Skip to content

Commit a400535

Browse files
Merge pull request #237426 from Shereen-Bhar/NTP-Active-Directory-features
NTP and Active Directory remote config
2 parents ca885a5 + e9e0e55 commit a400535

File tree

5 files changed

+44
-0
lines changed

5 files changed

+44
-0
lines changed

articles/defender-for-iot/organizations/configure-sensor-settings-portal.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,27 @@ Continue by updating the relevant setting directly on the OT network sensor. For
112112

113113
Use the following sections to learn more about the individual OT sensor settings available from the Azure portal:
114114

115+
### Active Directory
116+
117+
To configure Active Directory settings from the Azure portal, define values for the following options:
118+
119+
|Name |Description |
120+
|---------|---------|
121+
|**Domain Controller FQDN** | The fully qualified domain name (FQDN), exactly as it appears on your LDAP server. For example, enter `host1.subdomain.contoso.com`. <br><br> If you encounter an issue with the integration using the FQDN, check your DNS configuration. You can also enter the explicit IP of the LDAP server instead of the FQDN when setting up the integration. |
122+
|**Domain Controller Port** | The port where your LDAP is configured. For example, use port 636 for LDAPS (SSL) connections. |
123+
|**Primary Domain** | The domain name, such as `subdomain.contoso.com`, and then select the connection type for your LDAP configuration. <br><br>Supported connection types include: **LDAPS/NTLMv3** (recommended), **LDAP/NTLMv3**, or **LDAP/SASL-MD5** |
124+
|**Active Directory Groups** | Select **+ Add** to add an Active Directory group to each permission level listed, as needed. <br><br> When you enter a group name, make sure that you enter the group name exactly as it's defined in your Active Directory configuration on the LDAP server. You'll use these group names when adding new sensor users with Active Directory.<br><br> Supported permission levels include **Read-only**, **Security Analyst**, **Admin**, and **Trusted Domains**. |
125+
126+
> [!IMPORTANT]
127+
> When entering LDAP parameters:
128+
>
129+
> - Define values exactly as they appear in Active Directory, except for the case.
130+
> - User lowercase characters only, even if the configuration in Active Directory uses uppercase.
131+
> - LDAP and LDAPS can't be configured for the same domain. However, you can configure each in different domains and then use them at the same time.
132+
>
133+
134+
To add another Active Directory server, select **+ Add Server** and define those server values.
135+
115136
### Bandwidth cap
116137

117138
For a bandwidth cap, define the maximum bandwidth you want the sensor to use for outgoing communication from the sensor to the cloud, either in Kbps or Mbps.
@@ -120,6 +141,10 @@ For a bandwidth cap, define the maximum bandwidth you want the sensor to use for
120141

121142
**Minimum required for a stable connection to Azure**: 350 Kbps. At this minimum setting, connections to the sensor console may be slower than usual.
122143

144+
### NTP
145+
146+
To configure an NTP server for your sensor from the Azure portal, define an IP/Domain address of a valid IPv4 NTP server using port 123.
147+
123148
### Subnet
124149

125150
To focus the Azure device inventory on devices that are in your IoT/OT scope, you will need to manually edit the subnet list to include only the locally monitored subnets that are in your IoT/OT scope. Once the subnets have been configured, the network location of the devices is shown in the *Network location* (Public preview) column in the Azure device inventory. All of the devices associated with the listed subnets will be displayed as *local*, while devices associated with detected subnets not included in the list will be displayed as *routed*.

articles/defender-for-iot/organizations/how-to-troubleshoot-sensor.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -263,6 +263,9 @@ For more information, see:
263263

264264
You can configure a standalone sensor and a management console, with the sensors related to it, to connect to NTP.
265265

266+
> [!TIP]
267+
> When you're ready to start managing your OT sensor settings at scale, define NTP settings from the Azure portal. Once you apply settings from the Azure portal, settings on the sensor console are read-only. For more information, see [Configure OT sensor settings from the Azure portal (Public preview)](configure-sensor-settings-portal.md).
268+
266269
To connect a standalone sensor to NTP:
267270

268271
- [See the CLI documentation](./references-work-with-defender-for-iot-cli-commands.md).

articles/defender-for-iot/organizations/manage-users-sensor.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ We recommend configuring on-premises users on your OT sensor with Active Directo
2626

2727
For example, use Active Directory when you have a large number of users that you want to assign Read Only access to, and you want to manage those permissions at the group level.
2828

29+
> [!TIP]
30+
> When you're ready to start managing your OT sensor settings at scale, define Active Directory settings from the Azure portal. Once you apply settings from the Azure portal, settings on the sensor console are read-only. For more information, see [Configure OT sensor settings from the Azure portal (Public preview)](configure-sensor-settings-portal.md).
31+
2932
**To integrate with Active Directory**:
3033

3134
1. Sign in to your OT sensor and select **System Settings** > **Integrations** > **Active Directory**.

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -142,6 +142,7 @@ This version includes bug fixes for stability improvements.
142142
**Supported until**: 12/2023
143143

144144
- [Azure connectivity status shown on OT sensors](how-to-manage-individual-sensors.md#validate-connectivity-status)
145+
- [Configure Active Directory and NTP settings in the Azure portal](configure-sensor-settings-portal.md#active-directory)
145146

146147
## Versions 22.2.x
147148

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,18 @@ Features released earlier than nine months ago are described in the [What's new
1616
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1717
>
1818
19+
## May 2023
20+
21+
|Service area |Updates |
22+
|---------|---------|
23+
| **OT networks** | **Sensor versions 22.3.x and higher**: <br>- [Configure Active Directory and NTP settings in the Azure portal](#configure-active-directory-and-ntp-settings-in-the-azure-portal) |
24+
25+
### Configure Active Directory and NTP settings in the Azure portal
26+
27+
Now you can configure Active Directory and NTP settings for your OT sensors remotely from the **Sites and sensors** page in the Azure portal. These settings are available for OT sensor versions 22.3.x and higher.
28+
29+
For more information, see [Sensor setting reference](configure-sensor-settings-portal.md#sensor-setting-reference)
30+
1931
## April 2023
2032

2133
|Service area |Updates |

0 commit comments

Comments
 (0)