Skip to content

Commit ae3b163

Browse files
authored
Merge pull request #189344 from batamig/release-notes-plus
release notes 22.1 ii
2 parents b4112fb + 3813511 commit ae3b163

21 files changed

+302
-144
lines changed

articles/defender-for-iot/organizations/getting-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ After you acquire your on-premises management console appliance:
9696

9797
**To install and set up**:
9898

99-
1. Go to [Defender for IoT: Getting Started](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started) in the Azure portal].
99+
1. Go to [Defender for IoT: Getting Started](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started) in the Azure portal.
100100

101101
1. Select the **On-premises management console** tab.
102102

@@ -118,7 +118,7 @@ Onboard a sensor by registering it with Microsoft Defender for IoT and downloadi
118118

119119
- **Locally managed sensors**: Information that sensors detect is displayed in the sensor console. If you're working in an air-gapped network and want a unified view of all information detected by multiple locally managed sensors, work with the on-premises management console.
120120

121-
1. Select a site to associate your sensor to within an IoT Hub. The IoT Hub will serve as a gateway between this sensor and Microsoft Defender for IoT. Define the display name, and zone. You can also add descriptive tags. The display name, zone, and tags are descriptive entries on the [Sites and Sensors page](how-to-manage-sensors-on-the-cloud.md#view-onboarded-sensors).
121+
1. Select a site to associate your sensor to within an IoT Hub. The IoT Hub will serve as a gateway between this sensor and Microsoft Defender for IoT. Define the display name, and zone. You can also add descriptive tags. The display name, zone, and tags are descriptive entries on the [Sites and Sensors page](how-to-manage-sensors-on-the-cloud.md#manage-on-boarded-sensors).
122122

123123
1. Select **Register**.
124124

articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,22 +24,27 @@ The following predefined reports are available. These queries are generated in r
2424
- **Programming commands**: Devices that send industrial programming.
2525
- **Remote access**: Devices that communicate through remote session protocols.
2626
- **Internet activity**: Devices that are connected to the internet.
27-
- - **CVEs**: A list of devices detected with known vulnerabilities within the last 24 hours.
27+
- **CVEs**: A list of devices detected with known vulnerabilities within the last 24 hours.
2828
- **Excluded CVEs**: A list of all the CVEs that were manually excluded. To achieve more accurate results in VA reports and attack vectors, you can customize the CVE list manually by including and excluding CVEs.
2929
- **Nonactive devices**: Devices that have not communicated for the past seven days.
3030
- **Active devices**: Active network devices within the last 24 hours.
3131

32-
Find these reports in Analyze** > **Data Mining*. Reports are available for users with Administrator and Security Analyst permissions. Read only users can't access these reports.
32+
Find these reports in **Analyze** > **Data Mining**. Reports are available for users with Administrator and Security Analyst permissions. Read only users can't access these reports.
3333

3434
## Create a report
35+
To create a data-mining report:
3536

36-
1. In Defender for IoT, **Data mining**.
37-
1. Select **Create report**.
38-
1. In the **Create new report** dialog, specify a report name and optional description.
39-
1. In **Choose category**, select the type of report you want to create. You can choose all, standard categories (generic) or specific settings.
40-
1. In **Order by**, order the report by category or activity.
41-
1. If you want to filter report results, you can specify a time range (minutes, days, and hours), and IP or MAC address, port, or device group (as defined in the device map).
42-
4. Select **Save**. Report results open on the **Data Mining** page.
37+
1. Select **Data Mining** from the side menu. Predefined suggested reports appear automatically.
38+
39+
1. Select **Create report** and then enter the following values:
40+
41+
- **Name** / **Description**. Enter a meaningful name for your report and an optional description.
42+
- **Send to CM**. Toggle this option on to send your report to your on-premises management console.
43+
- **Choose category**. Select the categories to include in your report.
44+
- **Order by**. Select to sort your data by category or by activity.
45+
- **Filter by**. Define a filter for your report, using dates, IP address, MAC address, port, or device group.
46+
47+
1. Select **Save** to save your report and display results on the **Data Mining** page.
4348

4449
Reports are dynamically updated each time you open them. For example:
4550
- If you create a report for firmware versions on devices on June 1 and open the report again on June 10, this report will be updated with information that's accurate for June 10.
@@ -59,8 +64,6 @@ The on-premises management console lets you generate reports for each sensor tha
5964
- **Programming Commands**: Presents a list of devices that sent programming commands within the last 24 hours.
6065
- **Remote Access**: Presents a list of devices that remote sources accessed within the last 24 hours.
6166

62-
:::image type="content" source="media/how-to-generate-reports/reports-view.png" alt-text="Screenshot of the reports view.":::
63-
6467
When you choose the sensor from the on-premises management console, all the custom reports configured on that sensor appear in the list of reports. For each sensor, you can generate a default report or a custom report configured on that sensor.
6568

6669
To generate a report:

articles/defender-for-iot/organizations/how-to-manage-cloud-alerts.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Defender for IoT alerts lets you enhance the security and operation of your netw
1717
- Protocol and operational anomalies
1818
- Suspected malware traffic
1919

20-
:::image type="content" source="media/how-to-view-manage-cloud-alerts/main-alert-page.png" alt-text="Main Alerts page in the Cloud":::
20+
:::image type="content" source="media/how-to-view-manage-cloud-alerts/main-alert-page.png" alt-text="Main Alerts page in the Cloud." lightbox="media/how-to-view-manage-cloud-alerts/main-alert-page.png":::
2121

2222
Alerts triggered by Defender for IoT are displayed on the Alerts page in the Azure portal. Use the Alerts page to:
2323

@@ -38,9 +38,9 @@ Alert details triggered by these sensors and aggregated in the Alerts page:
3838

3939
## Alert types and messages
4040

41-
You can view alert messages you may receive. Reviewing alert types and messages ahead of time will help you plan remediation and integration with playbooks.
42-
[Alert types and descriptions](alert-engine-messages.md#alert-types-and-descriptions).
41+
You can view alert messages you may receive. Reviewing alert types and messages ahead of time will help you plan remediation and integration with playbooks.
4342

43+
For more information, see [Alert types and descriptions](alert-engine-messages.md#alert-types-and-descriptions).
4444

4545
## View alerts
4646

@@ -56,7 +56,7 @@ This section describes the information available in the Alerts table.
5656
|--|--|
5757
| **Severity**| A predefined alert severity assigned by the sensor. The severity can be updated. See [Manage alert status and severity](#manage-alert-status-and-severity) for details.
5858
| **Name** | The alert title.
59-
| **Site** | The site associated with the sensor. This site name is defined when you register a sensor with Microsoft Defender for IoT on the Azure portal. The name can be viewed in the Sites and Sensors page on the portal. See [View onboarded sensors](how-to-manage-sensors-on-the-cloud.md#view-onboarded-sensors) for information on registered sensors.
59+
| **Site** | The site associated with the sensor. This site name is defined when you register a sensor with Microsoft Defender for IoT on the Azure portal. The name can be viewed in the Sites and Sensors page on the portal. See [View onboarded sensors](how-to-manage-sensors-on-the-cloud.md#manage-on-boarded-sensors) for information on registered sensors.
6060
| **Engine** | The sensor engine that detected the Operational Technology (OT) traffic. To learn more about engines, see [Detection engines](how-to-control-what-traffic-is-monitored.md#detection-engines). For device builders, the term micro-agent will be displayed.
6161
| **Detection time** | The first time the alert was detected. The alert traffic may occur several times after the first detection. If the alert Status is **New**, the detection time won't change. If the alert is Closed and the traffic is seen again, a new detection time will be displayed.
6262
| **Status** | The alert status: New, Active, Closed

articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -288,30 +288,30 @@ The console will display restore failures.
288288

289289
## Update a standalone sensor version
290290

291-
The following procedure describes how to update a standalone sensor by using the sensor console. The update process takes about 30 minutes.
291+
The following procedure describes how to update a standalone sensor by using the sensor console.
292292

293-
1. Go to the [Azure portal](https://portal.azure.com/).
293+
1. In the Azure portal, go to **Defender for IoT** > **Getting started** > **Updates**.
294294

295-
2. Go to Defender for IoT.
296-
297-
3. Go to the **Updates** page.
295+
1. From the **Sensors** section, select **Download** for the sensor update, and save your `<legacy/upstream>-sensor-secured-patcher-<version number>.tar` file locally. For example:
298296

299297
:::image type="content" source="media/how-to-manage-individual-sensors/updates-page.png" alt-text="Screenshot of the Updates page of Defender for IoT.":::
300298

301-
4. Select **Download** from the **Sensors** section and save the file.
302-
303-
5. In the sensor console's sidebar, select **System Settings**.
299+
1. On your sensor console, select **System Settings** > **Sensor management** > **Software Update**.
304300

305-
6. On the **Version Update** pane, select **Update**.
301+
1. On the **Software Update** pane on the right, select **Upload file**, and then navigate to and select your downloaded `legacy-sensor-secured-patcher-<Version number>.tar` file.
306302

307303
:::image type="content" source="media/how-to-manage-individual-sensors/upgrade-pane-v2.png" alt-text="Screenshot of the update pane.":::
308304

309-
7. Select the file that you downloaded from the Defender for IoT **Updates** page.
305+
The update process starts, and may take about 30 minutes. During your upgrade, the system is rebooted twice.
310306

311-
8. The update process starts, during which time the system is rebooted twice. After the first reboot (before the completion of the update process), the system opens with the sign-in window. After you sign in, the upgrade version appears at the lower left of the sidebar.
307+
Sign in when prompted, and then return to the **System Settings** > **Sensor management** > **Software Update** pane to confirm that the new version is listed.
312308

313309
:::image type="content" source="media/how-to-manage-individual-sensors/defender-for-iot-version.png" alt-text="Screenshot of the upgrade version that appears after you sign in.":::
314310

311+
If you're upgrading from version 10.5.x to version 22.x, make sure to reactivate your sensor. For more information, see [Reactivate a sensor for upgrades to version 22.x from a legacy version](how-to-manage-sensors-on-the-cloud.md#reactivate-a-sensor-for-upgrades-to-version-22x-from-a-legacy-version).
312+
313+
After upgrading to version 22.1.x, the new upgrade log can be found at the following path, accessed via SSH and the *cyberx_host* user: `/opt/sensor/logs/legacy-upgrade.log`.
314+
315315
## Forward sensor failure alerts
316316

317317
You can forward alerts to third parties to provide details about:

0 commit comments

Comments
 (0)