Skip to content

Commit add9fa1

Browse files
committed
adding note to all relevant integrations
1 parent 13566f0 commit add9fa1

File tree

8 files changed

+51
-34
lines changed

8 files changed

+51
-34
lines changed

articles/defender-for-iot/organizations/integrations/arcsight.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ For more information, see the [ArcSight SmartConnectors Documentation](https://w
2828

2929
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to ArcSight.
3030

31+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
32+
3133
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
3234

3335
1. Sign in to your OT sensor console and select **Forwarding** on the left.

articles/defender-for-iot/organizations/integrations/logrhythm.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ Before you begin, make sure that you have the following prerequisites:
1919

2020
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to LogRhythm.
2121

22+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
23+
2224
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
2325

2426
1. Sign in to your OT sensor console and select **Forwarding** on the left.

articles/defender-for-iot/organizations/integrations/netwitness.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ Before you begin, make sure that you have the following prerequisites:
2121

2222
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to NetWitness.
2323

24+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
25+
2426
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
2527

2628
1. Sign in to your OT sensor console and select **Forwarding** on the left.

articles/defender-for-iot/organizations/integrations/service-now-legacy.md

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -7,45 +7,47 @@ ms.date: 08/11/2022
77

88
# Tutorial: Integrate ServiceNow with Microsoft Defender for IoT (legacy)
99

10-
> [!Note]
10+
> [!NOTE]
1111
> A new [Operational Technology Manager](https://store.servicenow.com/sn_appstore_store.do#!/store/application/31eed0f72337201039e2cb0a56bf65ef/1.1.2?referer=%2Fstore%2Fsearch%3Flistingtype%3Dallintegrations%25253Bancillary_app%25253Bcertified_apps%25253Bcontent%25253Bindustry_solution%25253Boem%25253Butility%25253Btemplate%26q%3Doperational%2520technology%2520manager&sl=sh) integration is now available from the ServiceNow store. The new integration streamlines Microsoft Defender for IoT sensor appliances, OT assets, network connections, and vulnerabilities to ServiceNow’s Operational Technology (OT) data model.
1212
>
1313
>Please read the ServiceNow’s supporting links and docs for the ServiceNow's terms of service.
1414
>
1515
>Microsoft Defender for IoT's legacy integration with ServiceNow is not affected by the new integrations and Microsoft will continue supporting it.
1616
>
1717
> For more information, see the new [ServiceNow integrations](../tutorial-servicenow.md), and the ServiceNow documentation on the ServiceNow store:
18+
>
1819
>- [Service Graph Connector (SGC)](https://store.servicenow.com/sn_appstore_store.do#!/store/application/ddd4bf1b53f130104b5cddeeff7b1229)
1920
>- [Vulnerability Response (VR)](https://store.servicenow.com/sn_appstore_store.do#!/store/application/463a7907c3313010985a1b2d3640dd7e).
2021
2122
This tutorial will help you learn how to integrate, and use ServiceNow with Microsoft Defender for IoT.
2223

2324
The Defender for IoT integration with ServiceNow provides a new level of centralized visibility, monitoring, and control for the IoT and OT landscape. These bridged platforms enable automated device visibility and threat management to previously unreachable ICS & IoT devices.
2425

25-
The ServiceNow Configuration Management Database (CMDB) is enriched, and supplemented with a rich set of device attributes that are pushed by the Defender for IoT platform. This ensures a comprehensive, and continuous visibility into the device landscape. This visibility lets you monitor, and respond from a single-pane-of-glass.
26+
The ServiceNow Configuration Management Database (CMDB) is enriched, and supplemented with a rich set of device attributes that are pushed by the Defender for IoT platform. This ensures a comprehensive, and continuous visibility into the device landscape. This visibility lets you monitor, and respond from a single-pane-of-glass.
2627

2728
In this tutorial, you learn how to:
2829

2930
> [!div class="checklist"]
30-
> * Download the Defender for IoT application in ServiceNow
31-
> * Set up Defender for IoT to communicate with ServiceNow
32-
> * Create access tokens in ServiceNow
33-
> * Send Defender for IoT device attributes to ServiceNow
34-
> * Set up the integration using an HTTPS proxy
35-
> * View Defender for IoT detections in ServiceNow
36-
> * View connected devices
31+
>
32+
> - Download the Defender for IoT application in ServiceNow
33+
> - Set up Defender for IoT to communicate with ServiceNow
34+
> - Create access tokens in ServiceNow
35+
> - Send Defender for IoT device attributes to ServiceNow
36+
> - Set up the integration using an HTTPS proxy
37+
> - View Defender for IoT detections in ServiceNow
38+
> - View connected devices
3739
3840
## Prerequisites
3941

4042
### Software requirements
4143

42-
Access to ServiceNow and Defender for IoT
44+
Access to ServiceNow and Defender for IoT
4345

4446
- ServiceNow Service Management version 3.0.2.
4547

4648
- Defender for IoT patch 2.8.11.1 or above.
4749

48-
> [!Note]
50+
> [!NOTE]
4951
>If you are already working with a Defender for IoT and ServiceNow integration and upgrade using the on-premises management console. In that case, the previous data from Defender for IoT sensors should be cleared from ServiceNow.
5052
5153
### Architecture
@@ -58,7 +60,7 @@ Access to ServiceNow and Defender for IoT
5860

5961
## Download the Defender for IoT application in ServiceNow
6062

61-
To access the Defender for IoT application within ServiceNow, you will need to download the application from the ServiceNow application store.
63+
To access the Defender for IoT application within ServiceNow, you will need to download the application from the ServiceNow application store.
6264

6365
**To access the Defender for IoT application in ServiceNow**:
6466

@@ -82,6 +84,8 @@ To access the Defender for IoT application within ServiceNow, you will need to d
8284

8385
Configure Defender for IoT to push alert information to the ServiceNow tables. Defender for IoT alerts will appear in ServiceNow as security incidents. This can be done by defining a Defender for IoT forwarding rule to send alert information to ServiceNow.
8486

87+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
88+
8589
**To push alert information to the ServiceNow tables**:
8690

8791
1. Sign in to the on-premises management console.
@@ -123,7 +127,7 @@ Configure Defender for IoT to push alert information to the ServiceNow tables. D
123127
| Client Secret | Enter the client secret string you created for Defender for IoT in the **Application Registries** page in ServiceNow. |
124128
| Report Type | **Incidents**: Forward a list of alerts that are presented in ServiceNow with an incident ID and short description of each alert.<br /><br />**Defender for IoT Application**: Forward full alert information, including the sensor details, the engine, the source, and destination addresses. The information is forwarded to the Defender for IoT on the ServiceNow application. |
125129

126-
1. Select **SAVE**.
130+
1. Select **SAVE**.
127131

128132
Defender for IoT alerts will now appear as incidents in ServiceNow.
129133

@@ -189,7 +193,7 @@ Defender for IoT supports an HTTPS proxy in the ServiceNow integration by enabli
189193

190194
3. Select **Save and Exit**.
191195

192-
4. Reset the on-premises management console using the following command:
196+
4. Reset the on-premises management console using the following command:
193197

194198
```bash
195199
sudo monit restart all
@@ -227,4 +231,4 @@ There are no resources to clean up.
227231

228232
## Next steps
229233

230-
In this article, you learned how to get started with the ServiceNow integration. Continue on to learn about our [Cisco integration](../tutorial-forescout.md).
234+
In this article, you learned how to get started with the ServiceNow integration. Continue on to learn about our [Cisco integration](../tutorial-forescout.md).

articles/defender-for-iot/organizations/tutorial-clearpass.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ The integration allows for the following:
2525
In this tutorial, you learn how to:
2626

2727
> [!div class="checklist"]
28+
>
2829
> - Create a ClearPass API user
2930
> - Create a ClearPass operator profile
3031
> - Create a ClearPass OAuth API client
@@ -151,6 +152,8 @@ To enable viewing the device inventory in ClearPass, you need to set up Defender
151152

152153
To enable viewing the alerts discovered by Defender for IoT in Aruba, you need to set the forwarding rule. This rule defines which information about the ICS, and SCADA security threats identified by Defender for IoT security engines is sent to ClearPass.
153154

155+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
156+
154157
**To define a ClearPass forwarding rule on the Defender for IoT sensor**:
155158

156159
1. In the Defender for IoT sensor, select **Forwarding** and then select **Create new rule**.
@@ -166,13 +169,12 @@ To enable viewing the alerts discovered by Defender for IoT in Aruba, you need t
166169
1. In the **Host** field, define the ClearPass server IP and port to send alert information.
167170
1. Define which alert information you want to forward.
168171
- **Report illegal function codes:** Protocol violations - Illegal field value violating ICS protocol specification (potential exploit).
169-
- **Report unauthorized PLC programming and firmware updates:** Unauthorized PLC changes.
170-
- **Report unauthorized PLC stop:** PLC stop (downtime).
171-
- **Report malware related alerts:** Industrial malware attempts, such as TRITON, NotPetya.
172+
- **Report unauthorized PLC programming and firmware updates:** Unauthorized PLC changes.
173+
- **Report unauthorized PLC stop:** PLC stop (downtime).
174+
- **Report malware related alerts:** Industrial malware attempts, such as TRITON, NotPetya.
172175
- **Report unauthorized scanning:** Unauthorized scanning (potential reconnaissance)
173176
1. Select **Save**.
174177

175-
176178
## Monitor ClearPass and Defender for IoT communication
177179

178180
Once the sync has started, endpoint data is populated directly into the Policy Manager EndpointDb, you can view the last update time from the integration configuration screen.
@@ -183,7 +185,6 @@ Once the sync has started, endpoint data is populated directly into the Policy M
183185

184186
1. Select **System settings** > **Integrations** > **ClearPass**.
185187

186-
187188
:::image type="content" source="media/tutorial-clearpass/last-sync.png" alt-text="Screenshot of the view the time and date of your last sync.":::
188189

189190
If Sync is not working, or shows an error, then it’s likely you’ve missed capturing some of the information. Recheck the data recorded, additionally you can view the API calls between Defender for IoT and ClearPass from **Guest** > **Administration** > **Support** > **Application Log**.
@@ -198,6 +199,4 @@ There are no resources to clean up.
198199

199200
## Next steps
200201

201-
In this article, you learned how to get started with the ClearPass integration. Continue on to learn about our [CyberArk integration](./tutorial-cyberark.md).
202-
203-
202+
In this article, you learned how to get started with the ClearPass integration. Continue on to learn about our [CyberArk integration](./tutorial-cyberark.md).

articles/defender-for-iot/organizations/tutorial-fortinet.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ Using a Business Services view, the complexity of managing network and security
3737
In this tutorial, you learn how to:
3838

3939
> [!div class="checklist"]
40+
>
4041
> - Create an API key in Fortinet
4142
> - Set a forwarding rule to block malware-related alerts
4243
> - Block the source of suspicious alerts
@@ -96,6 +97,8 @@ When the API key is generated, save it as it will not be provided again.
9697

9798
The FortiGate firewall can be used to block suspicious traffic.
9899

100+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
101+
99102
**To set a forwarding rule to block malware-related alerts**:
100103

101104
1. Sign in to the Microsoft Defender for IoT Management Console.
@@ -172,6 +175,8 @@ Each Defender for IoT alert is then parsed without any other configuration on th
172175

173176
You can then use Defender for IoT's Forwarding Rules to send alert information to FortiSIEM.
174177

178+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
179+
175180
**To use Defender for IoT's Forwarding Rules to send alert information to FortiSIEM**:
176181

177182
1. From the sensor, or management console left pane, select **Forwarding**.
@@ -252,5 +257,3 @@ There are no resources to clean up.
252257
## Next steps
253258

254259
In this article, you learned how to get started with the Fortinet integration. Continue on to learn about our [Palo Alto integration](./tutorial-palo-alto.md)
255-
256-

articles/defender-for-iot/organizations/tutorial-qradar.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,8 @@ A **QID** is a QRadar event identifier. Since all Defender for IoT reports are t
7272

7373
Create a forwarding rule from your on-premises management console to forward alerts to QRadar.
7474

75+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
76+
7577
**To create a QRadar forwarding rule**:
7678

7779
1. Sign in to the on-premises management console and select **Forwarding** on the left.

articles/defender-for-iot/organizations/tutorial-splunk.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ The Splunk application can be installed locally ('Splunk Enterprise') or run on
2424
In this tutorial, you learn how to:
2525

2626
> [!div class="checklist"]
27+
>
2728
> * Download the Defender for IoT application in Splunk
2829
> * Send Defender for IoT alerts to Splunk
2930
@@ -35,17 +36,17 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
3536

3637
The following versions are required for the application to run.
3738

38-
- Defender for IoT version 2.4 and above.
39+
* Defender for IoT version 2.4 and above.
3940

40-
- Splunkbase version 11 and above.
41+
* Splunkbase version 11 and above.
4142

42-
- Splunk Enterprise version 7.2 and above.
43+
* Splunk Enterprise version 7.2 and above.
4344

4445
### Splunk permission requirements
4546

4647
The following Splunk permission is required:
4748

48-
- Any user with an *Admin* level user role.
49+
* Any user with an *Admin* level user role.
4950

5051
## Download the Defender for IoT application in Splunk
5152

@@ -65,15 +66,15 @@ To access the Defender for IoT application within Splunk, you will need to downl
6566

6667
The Defender for IoT alerts provides information about an extensive range of security events. These events include:
6768

68-
- Deviations from the learned baseline network activity.
69+
* Deviations from the learned baseline network activity.
6970

70-
- Malware detections.
71+
* Malware detections.
7172

72-
- Detections based on suspicious operational changes.
73+
* Detections based on suspicious operational changes.
7374

74-
- Network anomalies.
75+
* Network anomalies.
7576

76-
- Protocol deviations from protocol specifications.
77+
* Protocol deviations from protocol specifications.
7778

7879
:::image type="content" source="media/tutorial-splunk/address-scan.png" alt-text="A screen capture if an Address Scan Detected alert.":::
7980

@@ -83,6 +84,8 @@ You can also configure Defender for IoT to send alerts to the Splunk server, whe
8384

8485
To send alert information to the Splunk servers from Defender for IoT, you will need to create a Forwarding Rule.
8586

87+
Forwarding alert rules run only on alerts triggered after the forwarding rule is created. Alerts already in the system from before the forwarding rule was created are not affected by the rule.
88+
8689
**To create the forwarding rule**:
8790

8891
1. Sign in to the sensor, and select **Forwarding** from the left side pane.

0 commit comments

Comments
 (0)