.
106105

107-
If the sensor detects the activity described in the rule, the alert is sent.
106+
1. In the **Create custom alert rule** pane that shows on the right, define the following fields:
108107

109-
You can also use alert rule actions to instruct Defender for IoT to:
108+
- **Alert name**. Enter a meaningful name for the alert.
110109

111-
- Allow users to access PCAP file from the alert.
112-
- Assign an alert severity.
113-
- Generate an event rather than alert. The detected information will appear in the event timeline.
110+
- **Alert protocol**. Select the protocol you want to detect. In specific cases, select one of the following protocols:
114111

112+
- For a database data or structure manipulation event, select **TNS** or **TDS**
113+
- For a file event, select **HTTP**, **DELTAV**, **SMB**, or **FTP**, depending on the file type
114+
- For a package download event, select **HTTP**
115+
- For an open ports (dropped) event, select **TCP** or **UDP**, depending on the port type.
115116

116-
The alert message indicates that a user-defined rule triggered the alert.
117+
To create rules that monitor for specific changes in one of your OT protocols, such as S7 or CIP, use any parameters found on that protocol, such as `tag` or `sub-function`.
118+
119+
- **Message**. Define a message to display when the alert is triggered. Alert messages support alphanumeric characters and any traffic variables detected. For example, you might want to include the detected source and destination addresses. Use curly brackets (**{}**) to add variables to the alert message.
117120

121+
- **Direction**. Enter a source and/or destination IP address where you want to detect traffic.
118122

119-
### Create custom alerts
123+
- **Conditions**. Define one or more conditions that must be met to trigger the alert. Select the **+** sign to create a condition set with multiple conditions that use the **AND** operator. If you select a MAC address or IP address as a variable, you must convert the value from a dotted-decimal address to decimal format.
120124

121-
**To create a custom alert rule:**
125+
- **Detected**. Define a date and/or time range for the traffic you want to detect.
126+
- **Action**. Define an action you want Defender for IoT to take automatically when the alert is triggered.
122127

123-
1. Select **Custom Alerts** from the side menu of a sensor.
124-
125-
1. Select **Create rule** (**+**).
128+
To edit a custom alert rule, select the rule and then select the options (**...**) menu > **Edit**. Modify the alert rule as needed and save your changes.
126129

127-
:::image type="content" source="media/how-to-work-with-alerts-sensor/custom-alerts-rules.png" alt-text="Screenshot of the Create custom alert rules pane.":::
130+
Edits made to custom alert rules, such as changing a severity level or protocol, are tracked in the **Event timeline** page on the sensor console. For more information, see [Track sensor activity](how-to-track-sensor-activity.md).
128131

129-
1. Define an alert name.
130-
1. Select protocol to detect.
131-
1. Define a message to display. Alert messages can contain alphanumeric characters you enter, as well as traffic variables detected. For example, include the detected source and destination addresses in the alert messages. Use { } to add variables to the message
132-
1. Select the engine that should detect the activity.
133-
1. Select the source and destination devices for the activity you want to detect.
132+
**To enable or disable custom alert rules**
134133

135-
#### Create rule conditions
136-
137-
Define one or several rule conditions. Two categories of conditions can be created:
138-
139-
**Condition based on unique values**
140-
141-
Create conditions based on unique values associated with the category selected. Rule conditions can comprise one or several sets of fields, operators, and values. Create condition sets, by using AND.
142-
143-
**To create a rule condition:**
144-
145-
1. Select a **Variable**. Variables represent fields configured in the plugin.
146-
147-
7. Select an **Operator**:
148-
149-
- (==) Equal to
150-
151-
- (!=) Not equal to
152-
153-
- (>) Greater than
154-
155-
156-
- In Range
157-
158-
- Not in Range
159-
- Same as (field X same as field Y)
160-
161-
- (>=) Greater than or equal to
162-
- (<) Less than
163-
164-
- (<=) Less than or equal to
165-
166-
8. Enter a **Value** as a number. If the variable you selected is a MAC address or IP address, the value must be converted from a dotted-decimal address to decimal format. Use an IP address conversion tool, for example <https://www.ipaddressguide.com/ip>.
167-
168-
:::image type="content" source="media/how-to-work-with-alerts-sensor/custom-rule-conditions.png" alt-text="Screenshot of the Custom rule condition options.":::
169-
170-
9. Select plus (**+**) to create a condition set.
171-
172-
When the rule condition or condition set is met, the alert is sent. You will be notified if the condition logic is not valid.
173-
174-
**Condition based on when activity took place**
175-
176-
Create conditions based on when the activity was detected. In the Detected section, select a time period and day in which the detection must occur in order to send the alert. You can choose to send the alert if the activity is detected:
177-
- any time throughout the day
178-
- during working hours
179-
- after working hours
180-
- a specific time
181-
182-
Use the Define working hours option to instruct Defender for IoT working hours for your organization.
183-
184-
#### Define rule actions
185-
186-
The following actions can be defined for the rule:
187-
188-
- Indicate if the rule triggers an **Alarm** or **Event**.
189-
- Assign a severity level to the alert (Critical, Major, Minor, Warning).
190-
- Indicate if the alert will include a PCAP file.
191-
192-
The rule is added to the **Customized Alerts Rules** page.
193-
194-
:::image type="content" source="media/how-to-work-with-alerts-sensor/custom-alerts-page.png" alt-text="Screenshot of the main Custom alerts page." lightbox="media/how-to-work-with-alerts-sensor/custom-alerts-page.png":::
195-
196-
### Managing customer alert rules
197-
198-
Manage the rules you create from the Custom alert rules page, for example:
199-
200-
201-
- Review the last time the rule was triggered, the number of times the alert was triggered for the rule in the last week, or the last time the rule was modified.
202-
- Enable or disable rules.
203-
- Delete rules.
204-
205-
Select the checkbox next to multiple rules to perform a bulk enable/disable or delete.
206-
207-
### Tracking changes to custom alert rules
208-
209-
Changes made to custom alert rules are tracked in the event timeline. For example if a user changes a severity level, the protocol detected or any other rule parameter.
210-
211-
**To view changes to the alert rule:**
212-
213-
1. Navigate to the Event timeline page.
134+
You can disable custom alert rules to prevent them from running without deleting them altogether.
214135

136+
In the **Custom alert rules** page, select one or more rules, and then select **Enable**, **Disable**, or **Delete** in the toolbar as needed.
215137

216138
## Next steps
217139

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ The Defender for IoT sensor and on-premises management console update packages i
4444
- [Enhanced sensor Overview page](#enhanced-sensor-overview-page)
4545
- [New support diagnostics log](#new-support-diagnostics-log)
4646
- [Alert updates](#alert-updates)
47+
- [Custom alert updates](#custom-alert-updates)
4748
- [CLI command updates](#cli-command-updates)
4849
- [Update to version 22.1.x](#update-to-version-221x)
4950
- [New connectivity model and firewall requirements](#new-connectivity-model-and-firewall-requirements)
@@ -168,6 +169,8 @@ The sensor console's **Custom alert rules** page now provides:
168169

169170
:::image type="content" source="media/how-to-manage-sensors-on-the-cloud/protocol-support-custom-alerts.png" alt-text="Screenshot of the updated Custom alerts dialog. "lightbox="media/how-to-manage-sensors-on-the-cloud/protocol-support-custom-alerts.png":::
170171

172+
For more information and the updated custom alert procedure, see [Customize alert rules](how-to-accelerate-alert-incident-response.md#customize-alert-rules).
173+
171174
### CLI command updates
172175

173176
The Defender for Iot sensor software installation is now containerized. With the now-containerized sensor, you can use the *cyberx_host* user to investigate issues with other containers or the operating system, or to send files via FTP.

0 commit comments

Comments
 (0)