You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/concept-event-aggregation.md
+14-7Lines changed: 14 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,17 @@
1
1
---
2
2
title: Micro agent event collection (Preview)
3
3
description: Defender for IoT security agents collects data and system events from your local device, and sends the data to the Azure cloud for processing, and analytics.
4
-
ms.date: 11/09/2021
4
+
ms.date: 04/26/2022
5
5
ms.topic: conceptual
6
6
---
7
7
8
8
# Micro agent event collection (Preview)
9
9
10
-
Defender for IoT security agents collects data, and system events from your local device, and sends the data to the Azure cloud for processing, and analytics. The Defender for IoT micro agent collects many types of device events including new processes, and all new connection events. Both the new process, and new connection events may occur frequently on a device. This capability is important for comprehensive security, however, the number of messages the security agents send may quickly meet, or exceed your IoT Hub quota, and cost limits. These messages, and events contain highly valuable security information that is crucial to protecting your device.
10
+
Defender for IoT security agents collects data, and system events from your local device, and sends the data to the Azure cloud for processing.
11
+
12
+
If you've configured and connected a Log Analytics workspace, you'll see these events in Log Analytics. For more information, see [Tutorial: Investigate security alerts](tutorial-investigate-security-alerts.md).
13
+
14
+
The Defender for IoT micro agent collects many types of device events including new processes, and all new connection events. Both the new process, and new connection events may occur frequently on a device. This capability is important for comprehensive security, however, the number of messages the security agents send may quickly meet, or exceed your IoT Hub quota, and cost limits. These messages, and events contain highly valuable security information that is crucial to protecting your device.
11
15
12
16
To reduce the number of messages, and costs while maintaining your device's security, Defender for IoT agents aggregate the following types of events:
13
17
@@ -78,7 +82,7 @@ The Login collector, collects user sign-ins, sign-outs, and failed sign-in attem
78
82
79
83
The Login collector supports the following types of collection methods:
80
84
81
-
-**Syslog**. If syslog is running on the device, the Login collector collects SSH sign-in events via the syslog file named **auth.log**.
85
+
-**UTMP and SYSLOG**. UTMP catches SSH interactive events, telnet events, and terminal logins, as well as all failed login events from SSH, telnet, and terminal. If SYSLOG is enabled on the device, the Login collector also collects SSH sign-in events via the SYSLOG file named **auth.log**.
82
86
83
87
-**Pluggable Authentication Modules (PAM)**. Collects SSH, telnet, and local sign-in events. For more information, see [Configure Pluggable Authentication Modules (PAM) to audit sign-in events](configure-pam-to-audit-sign-in-events.md).
84
88
@@ -91,9 +95,10 @@ The following data is collected:
91
95
|**user_name**| The Linux user. |
92
96
|**executable**| The terminal device. For example, `tty1..6` or `pts/n`. |
93
97
|**remote_address**| The source of connection, either a remote IP address in IPv6 or IPv4 format, or `127.0.0.1/0.0.0.0` to indicate local connection. |
98
+
|**Login_UsePAM**| Boolean: <br>- **True**: Only the PAM Login collector is used <br>- **False**: The UTMP Login collector is used, with SYSLOG if SYSLOG is enabled |
94
99
95
100
96
-
## System information (trigger based collector))
101
+
## System information (trigger based collector)
97
102
98
103
The data collected for each event is:
99
104
@@ -118,7 +123,7 @@ The **nics** properties are composed of the following;
118
123
119
124
## Baseline (trigger based)
120
125
121
-
The baseline collector performs CIS checks periodically. Only the failed results are sent to the cloud. The cloud aggregates the results, and provides recommendations.
126
+
The baseline collector performs periodic CIS checks, and *failed*, *pass*, and *skip* check results are sent to the Defender for IoT cloud service. Defender for IoT aggregates the results and provides recommendations based on any failures.
122
127
123
128
### Data collection
124
129
@@ -127,7 +132,7 @@ The data collected for each event is:
127
132
| Parameter | Description|
128
133
|--|--|
129
134
|**Check ID**| In CIS format. For example, `CIS-debian-9-Filesystem-1.1.2`. |
130
-
|**Check result**| Can be `Error`, or `Fail`. For example, `Error` in a situation where the check can’t run. |
135
+
|**Check result**| Can be `Fail`, `Pass`, `Skip`, or `Error`. For example, `Error` in a situation where the check can’t run. |
131
136
|**Error**| The error's information, and description. |
132
137
|**Description**| The description of the check from CIS. |
133
138
|**Remediation**| The recommendation for remediation from CIS. |
@@ -144,9 +149,11 @@ The data collected on each package includes:
144
149
|**Name**| The package name |
145
150
|**Version**| The package version |
146
151
|**Vendor**| The package's vendor, which is the **Maintainer** field in deb packages |
147
-
|||
148
152
149
153
154
+
> [!NOTE]
155
+
> The SBoM collector currently only collects the first 500 packages ingested.
156
+
150
157
## Next steps
151
158
152
159
Check your [Defender for IoT security alerts](concept-security-alerts.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/concept-micro-agent-configuration.md
+1-7Lines changed: 1 addition & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Micro agent configurations (Preview)
3
3
description: The collector sends all current data immediately after any configuration change is made. The changes are then applied.
4
-
ms.date: 12/22/2021
4
+
ms.date: 05/03/2022
5
5
ms.topic: conceptual
6
6
---
7
7
@@ -24,7 +24,6 @@ Default values are as follows:
24
24
|**Low**| 1440 (24 hours) |
25
25
|**Medium**| 120 (2 hours) |
26
26
|**High**| 30 (.5 hours) |
27
-
|||
28
27
29
28
To reduce the number of messages sent to cloud, each priority should be set as a multiple of the one below it. For example, High: 60 minutes, Medium: 120 minutes, Low: 480 minutes.
30
29
@@ -42,7 +41,6 @@ For example:
42
41
|--|--|--|--|
43
42
|**Baseline_GroupsDisabled**| A list of Baseline group names, separated by a comma. <br><br>For example: `Time Synchronization, Network Parameters Host`| Defines the full list of Baseline group names that should be disabled. | Null |
44
43
|**Baseline_ChecksDisabled**|A list of Baseline check IDs, separated by a comma. <br><br>For example: `3.3.5,2.2.1.1`| Defines the full list of Baseline check IDs that should be disabled. | Null |
45
-
|||||
46
44
47
45
48
46
## Event-based collector configurations
@@ -55,14 +53,12 @@ These configurations include process, and network activity collectors.
55
53
|**Aggregation mode**|`True` <br>`False`| Determines whether to process event aggregation for an identical event. |`True`|
56
54
|**Cache size**| cycle FIFO | Defines the number of events collected in between the times that data is sent. |`256`|
57
55
|**Disable collector**|`True` <br> `False`| Determines whether or not the collector is operational. |`False`|
|**IothubModule_MessageTimeout**| Positive integer, including limits | Defines the number of minutes to retain messages in the outbound queue to the IoT Hub, after which point the messages are dropped. |`2880` (=2 days) |
@@ -77,7 +73,6 @@ These configurations include process, and network activity collectors.
77
73
|--|--|--|--|
78
74
|**Process_Mode**|`1` = Auto <br>`2` = Netlink <br>`3`= Polling | Determines the process collector mode. In `Auto` mode, the agent first tries to enable the Netlink mode. <br><br>If that fails, it will automatically fall back / switch to the Polling mode.|`1`|
79
75
|**Process_PollingInterval**|Integer |Defines the polling interval in microseconds. This value is used when the **Process_Mode** is in `Polling` mode. |`100000` (=0.1 second) |
80
-
|||||
81
76
82
77
## Trigger-based collector configurations
83
78
@@ -87,7 +82,6 @@ These configurations include system information, and baseline collectors.
87
82
|--|--|--|--|
88
83
|**Interval**|`High` <br>`Medium`<br>`Low`| The frequency in which data is sent. |`Low`|
89
84
|**Disable collector**|`True` <br> `False`| Whether or not the collector is operational. |`False`|
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/how-to-investigate-cis-benchmark.md
+16-20Lines changed: 16 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Investigate CIS benchmark recommendation
3
3
description: Perform basic and advanced investigations based on OS baseline recommendations.
4
-
ms.date: 11/09/2021
4
+
ms.date: 05/03/2022
5
5
ms.topic: how-to
6
6
---
7
7
@@ -12,39 +12,35 @@ Perform basic and advanced investigations based on OS baseline recommendations.
12
12
> [!NOTE]
13
13
> The Microsoft Defender for IoT legacy experience under IoT Hub has been replaced by our new Defender for IoT standalone experience, in the Defender for IoT area of the Azure portal. The legacy experience under IoT Hub will not be supported after **March 31, 2023**.
14
14
15
-
## Basic OS baseline security recommendation investigation
15
+
## Basic OS baseline security recommendation investigation
16
16
17
17
You can investigate OS baseline recommendations by navigating to [Defender for IoT in the Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started). For more information, see how to [Investigate security recommendations](quickstart-investigate-security-recommendations.md).
18
18
19
-
## Advanced OS baseline security recommendation investigation
19
+
## Advanced OS baseline security recommendation investigation
20
20
21
-
This section describes how to better understand the OS baseline test results, and querying events in Azure Log Analytics.
21
+
This section describes how to better understand the OS baseline test results, and querying events in Azure Log Analytics.
22
22
23
-
The advanced OS baseline security recommendation investigation is only supported by using log analytics. Connect Defender for IoT to a Log Analytics workspace before continuing. For more information on advanced OS baseline security recommendations, see how to [Configure Microsoft Defender for IoT agent-based solution](how-to-configure-agent-based-solution.md).
23
+
**Prerequisites**:
24
24
25
-
To query your IoT security events in Log Analytics for alerts:
25
+
The advanced OS baseline security recommendation investigation is only supported by using Azure Log Analytics and you must connect Defender for IoT to a Log Analytics workspace before continuing.
26
26
27
-
1. Navigate to the **Alerts** page.
27
+
For more information, see [Configure Microsoft Defender for IoT agent-based solution](tutorial-configure-agent-based-solution.md).
28
28
29
-
1. Select **Investigate recommendations in Log Analytics workspace**.
29
+
**To query your IoT security events in Log Analytics for alerts**:
30
30
31
-
To query your IoT security events in Log Analytics for recommendations:
31
+
1. In your Log Analytics workspace, go to **Logs** > **AzureSecurityOfThings** > **SecurityAlert**.
32
32
33
-
1.Navigate to the **Recommendations** page.
33
+
1.In the query editor on the right, enter a KQL query to display the alerts you want to see.
34
34
35
-
1. Select **Investigate recommendations in Log Analytics workspace**.
35
+
1. Select **Run** to display the alerts that match your query.
36
36
37
-
1. Select **Show Operation system (OS) baseline rules details** from the **Recommendation details** quick view page to see the details of a specific device.
37
+
For example:
38
38
39
-
:::image type="content" source="media/how-to-investigate-cis-benchmark/recommendation-details.png" alt-text="See the details of a specific device.":::
39
+
:::image type="content" source="media/how-to-investigate-cis-benchmark/log-analytics.png" alt-text="Screenshot of the Log Analytics workspace with a Defender for I o T alert query." lightbox="media/how-to-investigate-cis-benchmark/log-analytics.png":::
40
40
41
-
To query your IoT security events in Log Analytics workspace directly:
42
-
43
-
1. Navigate to the **Logs** page.
44
-
45
-
:::image type="content" source="media/how-to-investigate-cis-benchmark/logs.png" alt-text="Select logs from the left side pane.":::
46
-
47
-
1. Select **Investigate the alerts** or, select the **Investigate the alerts in Log Analytics** option from any security recommendation, or alert.
41
+
> [!NOTE]
42
+
> In addition to alerts, you can also use this same procedure to query for recommendations or raw event data.
43
+
>
48
44
49
45
## Useful queries to investigate the OS baseline resources
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,8 +34,8 @@ The Defender for IoT micro agent enables you to quickly improve your organizatio
34
34
The Defender for IoT micro agent provides deep security protection, and visibility into device behavior.
35
35
36
36
- The micro agent collects, aggregates, and analyzes raw security events from your devices. Events can include IP connections, process creation, user logons, and other security-relevant information.
37
-
- Defender for IoT device agents handles event aggregation, to help avoid high network throughput.
38
-
- The micro agent has flexible deployment options. The micro agent includes source code, so you can incorporate it into firmware, or customize it to include only what you need. It's also available as a binary package, or integrated directly into other Azure IoT solutions. The micro agent is available for standard IoT operating systems, such as Linux and Azure RTOS.
37
+
- Defender for IoT device agents handle event aggregation, to help avoid high network throughput.
38
+
- The micro agent has flexible deployment options. The micro agent includes source code, so you can incorporate it into firmware, or customize it to include only what you need. It's also available as a binary package, or integrated directly into other Azure IoT solutions. The micro agent is available for standard IoT operating systems, such as Linux and Azure RTOS.
39
39
- The agents are highly customizable, allowing you to use them for specific tasks, such as sending only important information at the fastest SLA, or for aggregating extensive security information and context into larger segments, avoiding higher service costs.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/release-notes.md
+21-7Lines changed: 21 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: What's new in Microsoft Defender for IoT for device builders
3
3
description: Learn about the latest updates for Defender for IoT device builders.
4
4
ms.topic: conceptual
5
-
ms.date: 02/20/2022
5
+
ms.date: 04/26/2022
6
6
---
7
7
8
8
# What's new
@@ -13,9 +13,23 @@ This article lists new features and feature enhancements in Microsoft Defender f
13
13
14
14
Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15
15
16
-
## Versioning and support
16
+
For more information, see [Upgrade the Microsoft Defender for IoT micro agent](upgrade-micro-agent.md).
17
17
18
-
Listed below are the support, breaking change policies for Defender for IoT, and the versions of Defender for IoT that are currently available.
18
+
## July 2022
19
+
20
+
**Version 4.2.4**
21
+
22
+
-**Proxy connection updates**: Now you can connect your micro-agent to an IoT Hub via a proxy. For more information, see [Connect via a proxy](tutorial-standalone-agent-binary-installation.md#connect-via-a-proxy).
23
+
24
+
-**Support for TPM-backed certificates**: Now you can use OpenSSL certificates backed by TPM. For more information, see [Authenticate using a certificate](tutorial-standalone-agent-binary-installation.md#authenticate-using-a-certificate).
25
+
26
+
-**AMQP support**: Now you can add AMQP support after installing your micro-agent. For more information, see [Add AMQP protocol support](tutorial-standalone-agent-binary-installation.md#add-amqp-protocol-support).
27
+
28
+
-**Baseline collector updates**: The baseline collector now sends *pass* and *skip* checks to the cloud in addition to *failed* results. For more information, see [Micro agent event collection](concept-event-aggregation.md#baseline-trigger-based).
29
+
30
+
-**Login collector via UTMP**: The login collector now supports UTMP to catch SSH interactive events, telnet events, and terminal logins, including failed login events. For more information, see [Login collector (event-based collector)](concept-event-aggregation.md#login-collector-event-based-collector).
31
+
32
+
-**SBoM collector known issue**: The SBoM collector currently only collects the first 500 packages ingested. For more information, see [SBoM (trigger based)](concept-event-aggregation.md#sbom-trigger-based) collection.
19
33
20
34
## February 2022
21
35
@@ -41,8 +55,7 @@ Listed below are the support, breaking change policies for Defender for IoT, and
41
55
42
56
For more information, see [Network Connection events (event-based collector)](concept-event-aggregation.md#network-connection-events-event-based-collector).
43
57
44
-
-**Login Collector**: Now supporting login collector using: SYSLOG collecting SSH login events and PAM collecting SSH, telnet and local login events using the pluggable authentication modules stack. For more information, see [Micro agent event collection (Preview)](concept-event-aggregation.md).
45
-
58
+
-**Login Collector**: Now supporting login collector using: SYSLOG collecting SSH login events and PAM collecting SSH, telnet and local login events using the pluggable authentication modules stack. For more information, see [Login collector (event-based collector)](concept-event-aggregation.md#login-collector-event-based-collector).
46
59
47
60
## November 2021
48
61
@@ -66,7 +79,7 @@ Listed below are the support, breaking change policies for Defender for IoT, and
66
79
67
80
-**[Login collector](concept-event-aggregation.md#login-collector-event-based-collector)** - The login collectors gather user logins, logouts, and failed login attempts. Such as SSH & telnet.
68
81
69
-
-**[System information collector](concept-event-aggregation.md#system-information-trigger-based-collector)** - The system information collector gatherers information related to the device’s operating system and hardware details.
82
+
-**[System information collector](concept-event-aggregation.md#system-information-trigger-based-collector)** - The system information collector gathers information related to the device’s operating system and hardware details.
70
83
71
84
-**[Event aggregation](concept-event-aggregation.md#how-does-event-aggregation-work)** - The Defender for IoT agent aggregates events such as process, login, network events that reduce the number of messages sent and costs, all while maintaining your device's security.
72
85
@@ -94,4 +107,5 @@ This feature set is available with the current public preview cloud release.
94
107
95
108
## Next steps
96
109
97
-
[Onboard to Defender for IoT](quickstart-onboard-iot-hub.md)
110
+
-[Onboard to Defender for IoT](quickstart-onboard-iot-hub.md)
111
+
-[Upgrade the Microsoft Defender for IoT micro agent](upgrade-micro-agent.md)
0 commit comments