Skip to content

Commit e51bb83

Browse files
committed
import firewall rules
1 parent a55da84 commit e51bb83

File tree

4 files changed

+23
-4
lines changed

4 files changed

+23
-4
lines changed

articles/defender-for-iot/organizations/how-to-create-risk-assessment-reports.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,10 @@ Risk assessment reports provide:
1717

1818
- A breakdown of the number of vulnerable devices, devices that need improvement and secure devices.
1919

20+
- Data about firewall rule risk. Defender for IoT [imports firewall rules](how-to-set-up-your-network.md#import-firewall-rules) from supported vendors and analyzes them. The Risk Assessment report highlights if a rule is not secure, or if there's a mismatch between the rule and the monitored network. For example:
21+
22+
:::image type="content" source="media/how-to-create-risk-assessment-reports/weak-firewall-rule.png" alt-text="Screenshot of a weak firewall rule that appears in a risk assessment report." lightbox="media/how-to-create-risk-assessment-reports/weak-firewall-rule.png":::
23+
2024
- Insight into security and operational issues:
2125

2226
- Configuration issues
@@ -37,10 +41,6 @@ Risk assessment reports provide:
3741

3842
- Attack vectors
3943

40-
- Data about firewall rule risk. Defender for IoT imports firewall rules from supported vendors and analyzes them. The Risk Assessment report highlights if a rule is not secure, or if there's a mismatch between the rule and the monitored network. For example:
41-
42-
Image to be added.
43-
4444
### Risk mitigation
4545

4646
Reports provide recommendations to help you improve your security score. For example:

articles/defender-for-iot/organizations/how-to-set-up-your-network.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,25 @@ Open these ports to allow extra services for Defender for IoT.
173173
| LDAPS | TCP | In/Out | 636 | Active Directory | Allows Active Directory management of users that have access, to sign in to the system | On-premises management console and Sensor | LDAPS server |
174174
| Tunneling | TCP | In | 9000 </br></br> In addition to port 443 </br></br> Allows access from the sensor, or end user, to the on-premises management console </br></br> Port 22 from the sensor to the on-premises management console | Monitoring | Tunneling | Endpoint, Sensor | On-premises management console |
175175

176+
## Import firewall rules
177+
178+
You can import firewall rules to your OT sensor from these supported vendors:
179+
180+
- Checkpoint
181+
- Fortinet
182+
- Juniper
183+
184+
**To import firewall rules**:
185+
186+
1. On the side menu, select **System Settings**.
187+
1. Select **Import settings**, and then select **Firewall rules**.
188+
1. In the **Firewall rules** pane, choose a firewall type from the dropdown menu.
189+
1. Once you've selected a firewall type, select **+ Import file** to upload a file.
190+
191+
:::image type="content" source="media/how-to-set-up-your-network/import-firewall-rules.png" alt-text="Screenshot of how to import firewall rules." lightbox="media/how-to-set-up-your-network/import-firewall-rules.png":::
192+
193+
Firewall rules are analyzed in the [Risk Assessment report](how-to-create-risk-assessment-reports.md).
194+
176195
## Choose a cloud connection method
177196

178197
If you're setting up OT sensors and connecting them to the cloud, understand supported cloud connection methods, and make sure to connect your sensors as needed.
35.2 KB
Loading
151 KB
Loading

0 commit comments

Comments
 (0)