You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/best-practices/traffic-mirroring-methods.md
+18-7Lines changed: 18 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Choose a traffic mirroring methods - Microsoft Defender for IoT
3
3
description: This article describes traffic mirroring methods for OT monitoring with Microsoft Defender for IoT.
4
-
ms.date: 07/04/2023
4
+
ms.date: 07/23/2025
5
5
ms.topic: install-set-up-deploy
6
6
---
7
7
@@ -13,7 +13,7 @@ This article is one in a series of articles describing the [deployment path](../
13
13
14
14
The decision as to which traffic mirroring method to use depends on your network configuration and the needs of your organization.
15
15
16
-
To ensure that Defender for IoT only analyzes the traffic that you want to monitor, we recommend that you configure traffic mirroring on a switch or a terminal access point (TAP) that includes only industrial ICS and SCADA traffic.
16
+
To make sure Defender for IoT only analyzes the traffic that you want to monitor, we recommend that you configure traffic mirroring on a switch or a terminal access point (TAP) that includes only industrial ICS and SCADA traffic.
17
17
18
18
> [!NOTE]
19
19
> SPAN and RSPAN are Cisco terminology. Other brands of switches have similar functionality but might use different terminology.
@@ -23,7 +23,7 @@ To ensure that Defender for IoT only analyzes the traffic that you want to monit
23
23
24
24
We recommend configuring your traffic mirroring from all of your switch's ports, even if no data is connected to them. If you don't, rogue devices can later be connected to an unmonitored port, and those devices won't be detected by the Defender for IoT network sensors.
25
25
26
-
For OT networks that use broadcast or multicast messaging, configure traffic mirroring only for RX (*Receive*) transmissions. Multicast messages will be repeated for any relevant active ports, and you'll be using more bandwidth unnecessarily.
26
+
For OT networks that use broadcast or multicast messaging, configure traffic mirroring only for RX (*Receive*) transmissions. Multicast messages are repeated for any relevant active ports, and you'll be using more bandwidth unnecessarily.
27
27
28
28
## Compare supported traffic mirroring methods
29
29
@@ -66,13 +66,13 @@ Some TAPs aggregate both *Receive* and *Transmit*, depending on the switch confi
66
66
67
67
We recommend TAPs especially when traffic mirroring for forensic purposes. Advantages of mirroring traffic with TAPs include:
68
68
69
-
- TAPs are hardware-based and can't be compromised
69
+
- TAPs are hardware-based and can't be compromised.
70
70
71
-
- TAPs pass all traffic, even damaged messages that are often dropped by the switches
71
+
- TAPs pass all traffic, even damaged messages that are often dropped by the switches.
72
72
73
73
- TAPs aren't processor-sensitive, which means that packet timing is exact. In contrast, switches handle mirroring functionality as a low-priority task, which can affect the timing of the mirrored packets.
74
74
75
-
You can also use a TAP aggregator to monitor your traffic ports. However, TAP aggregators aren't processor-based, and aren't as intrinsically secure as hardware TAPs. TAP aggregators may not reflect exact packet timing.
75
+
You can also use a TAP aggregator to monitor your traffic ports. However, TAP aggregators aren't processor-based, and aren't as intrinsically secure as hardware TAPs. TAP aggregators might not reflect exact packet timing.
76
76
77
77
### Common TAP models
78
78
@@ -99,7 +99,7 @@ The sensor's monitoring interface is a promiscuous interface and doesn't have a
99
99
Use ERSPAN encapsulation when there's a need to extend monitored traffic across Layer 3 domains. ERSPAN is a Cisco proprietary feature and is available only on specific routers and switches. For more information, see the [Cisco documentation](https://learningnetwork.cisco.com/s/article/span-rspan-erspan).
100
100
101
101
> [!NOTE]
102
-
> This article provides high-level guidance for configuring traffic mirroring with ERSPAN. Specific implementation details will vary depending on your equipment vendor.
102
+
> This article provides high-level guidance for configuring traffic mirroring with ERSPAN. Specific implementation details vary depending on your equipment vendor.
103
103
>
104
104
105
105
### ERSPAN architecture
@@ -124,6 +124,17 @@ ERSPAN source options include elements such as:
124
124
125
125
For more information, see [Update a sensor's monitoring interfaces (configure ERSPAN)](../how-to-manage-individual-sensors.md#update-a-sensors-monitoring-interfaces-configure-erspan).
126
126
127
+
### VLAN ID considerations for ERSPAN
128
+
129
+
When you set up ERSPAN, consider how VLAN IDs are handled based on the type of mirrored port:
130
+
131
+
-**Tagged VLANs** exist in packets from trunk mirrored ports and remain intact within the packet's payload during encapsulation. The Defender for IoT sensor supports tagged VLANs.
132
+
-**Untagged VLANs** originate from access mirrored ports. Untagged VLANs are stripped from the payload during decapsulation, and as a result the VLANs are lost. The Microsoft Defender for IoT sensor doesn't support untagged VLANs.
133
+
134
+
To ensure accurate VLAN detection, configure your network and ERSPAN router so that all mirrored ports use tagged VLANs, where mirror ports are configured as trunk ports. With this setup, VLAN information remains in the packet payload throughout the ERSPAN process and provides full visibility for the Defender for IoT sensor monitoring.
135
+
136
+
137
+
127
138
## Traffic mirroring with virtual switches
128
139
129
140
While a virtual switch doesn't have mirroring capabilities, you can use *Promiscuous mode* in a virtual switch environment as a workaround for configuring a monitoring port, similar to a [SPAN port](../traffic-mirroring/configure-mirror-span.md). A SPAN port on your switch mirrors local traffic from interfaces on the switch to a different interface on the same switch.
Copy file name to clipboardExpand all lines: articles/sentinel/configure-content.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Configure Microsoft Sentinel content
3
3
description: In this step of your deployment, you configure the Microsoft Sentinel security content, like your data connectors, analytics rules, automation rules, and more.
4
-
author: cwatson-cat
4
+
author: EdB-MSFT
5
5
ms.topic: how-to
6
6
ms.date: 07/05/2023
7
-
ms.author: cwatson
7
+
ms.author: edbaynash
8
8
9
9
10
10
#Customer intent: As a security engineer, I want to configure Microsoft Sentinel security content so that analysts can detect, monitor, and respond to security threats effectively.
Copy file name to clipboardExpand all lines: articles/sentinel/configure-data-retention-archive.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Configure interactive and long-term data retention in Microsoft Sentinel
3
3
description: Towards the end of your deployment procedure, you set up data retention to suit your organization's needs.
4
-
author: cwatson-cat
4
+
author: EdB-MSFT
5
5
ms.topic: how-to
6
6
ms.date: 07/21/2024
7
-
ms.author: cwatson
7
+
ms.author: edbaynash
8
8
9
9
10
10
#Customer intent: As a security architect or SOC manager, I want to configure data retention and archiving policies so that I can ensure long-term storage of important data at a reduced cost.
Copy file name to clipboardExpand all lines: articles/sentinel/datalake/sentinel-lake-onboarding.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,8 +77,10 @@ The following roles that are required to set up billing and authorize ingestion
77
77
78
78
## Existing Microsoft Sentinel workspaces
79
79
80
-
The Microsoft Sentinel data lake mirrors data from Microsoft Sentinel workspaces that are connected to the Defender portal. You must connect your Microsoft Sentinel workspaces to the Defender portal to include them in the data lake. If you have connected Sentinel to the Defender portal, to onboard to the data lake, the primary workspace must be in the tenant's home geographic region. If you haven't connected Microsoft Sentinel to the Defender portal, you can connect your Microsoft Sentinel workspaces to the Defender portal after onboarding, and the data will be mirrored to the data lake. For more information, see [Connect Microsoft Sentinel to the Microsoft Defender portal](/unified-secops-platform/microsoft-sentinel-onboard).
80
+
The Microsoft Sentinel data lake mirrors data from Microsoft Sentinel workspaces that are connected to the Defender portal. You must connect your Microsoft Sentinel workspaces to the Defender portal to include them in the data lake. If you have connected Microsoft Sentinel to the Defender portal, to onboard to the data lake, the primary workspace must be in the tenant's home geographic region. If you haven't connected Microsoft Sentinel to the Defender portal, you can connect your Microsoft Sentinel workspaces to the Defender portal after onboarding, and the data will be mirrored to the data lake. For more information, see [Connect Microsoft Sentinel to the Microsoft Defender portal](/unified-secops-platform/microsoft-sentinel-onboard).
81
81
82
+
> [!NOTE]
83
+
> During preview, you can onboard up to 20 workspaces to the Microsoft Sentinel data lake.
82
84
83
85
## Onboarding steps
84
86
@@ -114,7 +116,7 @@ Use the following steps to onboard to the Microsoft Sentinel data lake from the
114
116
:::image type="content" source="./media/sentinel-lake-onboarding/setup-started.png" lightbox="./media/sentinel-lake-onboarding/setup-started.png" alt-text="A screenshot showing the progress of the onboarding process.":::
115
117
116
118
117
-
1. While the setup process is running, the following banner is displayed on the Defender portal home page. You can select **View setup details** to re-open the panel to check progress.
119
+
1. While the setup process is running, the following banner is displayed on the Defender portal home page. You can select **View setup details** to reopen the panel to check progress.
118
120
119
121
:::image type="content" source="./media/sentinel-lake-onboarding/onboarding-in-progress.png" lightbox="./media/sentinel-lake-onboarding/onboarding-in-progress.png" alt-text="A screenshot showing the onboarding in progress banner.":::
Copy file name to clipboardExpand all lines: articles/sentinel/deploy-side-by-side.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Deploying Microsoft Sentinel side-by-side to an existing SIEM.
3
3
description: Learn how to deploy Microsoft Sentinel side-by-side to an existing SIEM.
4
-
author: cwatson-cat
4
+
author: EdB-MSFT
5
5
ms.topic: conceptual
6
6
ms.date: 07/24/2024
7
-
ms.author: cwatson
7
+
ms.author: edbaynash
8
8
9
9
10
10
#Customer intent: As a SOC manager, I want to understand supported methods for deploying Microsoft Sentinel alongside my existing, on-premises SIEM, so that I can transition to a more flexible and cost-effective security solution without disrupting current operations.
Copy file name to clipboardExpand all lines: articles/sentinel/domain-based-essential-solutions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: ASIM-based domain solutions - Essentials for Microsoft Sentinel
3
3
description: Learn about the Microsoft essential solutions for Microsoft Sentinel that span across different ASIM schemas like networks, DNS, and web sessions.
4
-
author: cwatson-cat
4
+
author: EdB-MSFT
5
5
ms.topic: conceptual
6
6
ms.date: 03/01/2024
7
-
ms.author: cwatson
7
+
ms.author: edbaynash
8
8
appliesto:
9
9
- Microsoft Sentinel in the Microsoft Defender portal
Copy file name to clipboardExpand all lines: articles/sentinel/enable-sentinel-features-content.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Enable Microsoft Sentinel and initial features and content
3
3
description: As the first step of your deployment, you enable Microsoft Sentinel, and then enable the health and audit feature, solutions, and content.
4
-
author: cwatson-cat
4
+
author: EdB-MSFT
5
5
ms.topic: how-to
6
6
ms.date: 06/18/2024
7
-
ms.author: cwatson
7
+
ms.author: edbaynash
8
8
9
9
10
10
#Customer intent: As a security operations analyst, I want to enable and configure Microsoft Sentinel and its key features so that I can monitor and secure my organization's environment effectively.
0 commit comments