Skip to content

Commit c5f56d0

Browse files
Merge pull request #303396 from MicrosoftDocs/main
Auto Publish – main to live - 2025-07-27 11:00 UTC
2 parents c631fcc + 755694f commit c5f56d0

File tree

48 files changed

+140
-126
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+140
-126
lines changed

articles/defender-for-iot/organizations/best-practices/traffic-mirroring-methods.md

Lines changed: 18 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Choose a traffic mirroring methods - Microsoft Defender for IoT
33
description: This article describes traffic mirroring methods for OT monitoring with Microsoft Defender for IoT.
4-
ms.date: 07/04/2023
4+
ms.date: 07/23/2025
55
ms.topic: install-set-up-deploy
66
---
77

@@ -13,7 +13,7 @@ This article is one in a series of articles describing the [deployment path](../
1313

1414
The decision as to which traffic mirroring method to use depends on your network configuration and the needs of your organization.
1515

16-
To ensure that Defender for IoT only analyzes the traffic that you want to monitor, we recommend that you configure traffic mirroring on a switch or a terminal access point (TAP) that includes only industrial ICS and SCADA traffic.
16+
To make sure Defender for IoT only analyzes the traffic that you want to monitor, we recommend that you configure traffic mirroring on a switch or a terminal access point (TAP) that includes only industrial ICS and SCADA traffic.
1717

1818
> [!NOTE]
1919
> SPAN and RSPAN are Cisco terminology. Other brands of switches have similar functionality but might use different terminology.
@@ -23,7 +23,7 @@ To ensure that Defender for IoT only analyzes the traffic that you want to monit
2323

2424
We recommend configuring your traffic mirroring from all of your switch's ports, even if no data is connected to them. If you don't, rogue devices can later be connected to an unmonitored port, and those devices won't be detected by the Defender for IoT network sensors.
2525

26-
For OT networks that use broadcast or multicast messaging, configure traffic mirroring only for RX (*Receive*) transmissions. Multicast messages will be repeated for any relevant active ports, and you'll be using more bandwidth unnecessarily.
26+
For OT networks that use broadcast or multicast messaging, configure traffic mirroring only for RX (*Receive*) transmissions. Multicast messages are repeated for any relevant active ports, and you'll be using more bandwidth unnecessarily.
2727

2828
## Compare supported traffic mirroring methods
2929

@@ -66,13 +66,13 @@ Some TAPs aggregate both *Receive* and *Transmit*, depending on the switch confi
6666

6767
We recommend TAPs especially when traffic mirroring for forensic purposes. Advantages of mirroring traffic with TAPs include:
6868

69-
- TAPs are hardware-based and can't be compromised
69+
- TAPs are hardware-based and can't be compromised.
7070

71-
- TAPs pass all traffic, even damaged messages that are often dropped by the switches
71+
- TAPs pass all traffic, even damaged messages that are often dropped by the switches.
7272

7373
- TAPs aren't processor-sensitive, which means that packet timing is exact. In contrast, switches handle mirroring functionality as a low-priority task, which can affect the timing of the mirrored packets.
7474

75-
You can also use a TAP aggregator to monitor your traffic ports. However, TAP aggregators aren't processor-based, and aren't as intrinsically secure as hardware TAPs. TAP aggregators may not reflect exact packet timing.
75+
You can also use a TAP aggregator to monitor your traffic ports. However, TAP aggregators aren't processor-based, and aren't as intrinsically secure as hardware TAPs. TAP aggregators might not reflect exact packet timing.
7676

7777
### Common TAP models
7878

@@ -99,7 +99,7 @@ The sensor's monitoring interface is a promiscuous interface and doesn't have a
9999
Use ERSPAN encapsulation when there's a need to extend monitored traffic across Layer 3 domains. ERSPAN is a Cisco proprietary feature and is available only on specific routers and switches. For more information, see the [Cisco documentation](https://learningnetwork.cisco.com/s/article/span-rspan-erspan).
100100

101101
> [!NOTE]
102-
> This article provides high-level guidance for configuring traffic mirroring with ERSPAN. Specific implementation details will vary depending on your equipment vendor.
102+
> This article provides high-level guidance for configuring traffic mirroring with ERSPAN. Specific implementation details vary depending on your equipment vendor.
103103
>
104104
105105
### ERSPAN architecture
@@ -124,6 +124,17 @@ ERSPAN source options include elements such as:
124124

125125
For more information, see [Update a sensor's monitoring interfaces (configure ERSPAN)](../how-to-manage-individual-sensors.md#update-a-sensors-monitoring-interfaces-configure-erspan).
126126

127+
### VLAN ID considerations for ERSPAN
128+
129+
When you set up ERSPAN, consider how VLAN IDs are handled based on the type of mirrored port:
130+
131+
- **Tagged VLANs** exist in packets from trunk mirrored ports and remain intact within the packet's payload during encapsulation. The Defender for IoT sensor supports tagged VLANs.
132+
- **Untagged VLANs** originate from access mirrored ports. Untagged VLANs are stripped from the payload during decapsulation, and as a result the VLANs are lost. The Microsoft Defender for IoT sensor doesn't support untagged VLANs.
133+
134+
To ensure accurate VLAN detection, configure your network and ERSPAN router so that all mirrored ports use tagged VLANs, where mirror ports are configured as trunk ports. With this setup, VLAN information remains in the packet payload throughout the ERSPAN process and provides full visibility for the Defender for IoT sensor monitoring.
135+
136+
137+
127138
## Traffic mirroring with virtual switches
128139

129140
While a virtual switch doesn't have mirroring capabilities, you can use *Promiscuous mode* in a virtual switch environment as a workaround for configuring a monitoring port, similar to a [SPAN port](../traffic-mirroring/configure-mirror-span.md). A SPAN port on your switch mirrors local traffic from interfaces on the switch to a different interface on the same switch.

articles/sentinel/billing-monitor-costs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Manage and monitor costs for Microsoft Sentinel
33
description: Learn how to manage and monitor costs and billing for Microsoft Sentinel by using cost analysis in the Azure portal and other methods.
4-
author: cwatson-cat
5-
ms.author: cwatson
4+
author: EdB-MSFT
5+
ms.author: edbaynash
66
ms.custom: subject-cost-optimization
77
ms.topic: conceptual
88
ms.date: 07/09/2025

articles/sentinel/configure-content.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Configure Microsoft Sentinel content
33
description: In this step of your deployment, you configure the Microsoft Sentinel security content, like your data connectors, analytics rules, automation rules, and more.
4-
author: cwatson-cat
4+
author: EdB-MSFT
55
ms.topic: how-to
66
ms.date: 07/05/2023
7-
ms.author: cwatson
7+
ms.author: edbaynash
88

99

1010
#Customer intent: As a security engineer, I want to configure Microsoft Sentinel security content so that analysts can detect, monitor, and respond to security threats effectively.

articles/sentinel/configure-data-retention-archive.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Configure interactive and long-term data retention in Microsoft Sentinel
33
description: Towards the end of your deployment procedure, you set up data retention to suit your organization's needs.
4-
author: cwatson-cat
4+
author: EdB-MSFT
55
ms.topic: how-to
66
ms.date: 07/21/2024
7-
ms.author: cwatson
7+
ms.author: edbaynash
88

99

1010
#Customer intent: As a security architect or SOC manager, I want to configure data retention and archiving policies so that I can ensure long-term storage of important data at a reduced cost.

articles/sentinel/data-connectors-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Find your Microsoft Sentinel data connector | Microsoft Docs
33
description: Learn about specific configuration steps for Microsoft Sentinel data connectors.
4-
author: cwatson-cat
4+
author: EdB-MSFT
55
ms.topic: reference
66
ms.date: 11/18/2024
77
ms.custom: linux-related-content
8-
ms.author: cwatson
8+
ms.author: edbaynash
99
appliesto:
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
- Microsoft Sentinel in the Azure portal

articles/sentinel/datalake/sentinel-lake-onboarding.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,8 +77,10 @@ The following roles that are required to set up billing and authorize ingestion
7777

7878
## Existing Microsoft Sentinel workspaces
7979

80-
The Microsoft Sentinel data lake mirrors data from Microsoft Sentinel workspaces that are connected to the Defender portal. You must connect your Microsoft Sentinel workspaces to the Defender portal to include them in the data lake. If you have connected Sentinel to the Defender portal, to onboard to the data lake, the primary workspace must be in the tenant's home geographic region. If you haven't connected Microsoft Sentinel to the Defender portal, you can connect your Microsoft Sentinel workspaces to the Defender portal after onboarding, and the data will be mirrored to the data lake. For more information, see [Connect Microsoft Sentinel to the Microsoft Defender portal](/unified-secops-platform/microsoft-sentinel-onboard).
80+
The Microsoft Sentinel data lake mirrors data from Microsoft Sentinel workspaces that are connected to the Defender portal. You must connect your Microsoft Sentinel workspaces to the Defender portal to include them in the data lake. If you have connected Microsoft Sentinel to the Defender portal, to onboard to the data lake, the primary workspace must be in the tenant's home geographic region. If you haven't connected Microsoft Sentinel to the Defender portal, you can connect your Microsoft Sentinel workspaces to the Defender portal after onboarding, and the data will be mirrored to the data lake. For more information, see [Connect Microsoft Sentinel to the Microsoft Defender portal](/unified-secops-platform/microsoft-sentinel-onboard).
8181

82+
> [!NOTE]
83+
> During preview, you can onboard up to 20 workspaces to the Microsoft Sentinel data lake.
8284
8385
## Onboarding steps
8486

@@ -114,7 +116,7 @@ Use the following steps to onboard to the Microsoft Sentinel data lake from the
114116
:::image type="content" source="./media/sentinel-lake-onboarding/setup-started.png" lightbox="./media/sentinel-lake-onboarding/setup-started.png" alt-text="A screenshot showing the progress of the onboarding process.":::
115117

116118

117-
1. While the setup process is running, the following banner is displayed on the Defender portal home page. You can select **View setup details** to re-open the panel to check progress.
119+
1. While the setup process is running, the following banner is displayed on the Defender portal home page. You can select **View setup details** to reopen the panel to check progress.
118120

119121
:::image type="content" source="./media/sentinel-lake-onboarding/onboarding-in-progress.png" lightbox="./media/sentinel-lake-onboarding/onboarding-in-progress.png" alt-text="A screenshot showing the onboarding in progress banner.":::
120122

articles/sentinel/deploy-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Deployment guide for Microsoft Sentinel
33
description: Learn about the steps to deploy Microsoft Sentinel including the phases to plan and prepare, deploy, and fine tune.
4-
author: cwatson-cat
5-
ms.author: cwatson
4+
author: EdB-MSFT
5+
ms.author: edbaynash
66
ms.topic: conceptual
77
ms.date: 07/09/2025
88
ms.service: microsoft-sentinel

articles/sentinel/deploy-side-by-side.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Deploying Microsoft Sentinel side-by-side to an existing SIEM.
33
description: Learn how to deploy Microsoft Sentinel side-by-side to an existing SIEM.
4-
author: cwatson-cat
4+
author: EdB-MSFT
55
ms.topic: conceptual
66
ms.date: 07/24/2024
7-
ms.author: cwatson
7+
ms.author: edbaynash
88

99

1010
#Customer intent: As a SOC manager, I want to understand supported methods for deploying Microsoft Sentinel alongside my existing, on-premises SIEM, so that I can transition to a more flexible and cost-effective security solution without disrupting current operations.

articles/sentinel/domain-based-essential-solutions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: ASIM-based domain solutions - Essentials for Microsoft Sentinel
33
description: Learn about the Microsoft essential solutions for Microsoft Sentinel that span across different ASIM schemas like networks, DNS, and web sessions.
4-
author: cwatson-cat
4+
author: EdB-MSFT
55
ms.topic: conceptual
66
ms.date: 03/01/2024
7-
ms.author: cwatson
7+
ms.author: edbaynash
88
appliesto:
99
- Microsoft Sentinel in the Microsoft Defender portal
1010
- Microsoft Sentinel in the Azure portal

articles/sentinel/enable-sentinel-features-content.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Enable Microsoft Sentinel and initial features and content
33
description: As the first step of your deployment, you enable Microsoft Sentinel, and then enable the health and audit feature, solutions, and content.
4-
author: cwatson-cat
4+
author: EdB-MSFT
55
ms.topic: how-to
66
ms.date: 06/18/2024
7-
ms.author: cwatson
7+
ms.author: edbaynash
88

99

1010
#Customer intent: As a security operations analyst, I want to enable and configure Microsoft Sentinel and its key features so that I can monitor and secure my organization's environment effectively.

0 commit comments

Comments
 (0)