Skip to content

Commit dbcee02

Browse files
committed
Merge branch 'suppression2' of https://github.com/batamig/azure-docs-pr into suppression-rules-2410
2 parents 6995a78 + f00a49f commit dbcee02

File tree

8 files changed

+190
-16
lines changed

8 files changed

+190
-16
lines changed

articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md

Lines changed: 164 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,186 @@
11
---
2-
title: Accelerate on-premises OT alert workflows - Microsoft Defender for IoT
2+
title: Accelerate OT alert workflows - Microsoft Defender for IoT
33
description: Learn how to improve Microsoft Defender for IoT OT alert workflows on an OT network sensor or the on-premises management console.
4-
ms.date: 12/20/2023
4+
ms.date: 01/31/2024
55
ms.topic: how-to
66
---
77

8+
# Accelerate OT alert workflows
89

9-
# Accelerate on-premises OT alert workflows
10+
> [!NOTE]
11+
> Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1012
1113
Microsoft Defender for IoT alerts enhance your network security and operations with real-time details about events logged in your network. OT alerts are triggered when OT network sensors detect changes or suspicious activity in network traffic that needs your attention.
1214

1315
This article describes the following methods for reducing OT network alert fatigue in your team:
1416

17+
- **Create suppression rules** from the Azure portal to reduce the alerts triggered by your sensors. If you're working in an air-gapped environment, do this by creating alert exclusion rules on the on-premises management console.
18+
1519
- **Create alert comments** for your teams to add to individual alerts, streamlining communication and record-keeping across your alerts.
1620

1721
- **Create custom alert rules** to identify specific traffic in your network
1822

19-
- **Create alert exclusion rules** to reduce the alerts triggered by your sensors
20-
2123
## Prerequisites
2224

23-
- To create alert comments or custom alert rules on an OT network sensor, you must have an OT network sensor installed and access to the sensor as an **Admin** user.
25+
Before you use the procedures on this page, note the following prerequisites:
26+
27+
|To ... |You must have ... |
28+
|---------|---------|
29+
|[Create alert suppression rules on the Azure portal](#create-alert-suppression-rules-on-the-azure-portal-public-preview) | A Defender for IoT subscription with at least one cloud-connected OT sensor and access as a [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin), [Contributor](../../role-based-access-control/built-in-roles.md#contributor), or [Owner](../../role-based-access-control/built-in-roles.md#owner). |
30+
|[Create a DNS allowlist on an OT sensor](#allow-internet-connections-on-an-ot-network) | An OT network sensor installed and access to the sensor as the default *Admin* user. |
31+
|[Create alert comments on an OT sensor](#create-alert-comments-on-an-ot-sensor) | An OT network sensor installed and access to the sensor as any user with an **Admin** role. |
32+
|[Create custom alert rules on an OT sensor](#create-custom-alert-rules-on-an-ot-sensor) | An OT network sensor installed and access to the sensor as any user with an **Admin** role. |
33+
|[Create alert exclusion rules on an on-premises management console](#create-alert-exclusion-rules-on-an-on-premises-management-console) | An on-premises management console installed and access to the on-premises management console as any user with an **Admin** role. |
34+
35+
For more information, see:
36+
37+
- [Install OT monitoring software on OT sensors](ot-deploy/install-software-ot-sensor.md)
38+
- [Azure user roles and permissions for Defender for IoT](roles-azure.md)
39+
- [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md)
40+
41+
## Suppress irrelevant alerts
42+
43+
Configure your OT sensors to suppress alerts for specific traffic on your network that would otherwise trigger an alert. For example, if all the OT devices monitored by a specific sensor are going through maintenance procedures for two days, you might want to define a rule to suppress all alerts generated by that sensor during the maintenance period.
44+
45+
- For cloud connected OT sensors, create alert suppression rules on the Azure portal to ignore specified traffic on your network that would otherwise trigger an alert.
46+
47+
- For locally managed sensors, create alert exclusion rules on the on-premises management console, either using the UI or the API.
48+
49+
> [!IMPORTANT]
50+
> Rules configured on the Azure portal override any rules configured for the same sensor on the on-premises management console. If you're currently using alert exclusion rules on your on-premises management console, we recommend that you [migrate them to the Azure portal](#migrate-suppression-rules-from-an-on-premises-management-console-public-preview) as suppression rules before you start.
51+
>
52+
### Create alert suppression rules on the Azure portal (Public Preview)
53+
54+
This section describes how to create an alert suppression rule on the Azure portal, and is supported for cloud-connected sensors only.
55+
56+
**To create an alert suppression rule**:
57+
58+
1. In [Defender for IoT](https://ms.portal.azure.com/#view/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/~/Getting_started) on the Azure portal, select **Alerts** > :::image type="icon" source="media/how-to-accelerate-alert-incident-response/suppression-rules.png" border="false"::: **Suppression rules**.
59+
60+
1. On the **Suppression rules (Preview)** page, select **+ Create**.
61+
62+
1. In the **Create suppression rule** pane **Details** tab, enter the following details:
63+
64+
1. Select your Azure subscription from the drop-down list.
65+
66+
1. Enter a meaningful name for your rule and an optional description.
67+
68+
1. Toggle on **Enabled** to have the rule start running as configured. You can also leave this option toggled off to start using the rule only later on.
69+
70+
1. In the **Suppress by time range** area, toggle on **Expiration date** to define a specific start and end date and time for your rule. Select **Add range** to add multiple time ranges.
71+
72+
1. In the **Apply on** area, select whether you want to apply the rule to all sensors on your subscription, or only on specific sites or sensors. If you select **Apply on custom selection**, select the sites and/or sensors where you want the rule to run.
73+
74+
When you select a specific site, the rule applies to all existing and future sensors associated with the site.
75+
76+
1. Select **Next** and confirm the override message.
77+
78+
1. In the **Create suppression rule** pane **Conditions** tab:
79+
80+
1. In the **Alert name** dropdown list, select one or more alerts for your rule. Selecting the name of an alert engine instead of a specific rule name applies the rule to all existing and future alerts associated with that engine.
81+
82+
1. Optionally filter your rule further by defining additional conditions, such as for traffic coming from specific sources, to specific destinations, or on specific subnets.
83+
84+
1. When you're finished configuring your rule conditions, select **Next**.
85+
86+
1. In the **Create suppression rule** pane **Review and create** tab, review the details of the rule you're creating and then select **Create**.
87+
88+
Your rule is added to the list of suppression rules on the **Suppression rules (Preview)** page. Select a rule to edit or delete it as needed.
89+
90+
> [!TIP]
91+
> If you need to export suppression rules, select the **Export** button from the toolbar. All rules configured are exported to a single .CSV file, which you can save locally.
92+
93+
### Migrate suppression rules from an on-premises management console (Public Preview)
94+
95+
If you're currently using an on-premises management console with cloud-connected sensors, we recommend that you migrate any exclusion rules to the Azure portal as suppression rules before you start creating new suppression rules. Any suppression rules configured on the Azure portal override alert exclusion rules that exist for the same sensors on the on-premises management console.
96+
97+
**To export alert exclusion rules and import them to the Azure portal**:
98+
99+
1. Sign into your on-premises management console and select **Alert Exclusion**.
100+
101+
1. On the **Alert Exclusion** page, select :::image type="icon" source="media/how-to-accelerate-alert-incident-response/export.png" border="false"::: **Export** to export your rules to a .CSV file.
102+
103+
1. In [Defender for IoT](https://ms.portal.azure.com/#view/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/~/Getting_started) on the Azure portal, select **Alerts** > **Suppression rules**.
104+
105+
1. On the **Suppression rules (Preview)** page, select **Migrate local manager rules**, and then browse to and select the .CSV file you'd downloaded from the on-premises management console.
106+
107+
1. In the **Migrate suppression rules** pane, review the uploaded list of suppression rules you're about to migrate, then select **Approve migration**.
108+
109+
1. Confirm the override message.
110+
111+
Your rules are added to the list of suppression rules on the **Suppression rules (Preview)** page. Select a rule to edit or delete it as needed.
112+
113+
### Create alert exclusion rules on an on-premises management console
114+
115+
We recommend creating alert exclusion rules on an on-premises management console only for locally managed sensors. For cloud-connected sensors, any suppression rules created on the Azure portal will override exclusion rules created on the on-premises management console for that sensor.
116+
117+
**To create an alert exclusion rule**:
118+
119+
1. Sign into your on-premises management console and select **Alert Exclusion** on the left-hand menu.
120+
121+
1. On the **Alert Exclusion** page, select the **+** button at the top-right to add a new rule.
122+
123+
1. In the **Create Exclusion Rule** dialog, enter the following details:
124+
125+
|Name |Description |
126+
|---------|---------|
127+
|**Name** | Enter a meaningful name for your rule. The name can't contain quotes (`"`). |
128+
|**By Time Period** | Select a time zone and the specific time period you want the exclusion rule to be active, and then select **ADD**. <br><br>Use this option to create separate rules for different time zones. For example, you might need to apply an exclusion rule between 8:00 AM and 10:00 AM in three different time zones. In this case, create three separate exclusion rules that use the same time period and the relevant time zone. |
129+
|**By Device Address** | Select and enter the following values, and then select **ADD**: <br><br>- Select whether the designated device is a source, destination, or both a source and destination device. <br>- Select whether the address is an IP address, MAC address, or subnet <br>- Enter the value of the IP address, MAC address, or subnet. |
130+
|**By Alert Title** | Select one or more alerts to add to the exclusion rule and then select **ADD**. To find alert titles, enter all, or part of an alert title and select the one you want from the dropdown list. |
131+
|**By Sensor Name** | Select one or more sensors to add to the exclusion rule and then select **ADD**. To find sensor names, enter all or part of the sensor name and select the one you want from the dropdown list. |
132+
133+
> [!IMPORTANT]
134+
> Alert exclusion rules are `AND` based, which means that alerts are only excluded when all rule conditions are met.
135+
> If a rule condition is not defined, all options are included. For example, if you don't include the name of a sensor in the rule, the rule is applied to all sensors.
136+
137+
A summary of the rule parameters is shown at the bottom of the dialog.
138+
139+
1. Check the rule summary shown at the bottom of the **Create Exclusion Rule** dialog and then select **SAVE**
140+
141+
**To create alert exclusion rules via API**:
142+
143+
Use the [Defender for IoT API](references-work-with-defender-for-iot-apis.md) to create on-premises management console alert exclusion rules from an external ticketing system or other system that manage network maintenance processes.
144+
145+
Use the [maintenanceWindow (Create alert exclusions)](api/management-alert-apis.md#maintenancewindow-create-alert-exclusions) API to define the sensors, analytics engines, start time, and end time to apply the rule. Exclusion rules created via API are shown in the on-premises management console as read-only.
146+
147+
For more information, see [Defender for IoT API reference](references-work-with-defender-for-iot-apis.md).
148+
149+
150+
## Allow internet connections on an OT network
151+
152+
Decrease the number of unauthorized internet alerts by creating an allowlist of domain names on your OT sensor. When a DNS allowlist is configured, the sensor checks each unauthorized internet connectivity attempt against the list before triggering an alert. If the domain's FQDN is included in the allowlist, the sensor doesn’t trigger the alert and allows the traffic automatically.
153+
154+
All OT sensor users can view a currently configured list of domains in a [data mining report](how-to-create-data-mining-queries.md), including the FQDNs, resolved IP addresses, and the last resolution time.
155+
24156

25-
- To create a DNS allowlist on an OT sensor, you must have an OT network sensor installed and access to the sensor as a **Support** user.
26-
- To create alert exclusion rules on an on-premises management console, you must have an on-premises management console installed and access to the on-premises management console as an **Admin** user.
157+
**To define a DNS allowlist:**
158+
159+
1. Sign into your OT sensor as the *admin* user and select the **Support** page.
160+
161+
1. In the search box, search for **DNS** and then locate the engine with the **Internet Domain Allowlist** description.
162+
163+
1. Select **Edit** :::image type="icon" source="media/how-to-generate-reports/manage-icon.png" border="false"::: for the **Internet Domain Allowlist** row. For example:
164+
165+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/dns-edit-configuration.png" alt-text="Screenshot of how to edit configurations for DNS in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/dns-edit-configuration.png":::
166+
167+
1. In the **Edit configuration** pane > **Fqdn allowlist** field, enter one or more domain names. Separate multiple domain names with commas. Your sensor won't generate alerts for unauthorized internet connectivity attempts on the configured domains.
168+
169+
1. Select **Submit** to save your changes.
170+
171+
172+
**To view the current allowlist in a data mining report:**
173+
174+
When selecting a category in your [custom data mining report](how-to-create-data-mining-queries.md#create-an-ot-sensor-custom-data-mining-report), make sure to select **Internet Domain Allowlist** under the **DNS** category.
175+
176+
For example:
177+
178+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/data-mining-allowlist.png" alt-text="Screenshot of how to generate a custom data mining report for the allowlist in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/data-mining-allowlist.png":::
179+
180+
The generated data mining report shows a list of the allowed domains and each IP address that’s being resolved for those domains. The report also includes the TTL, in seconds, during which those IP addresses won't trigger an internet connectivity alert. For example:
181+
182+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png" alt-text="Screenshot of data mining report of allowlist in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png":::
27183

28-
For more information, see [Install OT agentless monitoring software](how-to-install-software.md) and [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
29184

30185
## Create alert comments on an OT sensor
31186

articles/defender-for-iot/organizations/how-to-manage-cloud-alerts.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: View and manage alerts on the Azure portal - Microsoft Defender for IoT
33
description: Learn about viewing and managing alerts triggered by cloud-connected Microsoft Defender for IoT network sensors on the Azure portal.
4-
ms.date: 12/12/2022
4+
ms.date: 12/19/2023
55
ms.topic: how-to
66
ms.custom: enterprise-iot
77
---
@@ -27,7 +27,7 @@ Microsoft Defender for IoT alerts enhance your network security and operations w
2727

2828
- **To view alerts on the Azure portal**, you must have access as a [Security Reader](../../role-based-access-control/built-in-roles.md#security-reader), [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin), [Contributor](../../role-based-access-control/built-in-roles.md#contributor), or [Owner](../../role-based-access-control/built-in-roles.md#owner)
2929

30-
- **To manage alerts on the Azure portal**, you must have access as a [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin), [Contributor](../../role-based-access-control/built-in-roles.md#contributor), or [Owner](../../role-based-access-control/built-in-roles.md#owner). Alert management activities include modifying their statuses or severities, *Learning* an alert, or accessing PCAP data.
30+
- **To manage alerts on the Azure portal**, you must have access as a [Security Admin](../../role-based-access-control/built-in-roles.md#security-admin), [Contributor](../../role-based-access-control/built-in-roles.md#contributor), or [Owner](../../role-based-access-control/built-in-roles.md#owner). Alert management activities include modifying their statuses or severities, *Learning* an alert, accessing PCAP data, or using alert suppression rules.
3131

3232
For more information, see [Azure user roles and permissions for Defender for IoT](roles-azure.md).
3333

@@ -64,6 +64,9 @@ For more information, see [Azure user roles and permissions for Defender for IoT
6464
| **Category**| The [category](alert-engine-messages.md#supported-alert-categories) associated with the alert, such as *operational issues*, *custom alerts*, or *illegal commands*. |
6565
| **Type**| The internal name of the alert. |
6666

67+
> [!TIP]
68+
> If you're seeing more alerts than expected, you might want to create suppression rules to prevent alerts from being triggered for legitimate network activity. For more information, see [Suppress irrelevant alerts](how-to-accelerate-alert-incident-response.md#suppress-irrelevant-alerts).
69+
6770
### Filter alerts displayed
6871

6972
Use the **Search** box, **Time range**, and **Add filter** options to filter the alerts displayed by specific parameters or to help locate a specific alert.
824 Bytes
Loading
641 Bytes
Loading
1.33 KB
Loading

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@ Cloud features may be dependent on a specific sensor version. Such features are
3737

3838
| Version / Patch | Release date | Scope | Supported until |
3939
| ------- | ------------ | ----------- | ------------------- |
40-
| **23.2** | | | |
41-
| 23.2.0 | 12/2023 | Major | 11/2024 |
40+
| **24.1** | | | |
41+
| 24.1.0 |02/2024 | Major |12/2024 |
4242
| **23.1** | | | |
4343
| 23.1.3 | 09/2023 | Patch | 08/2024 |
4444
| 23.1.2 | 07/2023 | Major | 06/2024 |
@@ -101,6 +101,10 @@ Version numbers are listed only in this article and in the [What's new in Micros
101101

102102
To understand whether a feature is supported in your sensor version, check the relevant version section below and its listed features.
103103

104+
## Versions 24.1.x
105+
106+
### Version 24.1.0
107+
104108
## Versions 23.2.x
105109

106110
### Version 23.2.0

0 commit comments

Comments
 (0)