Skip to content

Commit e5357fe

Browse files
Merge pull request #210516 from batamig/cloud-connections
Cloud connections
2 parents d40d206 + 3f31ae6 commit e5357fe

13 files changed

+81
-62
lines changed

articles/defender-for-iot/organizations/architecture-connections.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: OT sensor cloud connection methods - Microsoft Defender for IoT
33
description: Learn about the architecture models available for connecting your sensors to Microsoft Defender for IoT.
44
ms.topic: conceptual
5-
ms.date: 03/08/2022
5+
ms.date: 09/11/2022
66
---
77

88
# OT sensor cloud connection methods
99

1010
This article describes the architectures and methods supported for connecting your Microsoft Defender for IoT OT sensors to the cloud.
1111

12-
All supported cloud connection methods provide:
12+
The cloud connection methods described in this article are supported only for OT sensor version 22.x and later. All methods provide:
1313

1414
- **Simple deployment**, requiring no extra installations in your private Azure environment, such as for an IoT Hub
1515

@@ -64,7 +64,7 @@ With direct connections
6464

6565
For more information, see [Connect directly](connect-sensors.md#connect-directly).
6666

67-
## Multi-cloud connections
67+
## Multicloud connections
6868

6969
You can connect your sensors to the Defender for IoT portal in Azure from other public clouds for OT/IoT management process monitoring.
7070

@@ -76,7 +76,7 @@ Depending on your environment configuration, you might connect using one of the
7676

7777
- A site-to-site VPN over the internet.
7878

79-
For more information, see [Connect via multi-cloud vendors](connect-sensors.md#connect-via-multi-cloud-vendors).
79+
For more information, see [Connect via multicloud vendors](connect-sensors.md#connect-via-multicloud-vendors).
8080

8181
## Working with a mixture of sensor software versions
8282

articles/defender-for-iot/organizations/connect-sensors.md

Lines changed: 21 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,20 @@
22
title: Connect OT sensors to Microsoft Defender for IoT in the cloud
33
description: Learn how to connect your Microsoft Defender for IoT OT sensors to the cloud
44
ms.topic: how-to
5-
ms.date: 06/02/2022
5+
ms.date: 09/11/2022
66
---
77

88
# Connect your OT sensors to the cloud
99

10-
This article describes how to connect your sensors to the Defender for IoT portal in Azure.
10+
This article describes how to connect your OT network sensors to the Defender for IoT portal in Azure, for OT sensor software versions 22.x and later.
1111

1212
For more information about each connection method, see [Sensor connection methods](architecture-connections.md).
1313

14+
## Prerequisites
15+
16+
To use the connection methods described in this article, you must have an OT network sensor with software version 22.x or later.
17+
18+
For more information, see [Update Defender for IoT OT monitoring software](update-ot-software.md).
1419

1520
## Choose a sensor connection method
1621

@@ -21,7 +26,7 @@ Use this section to help determine which connection method is right for your org
2126
|- You require private connectivity between your sensor and Azure, <br>- Your site is connected to Azure via ExpressRoute, or <br>- Your site is connected to Azure over a VPN | **[Connect via an Azure proxy](#connect-via-an-azure-proxy)** |
2227
|- Your sensor needs a proxy to reach from the OT network to the cloud, or <br>- You want multiple sensors to connect to Azure through a single point | **[Connect via proxy chaining](#connect-via-proxy-chaining)** |
2328
|- You want to connect your sensor to Azure directly | **[Connect directly](#connect-directly)** |
24-
|- You have sensors hosted in multiple public clouds | **[Connect via multi-cloud vendors](#connect-via-multi-cloud-vendors)** |
29+
|- You have sensors hosted in multiple public clouds | **[Connect via multicloud vendors](#connect-via-multicloud-vendors)** |
2530

2631

2732
## Connect via an Azure proxy
@@ -46,12 +51,7 @@ Before you start, make sure that you have:
4651

4752
- A proxy server resource, with firewall permissions to access Microsoft cloud services. The procedure described in this article uses a Squid server hosted in Azure.
4853

49-
- Outbound HTTPS traffic on port 443 to the following hostnames:
50-
51-
- **IoT Hub**: `*.azure-devices.net`
52-
- **Blob storage**: `*.blob.core.windows.net`
53-
- **EventHub**: `*.servicebus.windows.net`
54-
- **Microsoft Download Center**: `download.microsoft.com`
54+
- Outbound HTTPS traffic on port 443 enabled to the required endpoints for Defender for IoT. Download the list of required endpoints from the **Sites and sensors** page: Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**.
5555

5656
> [!IMPORTANT]
5757
> Microsoft Defender for IoT does not offer support for Squid or any other proxy services. It is the customer's responsibility to set up and maintain the proxy service.
@@ -335,12 +335,11 @@ This procedure describes how to install and configure a connection between your
335335
sudo systemctl enable squid
336336
```
337337
338-
1. Connect your proxy to Defender for IoT. Enable outbound HTTP traffic on port 443 from the sensor to the following Azure hostnames:
338+
1. Connect your proxy to Defender for IoT:
339+
340+
1. Download the list of required endpoints from the **Sites and sensors** page: Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**.
341+
1. Enable outbound HTTPS traffic on port 443 from the sensor to each of the required endpoints for Defender for IoT.
339342
340-
- **IoT Hub**: `*.azure-devices.net`
341-
- **Threat Intelligence**: `*.blob.core.windows.net`
342-
- **Eventhub**: `*.servicebus.windows.net`
343-
- **Microsoft download site**: `download.microsoft.com`
344343
345344
> [!IMPORTANT]
346345
> Some organizations must define firewall rules by IP addresses. If this is true for your organization, it's important to know that the Azure public IP ranges are updated weekly.
@@ -352,30 +351,27 @@ This procedure describes how to install and configure a connection between your
352351
353352
This section describes what you need to configure a direct sensor connection to Defender for IoT in Azure. For more information, see [Direct connections](architecture-connections.md#direct-connections).
354353
355-
1. Ensure that your sensor can access the cloud using HTTP on port 443 to the following Microsoft domains:
354+
1. Download the list of required endpoints from the **Sites and sensors** page on the Azure portal. Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**.
356355
357-
- **IoT Hub**: `*.azure-devices.net`
358-
- **Threat Intelligence**: `*.blob.core.windows.net`
359-
- **Eventhub**: `*.servicebus.windows.net`
360-
- **Microsoft Download Center**: `download.microsoft.com`
356+
1. Ensure that your sensor can access the cloud using HTTPS on port 443 to each of the listed endpoints in the downloaded list.
361357
362358
1. Azure public IP addresses are updated weekly. If you must define firewall rules based on IP addresses, make sure to download the new JSON file each week and make the required changes on your site to correctly identify services running in Azure. You'll need the updated IP ranges for **AzureIoTHub**, **Storage**, and **EventHub**. See the [latest IP ranges](https://www.microsoft.com/en-us/download/details.aspx?id=56519).
363359
364-
## Connect via multi-cloud vendors
360+
## Connect via multicloud vendors
365361
366-
This section describes how to connect your sensor to Defender for IoT in Azure from sensors deployed in one or more public clouds. For more information, see [Multi-cloud connections](architecture-connections.md#multi-cloud-connections).
362+
This section describes how to connect your sensor to Defender for IoT in Azure from sensors deployed in one or more public clouds. For more information, see [Multicloud connections](architecture-connections.md#multicloud-connections).
367363
368364
### Prerequisites
369365
370366
Before you start:
371367
372368
- Make sure that you have a sensor deployed in a public cloud, such as AWS or Google Cloud, and configured to monitor SPAN traffic.
373369
374-
- Choose the multi-cloud connectivity method that's right for your organization:
370+
- Choose the multicloud connectivity method that's right for your organization:
375371
376372
Use the following flow chart to determine which connectivity method to use:
377373
378-
:::image type="content" source="media/architecture-connections/multi-cloud-flow-chart.png" alt-text="Flow chart to determine which connectivity method to use.":::
374+
:::image type="content" source="media/architecture-connections/multicloud-flow-chart.png" alt-text="Flow chart to determine which connectivity method to use.":::
379375
380376
- **Use public IP addresses over the internet** if you don't need to exchange data using private IP addresses
381377
@@ -429,12 +425,9 @@ If you're an existing customer with a production deployment and sensors connecte
429425
430426
- Check the active resources in your account and make sure there are no other services connected to your IoT Hub.
431427
432-
- If you're running a hybrid environment with multiple sensor versions, make sure any sensors with software version 22.1.x can connect to Azure. Use firewall rules that allow outbound HTTPS traffic on port 443 to the following hostnames:
428+
- If you're running a hybrid environment with multiple sensor versions, make sure any sensors with software version 22.1.x can connect to Azure. Use firewall rules that allow outbound HTTPS traffic on port 443 to each of the required endpoints.
433429
434-
- **IoT Hub**: `*.azure-devices.net`
435-
- **Threat Intelligence**: `*.blob.core.windows.net`
436-
- **EventHub**: `*.servicebus.windows.net`
437-
- **Microsoft Download Center**: `download.microsoft.com`
430+
Find the list of required endpoints for Defender for IoT from the **Sites and sensors** page on the Azure portal. Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**.
438431
439432
While you'll need to migrate your connections before the [legacy version reaches end of support](release-notes.md#versioning-and-support-for-on-premises-software-versions), you can currently deploy a hybrid network of sensors, including legacy software versions with their IoT Hub connections, and sensors with the connection methods described in this article.
440433

articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,9 @@ You'll receive an error message if the activation file couldn't be uploaded. The
6969

7070
- **For locally connected sensors**: The activation file isn't valid. If the file isn't valid, go to [Defender for IoT in the Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started). On the **Sensor Management** page, select the sensor with the invalid file, and download a new activation file.
7171

72-
- **For cloud-connected sensors**: The sensor can't connect to the internet. Check the sensor's network configuration. If your sensor needs to connect through a web proxy to access the internet, verify that your proxy server is configured correctly on the **Sensor Network Configuration** screen. Verify that \*.azure-devices.net:443 is allowed in the firewall and/or proxy. If wildcards are not supported or you want more control, the FQDN for your specific endpoint (either a sensor, or for legacy connections, an IoT hub) should be opened in your firewall and/or proxy. For more information, see [Reference - IoT Hub endpoints](../../iot-hub/iot-hub-devguide-endpoints.md).
72+
- **For cloud-connected sensors**: The sensor can't connect to the internet. Check the sensor's network configuration. If your sensor needs to connect through a web proxy to access the internet, verify that your proxy server is configured correctly on the **Sensor Network Configuration** screen. Verify that the required endpoints are allowed in the firewall and/or proxy.
73+
74+
For OT sensors version 22.x, download the list of required endpoints from the **Sites and sensors** page on the Azure portal. Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**. For sensors with earlier versions, see [Sensor access to Azure portal](how-to-set-up-your-network.md#sensor-access-to-azure-portal).
7375

7476
- **For cloud-connected sensors**: The activation file is valid but Defender for IoT rejected it. If you can't resolve this problem, you can download another activation from the **Sites and Sensors** page in the [Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started). If this doesn't work, contact Microsoft Support.
7577

articles/defender-for-iot/organizations/how-to-manage-sensors-on-the-cloud.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Manage sensors with Defender for IoT in the Azure portal
33
description: Learn how to onboard, view, and manage sensors with Defender for IoT in the Azure portal.
4-
ms.date: 08/08/2022
4+
ms.date: 09/08/2022
55
ms.topic: how-to
66
---
77

@@ -14,7 +14,7 @@ This article describes how to view and manage sensors with [Defender for IoT in
1414
This procedure describes how to use the Azure portal to contact vendors for pre-configured appliances, or how to download software for you to install on your own appliances.
1515

1616
1. In the Azure portal, go to **Defender for IoT** > **Getting started** > **Sensor**.
17-
17+
1818
1. Do one of the following:
1919

2020
- To buy a pre-configured appliance, select **Contact** under **Buy preconfigured appliance**. This opens an email to [[email protected]](mailto:[email protected]) with a template request for Defender for IoT appliances. For more information, see [Pre-configured physical appliances for OT monitoring](ot-pre-configured-appliances.md).
@@ -135,9 +135,10 @@ Use the options on the **Sites and sensor** page and a sensor details page to do
135135
|:::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-edit.png" border="false"::: **Create an activation command** | Individual, Enterprise IoT sensors only. <br><br>Available from the **...** options menu or a sensor details page. Select **Edit** and then select **Create activation command**. <br><br>For more information, see [Install an Enterprise IoT sensor](tutorial-getting-started-eiot-sensor.md#install-the-sensor-software). |
136136
|:::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-edit.png" border="false"::: **Edit automatic threat intelligence updates** | Individual, OT sensors only. <br><br>Available from the **...** options menu or a sensor details page. <br><br>Select **Edit** and then toggle the **Automatic Threat Intelligence Updates (Preview)** option on or off as needed. Select **Submit** to save your changes. |
137137
|:::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-delete.png" border="false"::: **Delete a sensor** | For individual sensors only, from the **...** options menu or a sensor details page. |
138+
| :::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-diagnostics.png" border="false"::: **Send diagnostic files to support** | Individual, locally managed OT sensors only. <br><br>Available from the **...** options menu. <br><br>For more information, see [Upload a diagnostics log for support (Public preview)](#upload-a-diagnostics-log-for-support-public-preview).|
138139
| **Download SNMP MIB file** | Available from the **Sites and sensors** toolbar **More actions** menu. <br><br>For more information, see [Set up SNMP MIB monitoring](how-to-set-up-snmp-mib-monitoring.md).|
139140
| **Recover an on-premises management console password** | Available from the **Sites and sensors** toolbar **More actions** menu. <br><br>For more information, see [Manage the on-premises management console](how-to-manage-the-on-premises-management-console.md). |
140-
| :::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-diagnostics.png" border="false"::: **Send diagnostic files to support** | Individual, locally managed OT sensors only. <br><br>Available from the **...** options menu. <br><br>For more information, see [Upload a diagnostics log for support (Public preview)](#upload-a-diagnostics-log-for-support-public-preview).|
141+
| **Download endpoint details** | Available from the **Sites and sensors** toolbar **More actions** menu, for OT sensor versions 22.x only. <br><br>Download the list of endpoints that must be enabled as secure endpoints from OT network sensors. Make sure that HTTPS traffic is enabled over port 443 to the listed endpoints for your sensor to connect to Azure. Outbound allow rules are defined once for all OT sensors onboarded to the same subscription.<br><br>To enable this option, select a sensor with a supported software version, or a site with one or more sensors with supported versions. |
141142

142143
## Reactivate an OT sensor
143144

articles/defender-for-iot/organizations/how-to-set-up-your-network.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -132,8 +132,9 @@ Use the following tables to ensure that required firewalls are open on your work
132132

133133
| Protocol | Transport | In/Out | Port | Purpose | Source | Destination |
134134
|--|--|--|--|--|--|--|
135-
| HTTPS | TCP | Out | 443 | Access to Azure | Sensor | `*.azure-devices.net`<br> `*.blob.core.windows.net`<br> `*.servicebus.windows.net`|
136-
| HTTPS | TCP | Out | 443 | Remote sensor upgrades from the Azure portal | Sensor| `download.microsoft.com`|
135+
| HTTPS | TCP | Out | 443 | Access to Azure | Sensor |**For OT sensor versions 22.x**: Download the list from the **Sites and sensors** page in the Azure portal. Select an OT sensor with software versions 22.x or higher, or a site with one or more supported sensor versions. Then, select **More options > Download endpoint details**. For more information, see [Sensor management options from the Azure portal](how-to-manage-sensors-on-the-cloud.md#sensor-management-options-from-the-azure-portal).<br><br>**For OT sensor versions 10.x**: `*.azure-devices.net`<br> `*.blob.core.windows.net`<br> `*.servicebus.windows.net`|
136+
| HTTPS | TCP | Out | 443 | Remote sensor updates from the Azure portal | Sensor| `download.microsoft.com`|
137+
137138

138139
### Sensor access to the on-premises management console
139140

articles/defender-for-iot/organizations/integrate-with-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ You can associate Active Directory groups defined here with specific permission
4646
| Domain controller port | Define the port on which your LDAP is configured. |
4747
| Primary domain | Set the domain name (for example, `subdomain.domain.com`) and the connection type according to your LDAP configuration. |
4848
| Active Directory groups | Enter the group names that are defined in your Active Directory configuration on the LDAP server. You can enter a group name that you'll associate with Admin, Security Analyst and Read-only permission levels. Use these groups when creating new sensor users.|
49-
| Trusted domains | To add a trusted domain, add the domain name and the connection type of a trusted domain. <br />You can configure trusted domains only for users who were defined under users. |
49+
| Trusted endpoints | To add a trusted domain, add the domain name and the connection type of a trusted domain. <br />You can configure trusted endpoints only for users who were defined under users. |
5050

5151
### Active Directory groups for the on-premises management console
5252

185 KB
Loading
150 KB
Loading

0 commit comments

Comments
 (0)