Skip to content

Commit a73d83f

Browse files
authored
Merge pull request #223007 from Shereen-Bhar/import-ssl-certificate
Import SSL certificates
2 parents 3c5e258 + b2ea1df commit a73d83f

11 files changed

+217
-177
lines changed

articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-sensor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ For more information about working with certificates, see [Manage certificates](
111111

112112
1. Approve the terms and conditions.
113113

114-
1. Select **Activate**. The SSL/TLS certificate tab opens. Before defining certificates, see [About certificates](#about-certificates).
114+
1. Select **Activate**. The SSL/TLS certificate tab opens. Before defining certificates, see [Deploy SSL/TLS certificates on OT appliances](how-to-deploy-certificates.md).
115115

116116
It is **not recommended** to use a locally generated certificate in a production environment.
117117

articles/defender-for-iot/organizations/how-to-deploy-certificates.md

Lines changed: 175 additions & 137 deletions
Large diffs are not rendered by default.

articles/defender-for-iot/organizations/how-to-forward-alert-information-to-partners.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,13 @@ This article describes how to configure your OT sensor or on-premises management
2929
> [!NOTE]
3030
> Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
3131
32-
3332
## Prerequisites
3433

3534
- Depending on where you want to create your forwarding alert rules, you'll need to have either an [OT network sensor or on-premises management console installed](how-to-install-software.md), with access as an **Admin** user.
3635

3736
For more information, see [Install OT agentless monitoring software](how-to-install-software.md) and [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
3837

39-
- You'll also need to define SMTP settings on the OT sensor or on-premises management console.
38+
- You'll also need to define SMTP settings on the OT sensor or on-premises management console.
4039

4140
For more information, see [Configure SMTP settings on an OT sensor](how-to-manage-individual-sensors.md#configure-smtp-settings) and [Configure SMTP settings on an on-premises management console](how-to-manage-the-on-premises-management-console.md#mail-server-settings).
4241

@@ -93,7 +92,6 @@ To edit or delete an existing rule:
9392

9493
1. When you're done configuring the rule, select **SAVE**. The rule is listed on the **Forwarding** page.
9594

96-
9795
1. Test the rule you've created:
9896

9997
1. On the row for your rule, select the :::image type="icon" source="media/how-to-forward-alert-information-to-partners/run-button.png" border="false"::: **test this forwarding rule** button. A success notification is shown if the message sent successfully.
@@ -127,7 +125,6 @@ In the **Actions** area, enter the following details:
127125
|**Email** | Enter the email address you want to forward the alerts to. Each rule supports a single email address. |
128126
|**Timezone** | Select the time zone you want to use for the alert detection in the target system. |
129127

130-
131128
### Syslog server actions
132129

133130
Configure a Syslog server action to forward alert data to the selected type of Syslog server.
@@ -305,13 +302,12 @@ If your forwarding alert rules aren't working as expected, check the following d
305302

306303
- **Certificate validation**. Forwarding rules for [Syslog CEF](#syslog-server-actions), [Microsoft Sentinel](integrate-overview.md#microsoft-sentinel), and [QRadar](tutorial-qradar.md) support encryption and certificate validation.
307304

308-
If your OT sensors or on-premises management console are configured to [validate certificates](how-to-deploy-certificates.md#about-certificate-validation) and the certificate can't be verified, the alerts aren't forwarded.
305+
If your OT sensors or on-premises management console are configured to [validate certificates](how-to-deploy-certificates.md#verify-crl-server-access) and the certificate can't be verified, the alerts aren't forwarded.
309306

310307
In these cases, the sensor or on-premises management console is the session's client and initiator. Certificates are typically received from the server or use asymmetric encryption, where a specific certificate is provided to set up the integration.
311308

312309
- **Alert exclusion rules**. If you have exclusion rules configured on your on-premises management console, your sensors might be ignoring the alerts you're trying to forward. For more information, see [Create alert exclusion rules on an on-premises management console](how-to-accelerate-alert-incident-response.md#create-alert-exclusion-rules-on-an-on-premises-management-console).
313310

314-
315311
## Next steps
316312

317313
> [!div class="nextstepaction"]
@@ -326,3 +322,6 @@ If your forwarding alert rules aren't working as expected, check the following d
326322
> [!div class="nextstepaction"]
327323
> [OT monitoring alert types and descriptions](alert-engine-messages.md)
328324
325+
326+
> [!div class="nextstepaction"]
327+
> [Microsoft Defender for IoT alerts](alerts.md)

articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,11 +134,11 @@ Sensor Administrators may be required to update certificates that were uploaded
134134
- Upload a CRT file and key file.
135135
- Upload a PEM file if necessary.
136136

137-
If the upload fails, contact your security or IT administrator, or review the information in [About Certificates](how-to-deploy-certificates.md).
137+
If the upload fails, contact your security or IT administrator, or review the information in [Deploy SSL/TLS certificates on OT appliances](how-to-deploy-certificates.md).
138138

139139
**To change the certificate validation setting:**
140140

141-
1. Enable or disable the **Enable Certificate Validation** toggle. If the option is enabled and validation fails, communication between relevant components is halted, and a validation error is presented in the console. If disabled, certificate validation is not carried out. See [About certificate validation](how-to-deploy-certificates.md#about-certificate-validation) for more information.
141+
1. Enable or disable the **Enable Certificate Validation** toggle. If the option is enabled and validation fails, communication between relevant components is halted, and a validation error is presented in the console. If disabled, certificate validation is not carried out. See [Verify CRL server access](how-to-deploy-certificates.md#verify-crl-server-access) for more information.
142142

143143
1. Select **Save**.
144144

articles/defender-for-iot/organizations/how-to-manage-the-on-premises-management-console.md

Lines changed: 34 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,15 @@ After initial activation, the number of monitored devices might exceed the numbe
4444
1. Select **Activation**.
4545
1. Select **Choose a File** and select the file that you saved.
4646

47-
4847
## Manage certificates
4948

50-
Following on-premises management console installation, a local self-signed certificate is generated and used to access the web application. When logging in to the on-premises management console for the first time, Administrator users are prompted to provide an SSL/TLS certificate.
49+
When you first [install an on-premises management console](ot-deploy/install-software-on-premises-management-console.md), a local, self-signed certificate is generated and used to access the on-premises management console's UI. When signing into the on-premises management console for the first time, **Admin** users are prompted to provide an SSL/TLS certificate.
50+
51+
If your certificate has expired, make sure to create a new one and upload it to your on-premises management console.
52+
53+
For more information, see [Deploy SSL/TLS certificates on OT appliances](how-to-deploy-certificates.md).
54+
55+
Following on-premises management console installation, a local self-signed certificate is generated and used to access the web application. When logging in to the on-premises management console for the first time, Administrator users are prompted to provide an SSL/TLS certificate.
5156

5257
Administrators may be required to update certificates that were uploaded after initial login. This may happen for example if a certificate expired.
5358

@@ -69,22 +74,22 @@ If the upload fails, contact your security or IT administrator, or review the in
6974

7075
**To change the certificate validation setting:**
7176

72-
1. Enable or disable the **Enable Certificate Validation** toggle. If the option is enabled and validation fails, communication between relevant components is halted and a validation error is presented in the console. If disabled, certificate validation is not carried out. See [About certificate validation](how-to-deploy-certificates.md#about-certificate-validation) for more information.
77+
1. Enable or disable the **Enable Certificate Validation** toggle. If the option is enabled and validation fails, communication between relevant components is halted and a validation error is presented in the console. If disabled, certificate validation is not carried out. See [Verify CRL server access](how-to-deploy-certificates.md#verify-crl-server-access) for more information.
7378

7479
1. Select **Save**.
7580

7681
For more information about first-time certificate upload, see [First-time sign-in and activation checklist](how-to-activate-and-set-up-your-sensor.md#first-time-sign-in-and-activation-checklist).
7782

7883
## Define backup and restore settings
7984

80-
The on-premises management console system backup is performed automatically, daily. The data is saved on a different disk. The default location is `/var/cyberx/backups`.
85+
The on-premises management console system backup is performed automatically, daily. The data is saved on a different disk. The default location is `/var/cyberx/backups`.
8186

82-
You can automatically transfer this file to the internal network.
87+
You can automatically transfer this file to the internal network.
8388

8489
> [!NOTE]
85-
> You can perform the backup and restore procedure on the same version only.
90+
> You can perform the backup and restore procedure on the same version only.
8691
87-
To back up the on-premises management console machine:
92+
To back up the on-premises management console machine:
8893

8994
- Sign in to an administrative account and enter `sudo cyberx-management-backup -full`.
9095

@@ -96,37 +101,37 @@ To save the backup to an external SMB server:
96101

97102
1. Create a shared folder in the external SMB server.
98103

99-
Get the folder path, username, and password required to access the SMB server.
104+
Get the folder path, username, and password required to access the SMB server.
100105

101106
2. In Defender for IoT, make a directory for the backups:
102107

103-
- `sudo mkdir /<backup_folder_name_on_ server>`
108+
- `sudo mkdir /<backup_folder_name_on_ server>`
104109

105-
- `sudo chmod 777 /<backup_folder_name_on_c_server>/`
110+
- `sudo chmod 777 /<backup_folder_name_on_c_server>/`
106111

107112
3. Edit fstab: 
108113

109-
- `sudo nano /etc/fstab`
114+
- `sudo nano /etc/fstab`
110115

111-
- `add - //<server_IP>/<folder_path> /<backup_folder_name_on_server> cifs rw,credentials=/etc/samba/user,vers=3.0,uid=cyberx,gid=cyberx,file_mode=0777,dir_mode=0777 0 0`
116+
- `add - //<server_IP>/<folder_path> /<backup_folder_name_on_server> cifs rw,credentials=/etc/samba/user,vers=3.0,uid=cyberx,gid=cyberx,file_mode=0777,dir_mode=0777 0 0`
112117

113-
4. Edit or create credentials for the SMB server to share:
118+
4. Edit or create credentials for the SMB server to share:
114119

115-
- `sudo nano /etc/samba/user`
120+
- `sudo nano /etc/samba/user`
116121

117-
5. Add:
122+
5. Add:
118123

119124
- `username=<user name>`
120125

121-
- `password=<password>`
126+
- `password=<password>`
122127

123-
6. Mount the directory:
128+
6. Mount the directory:
124129

125-
- `sudo mount -a`
130+
- `sudo mount -a`
126131

127132
7. Configure a backup directory to the shared folder on the Defender for IoT on-premises management console: 
128133

129-
- `sudo nano /var/cyberx/properties/backup.properties`
134+
- `sudo nano /var/cyberx/properties/backup.properties`
130135

131136
- `set Backup.shared_location to <backup_folder_name_on_server>`
132137

@@ -136,9 +141,9 @@ To edit the management console's host name configured in the organizational DNS
136141

137142
1. In the management console's left pane, select **System Settings**.
138143

139-
2. In the console's networking section, select **Network**.
144+
2. In the console's networking section, select **Network**.
140145

141-
3. Enter the host name configured in the organizational DNS server.
146+
3. Enter the host name configured in the organizational DNS server.
142147

143148
4. Select **Save**.
144149

@@ -160,21 +165,21 @@ The following procedure connects a sensor to the on-premises management console
160165

161166
1. Sign in to the on-premises management console appliance CLI with administrative credentials.
162167

163-
2. Type `sudo cyberx-management-tunnel-enable` and select **Enter**.
168+
1. Type `sudo cyberx-management-tunnel-enable` and select **Enter**.
164169

165-
4. Type `--port 10000` and select **Enter**.
170+
1. Type `--port 10000` and select **Enter**.
166171

167172
## Adjust system properties
168173

169174
System properties control various operations and settings in the management console. Editing or modifying them might damage the management console's operation. Consult with [Microsoft Support](https://support.microsoft.com) before changing your settings.
170175

171-
To access system properties:
176+
To access system properties:
172177

173178
1. Sign in to the on-premises management console or the sensor.
174179

175-
2. Select **System Settings**.
180+
1. Select **System Settings**.
176181

177-
3. Select **System Properties** from the **General** section.
182+
1. Select **System Properties** from the **General** section.
178183

179184
## Change the name of the on-premises management console
180185

@@ -186,11 +191,11 @@ To change the name:
186191

187192
:::image type="content" source="media/how-to-change-the-name-of-your-azure-consoles/console-name.png" alt-text="Screenshot of the on-premises management console version.":::
188193

189-
2. In the **Edit management console configuration** dialog box, enter the new name. The name can't be longer than 25 characters.
194+
1. In the **Edit management console configuration** dialog box, enter the new name. The name can't be longer than 25 characters.
190195

191196
:::image type="content" source="media/how-to-change-the-name-of-your-azure-consoles/edit-management-console-configuration.png" alt-text="Screenshot of editing the Defender for IoT platform configuration.":::
192197

193-
3. Select **Save**. The new name is applied.
198+
1. Select **Save**. The new name is applied.
194199

195200
:::image type="content" source="media/how-to-change-the-name-of-your-azure-consoles/name-changed.png" alt-text="Screenshot that shows the changed name of the console.":::
196201

@@ -207,13 +212,12 @@ To reset your password:
207212
1. Enter the unique identifier and select **Recover**. The activation file is downloaded.
208213
1. Go to the **Password Recovery** page and upload the activation file.
209214
1. Select **Next**.
210-
215+
211216
You're now given your username and a new system-generated password.
212217

213218
> [!NOTE]
214219
> The sensor is linked to the subscription that it was originally connected to. You can recover the password only by using the same subscription that it's attached to.
215220
216-
217221
## Mail server settings
218222

219223
Define SMTP mail server settings for the on-premises management console.
@@ -228,7 +232,6 @@ To define:
228232
`mail.sender=`
229233
1. Enter the SMTP server name and sender and select enter.
230234

231-
232235
## Next steps
233236

234237
For more information, see:
428 KB
Loading
586 KB
Loading
341 KB
Loading
63.4 KB
Loading
1.01 KB
Loading

0 commit comments

Comments
 (0)