Skip to content

Commit b691ed9

Browse files
authored
Merge pull request #218201 from Shereen-Bhar/custom-alerts-configuration-in-sensor
update-custom-alert-rules-configuration-in-sensor
2 parents a9466b4 + 689b2ab commit b691ed9

File tree

3 files changed

+19
-24
lines changed

3 files changed

+19
-24
lines changed

articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md

Lines changed: 19 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ The following alert groups are automatically defined:
8181
- Bandwidth anomalies
8282
- Internet access
8383
- Suspicion of malware
84-
- Buffer overflow
84+
- Buffer overflow
8585
- Operation failures
8686
- Suspicion of malicious activity
8787
- Command failures
@@ -93,45 +93,40 @@ Alert groups are predefined. For details about alerts associated with alert grou
9393

9494
## Customize alert rules
9595

96-
Add custom alert rule to pinpoint specific activity needed for your organization such as for particular protocols, source or destination addresses, or a combination of parameters.
96+
Add custom alert rules to pinpoint specific activity needed for your organization. The rules can refer, among others, to particular protocols, source or destination addresses, or a combination of parameters.
97+
For example, for an environment running MODBUS, you can define a rule to detect any written commands to a memory register on a specific IP address and ethernet destination. Another example would be setting an alert about any access to a particular IP address.
9798

98-
For example, you might want to define an alert for an environment running MODBUS to detect any written commands to a memory register on a specific IP address and ethernet destination. Another example would be an alert for any access to a particular IP address.
99-
100-
Use custom alert rule actions to instruct Defender for IT to take specific action when the alert is triggered, such as allowing users to access PCAP files from the alert, assigning alert severity, or generating an event that shows in the event timeline. Alert messages indicate that the alert was generated from a custom alert rule.
99+
Specify in the custom alert rule what action Defender for IT should take when the alert is triggered. For example, the action can be allowing users to access PCAP files from the alert, assigning alert severity, or generating an event that shows in the event timeline. Alert messages show that the alert was generated from a custom alert rule.
101100

102101
**To create a custom alert rule**:
103102

104103
1. On the sensor console, select **Custom alert rules** > **+ Create rule**.
105104

106-
1. In the **Create custom alert rule** pane that shows on the right, define the following fields:
107-
108-
- **Alert name**. Enter a meaningful name for the alert.
105+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/create-custom-alert-rule.png" alt-text="Screenshot of the Create custom alert rule pane for creating custom alert rules." lightbox="media/how-to-accelerate-alert-incident-response/create-custom-alert-rule.png":::
109106

110-
- **Alert protocol**. Select the protocol you want to detect. In specific cases, select one of the following protocols:
111-
112-
- For a database data or structure manipulation event, select **TNS** or **TDS**
113-
- For a file event, select **HTTP**, **DELTAV**, **SMB**, or **FTP**, depending on the file type
114-
- For a package download event, select **HTTP**
115-
- For an open ports (dropped) event, select **TCP** or **UDP**, depending on the port type.
116-
117-
To create rules that monitor for specific changes in one of your OT protocols, such as S7 or CIP, use any parameters found on that protocol, such as `tag` or `sub-function`.
118-
119-
- **Message**. Define a message to display when the alert is triggered. Alert messages support alphanumeric characters and any traffic variables detected. For example, you might want to include the detected source and destination addresses. Use curly brackets (**{}**) to add variables to the alert message.
107+
1. In the **Create custom alert rule** pane that shows on the right, define the following fields:
120108

121-
- **Direction**. Enter a source and/or destination IP address where you want to detect traffic.
109+
|Name |Description |
110+
|---------|---------|
111+
|**Alert name** | Enter a meaningful name for the alert. |
112+
|**Alert protocol** | Select the protocol you want to detect. <br> In specific cases, select one of the following protocols: <br> <br> - For a database data or structure manipulation event, select **TNS** or **TDS**. <br> - For a file event, select **HTTP**, **DELTAV**, **SMB**, or **FTP**, depending on the file type. <br> - For a package download event, select **HTTP**. <br> - For an open ports (dropped) event, select **TCP** or **UDP**, depending on the port type. <br> <br> To create rules that track specific changes in one of your OT protocols, such as S7 or CIP, use any parameters found on that protocol, such as `tag` or `sub-function`. |
113+
|**Message** | Define a message to display when the alert is triggered. Alert messages support alphanumeric characters and any traffic variables detected. <br> <br> For example, you might want to include the detected source and destination addresses. Use curly brackets (**{}**) to add variables to the alert message. |
114+
|**Direction** | Enter a source and/or destination IP address where you want to detect traffic. |
115+
|**Conditions** | Define one or more conditions that must be met to trigger the alert. Select the **+** sign to create a condition set with multiple conditions that use the **AND** operator. If you select a MAC address or IP address as a variable, you must convert the value from a dotted-decimal address to decimal format. <br><br> Note that the **+** sign is enabled only after selecting an **Alert protocol** from above. <br> You must add at least one condition in order to create a custom alert rule. |
116+
|**Detected** | Define a date and/or time range for the traffic you want to detect. You can customize the days and time range to fit with maintenance hours or set working hours. <br><br> :::image type="content" source="media/how-to-accelerate-alert-incident-response/detected.png" alt-text="Screenshot of the Detected field in the Create custom alert rule pane." lightbox="media/how-to-accelerate-alert-incident-response/detected.png"::: |
117+
|**Action** | Define an action you want Defender for IoT to take automatically when the alert is triggered. |
122118

123-
- **Conditions**. Define one or more conditions that must be met to trigger the alert. Select the **+** sign to create a condition set with multiple conditions that use the **AND** operator. If you select a MAC address or IP address as a variable, you must convert the value from a dotted-decimal address to decimal format.
119+
1. Select **Save** when you're done to save the rule.
124120

125-
- **Detected**. Define a date and/or time range for the traffic you want to detect.
126-
- **Action**. Define an action you want Defender for IoT to take automatically when the alert is triggered.
121+
### Edit a custom alert rule
127122

128123
To edit a custom alert rule, select the rule and then select the options (**...**) menu > **Edit**. Modify the alert rule as needed and save your changes.
129124

130125
Edits made to custom alert rules, such as changing a severity level or protocol, are tracked in the **Event timeline** page on the sensor console. For more information, see [Track sensor activity](how-to-track-sensor-activity.md).
131126

132-
**To enable or disable custom alert rules**
127+
### Disable, enable, or delete custom alert rules
133128

134-
You can disable custom alert rules to prevent them from running without deleting them altogether.
129+
Disable custom alert rules to prevent them from running without deleting them altogether.
135130

136131
In the **Custom alert rules** page, select one or more rules, and then select **Enable**, **Disable**, or **Delete** in the toolbar as needed.
137132

Loading
34.2 KB
Loading

0 commit comments

Comments
 (0)