You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-sensor.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,7 +111,7 @@ For more information about working with certificates, see [Manage certificates](
111
111
112
112
1. Approve the terms and conditions.
113
113
114
-
1. Select **Activate**. The SSL/TLS certificate tab opens. Before defining certificates, see [About certificates](#about-certificates).
114
+
1. Select **Activate**. The SSL/TLS certificate tab opens. Before defining certificates, see [Deploy SSL/TLS certificates on OT appliances](how-to-deploy-certificates.md).
115
115
116
116
It is **not recommended** to use a locally generated certificate in a production environment.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-forward-alert-information-to-partners.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,14 +29,13 @@ This article describes how to configure your OT sensor or on-premises management
29
29
> [!NOTE]
30
30
> Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
31
31
32
-
33
32
## Prerequisites
34
33
35
34
- Depending on where you want to create your forwarding alert rules, you'll need to have either an [OT network sensor or on-premises management console installed](how-to-install-software.md), with access as an **Admin** user.
36
35
37
36
For more information, see [Install OT agentless monitoring software](how-to-install-software.md) and [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
38
37
39
-
- You'll also need to define SMTP settings on the OT sensor or on-premises management console.
38
+
- You'll also need to define SMTP settings on the OT sensor or on-premises management console.
40
39
41
40
For more information, see [Configure SMTP settings on an OT sensor](how-to-manage-individual-sensors.md#configure-smtp-settings) and [Configure SMTP settings on an on-premises management console](how-to-manage-the-on-premises-management-console.md#mail-server-settings).
42
41
@@ -93,7 +92,6 @@ To edit or delete an existing rule:
93
92
94
93
1. When you're done configuring the rule, select **SAVE**. The rule is listed on the **Forwarding** page.
95
94
96
-
97
95
1. Test the rule you've created:
98
96
99
97
1. On the row for your rule, select the :::image type="icon" source="media/how-to-forward-alert-information-to-partners/run-button.png" border="false"::: **test this forwarding rule** button. A success notification is shown if the message sent successfully.
@@ -127,7 +125,6 @@ In the **Actions** area, enter the following details:
127
125
|**Email**| Enter the email address you want to forward the alerts to. Each rule supports a single email address. |
128
126
|**Timezone**| Select the time zone you want to use for the alert detection in the target system. |
129
127
130
-
131
128
### Syslog server actions
132
129
133
130
Configure a Syslog server action to forward alert data to the selected type of Syslog server.
@@ -305,13 +302,12 @@ If your forwarding alert rules aren't working as expected, check the following d
305
302
306
303
-**Certificate validation**. Forwarding rules for [Syslog CEF](#syslog-server-actions), [Microsoft Sentinel](integrate-overview.md#microsoft-sentinel), and [QRadar](tutorial-qradar.md) support encryption and certificate validation.
307
304
308
-
If your OT sensors or on-premises management console are configured to [validate certificates](how-to-deploy-certificates.md#about-certificate-validation) and the certificate can't be verified, the alerts aren't forwarded.
305
+
If your OT sensors or on-premises management console are configured to [validate certificates](how-to-deploy-certificates.md#verify-crl-server-access) and the certificate can't be verified, the alerts aren't forwarded.
309
306
310
307
In these cases, the sensor or on-premises management console is the session's client and initiator. Certificates are typically received from the server or use asymmetric encryption, where a specific certificate is provided to set up the integration.
311
308
312
309
-**Alert exclusion rules**. If you have exclusion rules configured on your on-premises management console, your sensors might be ignoring the alerts you're trying to forward. For more information, see [Create alert exclusion rules on an on-premises management console](how-to-accelerate-alert-incident-response.md#create-alert-exclusion-rules-on-an-on-premises-management-console).
313
310
314
-
315
311
## Next steps
316
312
317
313
> [!div class="nextstepaction"]
@@ -326,3 +322,6 @@ If your forwarding alert rules aren't working as expected, check the following d
326
322
> [!div class="nextstepaction"]
327
323
> [OT monitoring alert types and descriptions](alert-engine-messages.md)
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,11 +134,11 @@ Sensor Administrators may be required to update certificates that were uploaded
134
134
- Upload a CRT file and key file.
135
135
- Upload a PEM file if necessary.
136
136
137
-
If the upload fails, contact your security or IT administrator, or review the information in [About Certificates](how-to-deploy-certificates.md).
137
+
If the upload fails, contact your security or IT administrator, or review the information in [Deploy SSL/TLS certificates on OT appliances](how-to-deploy-certificates.md).
138
138
139
139
**To change the certificate validation setting:**
140
140
141
-
1. Enable or disable the **Enable Certificate Validation** toggle. If the option is enabled and validation fails, communication between relevant components is halted, and a validation error is presented in the console. If disabled, certificate validation is not carried out. See [About certificate validation](how-to-deploy-certificates.md#about-certificate-validation) for more information.
141
+
1. Enable or disable the **Enable Certificate Validation** toggle. If the option is enabled and validation fails, communication between relevant components is halted, and a validation error is presented in the console. If disabled, certificate validation is not carried out. See [Verify CRL server access](how-to-deploy-certificates.md#verify-crl-server-access) for more information.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-manage-the-on-premises-management-console.md
+34-31Lines changed: 34 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,10 +44,15 @@ After initial activation, the number of monitored devices might exceed the numbe
44
44
1. Select **Activation**.
45
45
1. Select **Choose a File** and select the file that you saved.
46
46
47
-
48
47
## Manage certificates
49
48
50
-
Following on-premises management console installation, a local self-signed certificate is generated and used to access the web application. When logging in to the on-premises management console for the first time, Administrator users are prompted to provide an SSL/TLS certificate.
49
+
When you first [install an on-premises management console](ot-deploy/install-software-on-premises-management-console.md), a local, self-signed certificate is generated and used to access the on-premises management console's UI. When signing into the on-premises management console for the first time, **Admin** users are prompted to provide an SSL/TLS certificate.
50
+
51
+
If your certificate has expired, make sure to create a new one and upload it to your on-premises management console.
52
+
53
+
For more information, see [Deploy SSL/TLS certificates on OT appliances](how-to-deploy-certificates.md).
54
+
55
+
Following on-premises management console installation, a local self-signed certificate is generated and used to access the web application. When logging in to the on-premises management console for the first time, Administrator users are prompted to provide an SSL/TLS certificate.
51
56
52
57
Administrators may be required to update certificates that were uploaded after initial login. This may happen for example if a certificate expired.
53
58
@@ -69,22 +74,22 @@ If the upload fails, contact your security or IT administrator, or review the in
69
74
70
75
**To change the certificate validation setting:**
71
76
72
-
1. Enable or disable the **Enable Certificate Validation** toggle. If the option is enabled and validation fails, communication between relevant components is halted and a validation error is presented in the console. If disabled, certificate validation is not carried out. See [About certificate validation](how-to-deploy-certificates.md#about-certificate-validation) for more information.
77
+
1. Enable or disable the **Enable Certificate Validation** toggle. If the option is enabled and validation fails, communication between relevant components is halted and a validation error is presented in the console. If disabled, certificate validation is not carried out. See [Verify CRL server access](how-to-deploy-certificates.md#verify-crl-server-access) for more information.
73
78
74
79
1. Select **Save**.
75
80
76
81
For more information about first-time certificate upload, see [First-time sign-in and activation checklist](how-to-activate-and-set-up-your-sensor.md#first-time-sign-in-and-activation-checklist).
77
82
78
83
## Define backup and restore settings
79
84
80
-
The on-premises management console system backup is performed automatically, daily. The data is saved on a different disk. The default location is `/var/cyberx/backups`.
85
+
The on-premises management console system backup is performed automatically, daily. The data is saved on a different disk. The default location is `/var/cyberx/backups`.
81
86
82
-
You can automatically transfer this file to the internal network.
87
+
You can automatically transfer this file to the internal network.
83
88
84
89
> [!NOTE]
85
-
> You can perform the backup and restore procedure on the same version only.
90
+
> You can perform the backup and restore procedure on the same version only.
86
91
87
-
To back up the on-premises management console machine:
92
+
To back up the on-premises management console machine:
88
93
89
94
- Sign in to an administrative account and enter `sudo cyberx-management-backup -full`.
90
95
@@ -96,37 +101,37 @@ To save the backup to an external SMB server:
96
101
97
102
1. Create a shared folder in the external SMB server.
98
103
99
-
Get the folder path, username, and password required to access the SMB server.
104
+
Get the folder path, username, and password required to access the SMB server.
100
105
101
106
2. In Defender for IoT, make a directory for the backups:
-`set Backup.shared_location to <backup_folder_name_on_server>`
132
137
@@ -136,9 +141,9 @@ To edit the management console's host name configured in the organizational DNS
136
141
137
142
1. In the management console's left pane, select **System Settings**.
138
143
139
-
2. In the console's networking section, select **Network**.
144
+
2. In the console's networking section, select **Network**.
140
145
141
-
3. Enter the host name configured in the organizational DNS server.
146
+
3. Enter the host name configured in the organizational DNS server.
142
147
143
148
4. Select **Save**.
144
149
@@ -160,21 +165,21 @@ The following procedure connects a sensor to the on-premises management console
160
165
161
166
1. Sign in to the on-premises management console appliance CLI with administrative credentials.
162
167
163
-
2. Type `sudo cyberx-management-tunnel-enable` and select **Enter**.
168
+
1. Type `sudo cyberx-management-tunnel-enable` and select **Enter**.
164
169
165
-
4. Type `--port 10000` and select **Enter**.
170
+
1. Type `--port 10000` and select **Enter**.
166
171
167
172
## Adjust system properties
168
173
169
174
System properties control various operations and settings in the management console. Editing or modifying them might damage the management console's operation. Consult with [Microsoft Support](https://support.microsoft.com) before changing your settings.
170
175
171
-
To access system properties:
176
+
To access system properties:
172
177
173
178
1. Sign in to the on-premises management console or the sensor.
174
179
175
-
2. Select **System Settings**.
180
+
1. Select **System Settings**.
176
181
177
-
3. Select **System Properties** from the **General** section.
182
+
1. Select **System Properties** from the **General** section.
178
183
179
184
## Change the name of the on-premises management console
180
185
@@ -186,11 +191,11 @@ To change the name:
186
191
187
192
:::image type="content" source="media/how-to-change-the-name-of-your-azure-consoles/console-name.png" alt-text="Screenshot of the on-premises management console version.":::
188
193
189
-
2. In the **Edit management console configuration** dialog box, enter the new name. The name can't be longer than 25 characters.
194
+
1. In the **Edit management console configuration** dialog box, enter the new name. The name can't be longer than 25 characters.
190
195
191
196
:::image type="content" source="media/how-to-change-the-name-of-your-azure-consoles/edit-management-console-configuration.png" alt-text="Screenshot of editing the Defender for IoT platform configuration.":::
192
197
193
-
3. Select **Save**. The new name is applied.
198
+
1. Select **Save**. The new name is applied.
194
199
195
200
:::image type="content" source="media/how-to-change-the-name-of-your-azure-consoles/name-changed.png" alt-text="Screenshot that shows the changed name of the console.":::
196
201
@@ -207,13 +212,12 @@ To reset your password:
207
212
1. Enter the unique identifier and select **Recover**. The activation file is downloaded.
208
213
1. Go to the **Password Recovery** page and upload the activation file.
209
214
1. Select **Next**.
210
-
215
+
211
216
You're now given your username and a new system-generated password.
212
217
213
218
> [!NOTE]
214
219
> The sensor is linked to the subscription that it was originally connected to. You can recover the password only by using the same subscription that it's attached to.
215
220
216
-
217
221
## Mail server settings
218
222
219
223
Define SMTP mail server settings for the on-premises management console.
@@ -228,7 +232,6 @@ To define:
228
232
`mail.sender=`
229
233
1. Enter the SMTP server name and sender and select enter.
0 commit comments