You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/connect-sensors.md
+21-28Lines changed: 21 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,15 +2,20 @@
2
2
title: Connect OT sensors to Microsoft Defender for IoT in the cloud
3
3
description: Learn how to connect your Microsoft Defender for IoT OT sensors to the cloud
4
4
ms.topic: how-to
5
-
ms.date: 06/02/2022
5
+
ms.date: 09/11/2022
6
6
---
7
7
8
8
# Connect your OT sensors to the cloud
9
9
10
-
This article describes how to connect your sensors to the Defender for IoT portal in Azure.
10
+
This article describes how to connect your OT network sensors to the Defender for IoT portal in Azure, for OT sensor software versions 22.x and later.
11
11
12
12
For more information about each connection method, see [Sensor connection methods](architecture-connections.md).
13
13
14
+
## Prerequisites
15
+
16
+
To use the connection methods described in this article, you must have an OT network sensor with software version 22.x or later.
17
+
18
+
For more information, see [Update Defender for IoT OT monitoring software](update-ot-software.md).
14
19
15
20
## Choose a sensor connection method
16
21
@@ -21,7 +26,7 @@ Use this section to help determine which connection method is right for your org
21
26
|- You require private connectivity between your sensor and Azure, <br>- Your site is connected to Azure via ExpressRoute, or <br>- Your site is connected to Azure over a VPN |**[Connect via an Azure proxy](#connect-via-an-azure-proxy)**|
22
27
|- Your sensor needs a proxy to reach from the OT network to the cloud, or <br>- You want multiple sensors to connect to Azure through a single point |**[Connect via proxy chaining](#connect-via-proxy-chaining)**|
23
28
|- You want to connect your sensor to Azure directly |**[Connect directly](#connect-directly)**|
24
-
|- You have sensors hosted in multiple public clouds |**[Connect via multi-cloud vendors](#connect-via-multi-cloud-vendors)**|
29
+
|- You have sensors hosted in multiple public clouds |**[Connect via multicloud vendors](#connect-via-multicloud-vendors)**|
25
30
26
31
27
32
## Connect via an Azure proxy
@@ -46,12 +51,7 @@ Before you start, make sure that you have:
46
51
47
52
- A proxy server resource, with firewall permissions to access Microsoft cloud services. The procedure described in this article uses a Squid server hosted in Azure.
48
53
49
-
- Outbound HTTPS traffic on port 443 to the following hostnames:
- Outbound HTTPS traffic on port 443 enabled to the required endpoints for Defender for IoT. Download the list of required endpoints from the **Sites and sensors** page: Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**.
55
55
56
56
> [!IMPORTANT]
57
57
> Microsoft Defender for IoT does not offer support for Squid or any other proxy services. It is the customer's responsibility to set up and maintain the proxy service.
@@ -335,12 +335,11 @@ This procedure describes how to install and configure a connection between your
335
335
sudo systemctl enable squid
336
336
```
337
337
338
-
1. Connect your proxy to Defender for IoT. Enable outbound HTTP traffic on port 443 from the sensor to the following Azure hostnames:
338
+
1. Connect your proxy to Defender for IoT:
339
+
340
+
1. Download the list of required endpoints from the **Sites and sensors** page: Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**.
341
+
1. Enable outbound HTTPS traffic on port 443 from the sensor to each of the required endpoints for Defender for IoT.
> Some organizations must define firewall rules by IP addresses. If this is true for your organization, it's important to know that the Azure public IP ranges are updated weekly.
@@ -352,30 +351,27 @@ This procedure describes how to install and configure a connection between your
352
351
353
352
This section describes what you need to configure a direct sensor connection to Defender for IoT in Azure. For more information, see [Direct connections](architecture-connections.md#direct-connections).
354
353
355
-
1. Ensure that your sensor can access the cloud using HTTP on port 443 to the following Microsoft domains:
354
+
1. Download the list of required endpoints from the **Sites and sensors** page on the Azure portal. Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**.
1. Ensure that your sensor can access the cloud using HTTPS on port 443 to each of the listed endpoints in the downloaded list.
361
357
362
358
1. Azure public IP addresses are updated weekly. If you must define firewall rules based on IP addresses, make sure to download the new JSON file each week and make the required changes on your site to correctly identify services running in Azure. You'll need the updated IP ranges for **AzureIoTHub**, **Storage**, and **EventHub**. See the [latest IP ranges](https://www.microsoft.com/en-us/download/details.aspx?id=56519).
363
359
364
-
## Connect via multi-cloud vendors
360
+
## Connect via multicloud vendors
365
361
366
-
This section describes how to connect your sensor to Defender for IoT in Azure from sensors deployed in one or more public clouds. For more information, see [Multi-cloud connections](architecture-connections.md#multi-cloud-connections).
362
+
This section describes how to connect your sensor to Defender for IoT in Azure from sensors deployed in one or more public clouds. For more information, see [Multicloud connections](architecture-connections.md#multicloud-connections).
367
363
368
364
### Prerequisites
369
365
370
366
Before you start:
371
367
372
368
- Make sure that you have a sensor deployed in a public cloud, such as AWS or Google Cloud, and configured to monitor SPAN traffic.
373
369
374
-
- Choose the multi-cloud connectivity method that's right for your organization:
370
+
- Choose the multicloud connectivity method that's right for your organization:
375
371
376
372
Use the following flow chart to determine which connectivity method to use:
377
373
378
-
:::image type="content" source="media/architecture-connections/multi-cloud-flow-chart.png" alt-text="Flow chart to determine which connectivity method to use.":::
374
+
:::image type="content" source="media/architecture-connections/multicloud-flow-chart.png" alt-text="Flow chart to determine which connectivity method to use.":::
379
375
380
376
- **Use public IP addresses over the internet** if you don't need to exchange data using private IP addresses
381
377
@@ -429,12 +425,9 @@ If you're an existing customer with a production deployment and sensors connecte
429
425
430
426
- Check the active resources in your account and make sure there are no other services connected to your IoT Hub.
431
427
432
-
- If you're running a hybrid environment with multiple sensor versions, make sure any sensors with software version 22.1.x can connect to Azure. Use firewall rules that allow outbound HTTPS traffic on port 443 to the following hostnames:
428
+
- If you're running a hybrid environment with multiple sensor versions, make sure any sensors with software version 22.1.x can connect to Azure. Use firewall rules that allow outbound HTTPS traffic on port 443 to each of the required endpoints.
Find the list of required endpoints for Defender for IoT from the **Sites and sensors** page on the Azure portal. Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**.
438
431
439
432
While you'll need to migrate your connections before the [legacy version reaches end of support](release-notes.md#versioning-and-support-for-on-premises-software-versions), you can currently deploy a hybrid network of sensors, including legacy software versions with their IoT Hub connections, and sensors with the connection methods described in this article.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-manage-individual-sensors.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,9 @@ You'll receive an error message if the activation file couldn't be uploaded. The
69
69
70
70
-**For locally connected sensors**: The activation file isn't valid. If the file isn't valid, go to [Defender for IoT in the Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started). On the **Sensor Management** page, select the sensor with the invalid file, and download a new activation file.
71
71
72
-
-**For cloud-connected sensors**: The sensor can't connect to the internet. Check the sensor's network configuration. If your sensor needs to connect through a web proxy to access the internet, verify that your proxy server is configured correctly on the **Sensor Network Configuration** screen. Verify that \*.azure-devices.net:443 is allowed in the firewall and/or proxy. If wildcards are not supported or you want more control, the FQDN for your specific endpoint (either a sensor, or for legacy connections, an IoT hub) should be opened in your firewall and/or proxy. For more information, see [Reference - IoT Hub endpoints](../../iot-hub/iot-hub-devguide-endpoints.md).
72
+
-**For cloud-connected sensors**: The sensor can't connect to the internet. Check the sensor's network configuration. If your sensor needs to connect through a web proxy to access the internet, verify that your proxy server is configured correctly on the **Sensor Network Configuration** screen. Verify that the required endpoints are allowed in the firewall and/or proxy.
73
+
74
+
For OT sensors version 22.x, download the list of required endpoints from the **Sites and sensors** page on the Azure portal. Select an OT sensor with a supported software version, or a site with one or more supported sensors. And then select **More actions** > **Download endpoint details**. For sensors with earlier versions, see [Sensor access to Azure portal](how-to-set-up-your-network.md#sensor-access-to-azure-portal).
73
75
74
76
-**For cloud-connected sensors**: The activation file is valid but Defender for IoT rejected it. If you can't resolve this problem, you can download another activation from the **Sites and Sensors** page in the [Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started). If this doesn't work, contact Microsoft Support.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-manage-sensors-on-the-cloud.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Manage sensors with Defender for IoT in the Azure portal
3
3
description: Learn how to onboard, view, and manage sensors with Defender for IoT in the Azure portal.
4
-
ms.date: 08/08/2022
4
+
ms.date: 09/08/2022
5
5
ms.topic: how-to
6
6
---
7
7
@@ -14,7 +14,7 @@ This article describes how to view and manage sensors with [Defender for IoT in
14
14
This procedure describes how to use the Azure portal to contact vendors for pre-configured appliances, or how to download software for you to install on your own appliances.
15
15
16
16
1. In the Azure portal, go to **Defender for IoT** > **Getting started** > **Sensor**.
17
-
17
+
18
18
1. Do one of the following:
19
19
20
20
- To buy a pre-configured appliance, select **Contact** under **Buy preconfigured appliance**. This opens an email to [[email protected]](mailto:[email protected]) with a template request for Defender for IoT appliances. For more information, see [Pre-configured physical appliances for OT monitoring](ot-pre-configured-appliances.md).
@@ -135,9 +135,10 @@ Use the options on the **Sites and sensor** page and a sensor details page to do
135
135
|:::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-edit.png" border="false"::: **Create an activation command**| Individual, Enterprise IoT sensors only. <br><br>Available from the **...** options menu or a sensor details page. Select **Edit** and then select **Create activation command**. <br><br>For more information, see [Install an Enterprise IoT sensor](tutorial-getting-started-eiot-sensor.md#install-the-sensor-software). |
136
136
|:::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-edit.png" border="false"::: **Edit automatic threat intelligence updates**| Individual, OT sensors only. <br><br>Available from the **...** options menu or a sensor details page. <br><br>Select **Edit** and then toggle the **Automatic Threat Intelligence Updates (Preview)** option on or off as needed. Select **Submit** to save your changes. |
137
137
|:::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-delete.png" border="false"::: **Delete a sensor**| For individual sensors only, from the **...** options menu or a sensor details page. |
138
+
| :::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-diagnostics.png" border="false"::: **Send diagnostic files to support**| Individual, locally managed OT sensors only. <br><br>Available from the **...** options menu. <br><br>For more information, see [Upload a diagnostics log for support (Public preview)](#upload-a-diagnostics-log-for-support-public-preview).|
138
139
|**Download SNMP MIB file**| Available from the **Sites and sensors** toolbar **More actions** menu. <br><br>For more information, see [Set up SNMP MIB monitoring](how-to-set-up-snmp-mib-monitoring.md).|
139
140
|**Recover an on-premises management console password**| Available from the **Sites and sensors** toolbar **More actions** menu. <br><br>For more information, see [Manage the on-premises management console](how-to-manage-the-on-premises-management-console.md). |
140
-
|:::image type="icon" source="media/how-to-manage-sensors-on-the-cloud/icon-diagnostics.png" border="false"::: **Send diagnostic files to support**| Individual, locally managed OT sensors only. <br><br>Available from the **...** options menu. <br><br>For more information, see [Upload a diagnostics log for support (Public preview)](#upload-a-diagnostics-log-for-support-public-preview).|
141
+
|**Download endpoint details**| Available from the **Sites and sensors** toolbar **More actions** menu, for OT sensor versions 22.x only. <br><br>Download the list of endpoints that must be enabled as secure endpoints from OT network sensors. Make sure that HTTPS traffic is enabled over port 443 to the listed endpoints for your sensor to connect to Azure. Outbound allow rules are defined once for all OT sensors onboarded to the same subscription.<br><br>To enable this option, select a sensor with a supported software version, or a site with one or more sensors with supported versions. |
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-set-up-your-network.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,8 +132,9 @@ Use the following tables to ensure that required firewalls are open on your work
132
132
133
133
| Protocol | Transport | In/Out | Port | Purpose | Source | Destination |
134
134
|--|--|--|--|--|--|--|
135
-
| HTTPS | TCP | Out | 443 | Access to Azure | Sensor |`*.azure-devices.net`<br> `*.blob.core.windows.net`<br> `*.servicebus.windows.net`|
136
-
| HTTPS | TCP | Out | 443 | Remote sensor upgrades from the Azure portal | Sensor|`download.microsoft.com`|
135
+
| HTTPS | TCP | Out | 443 | Access to Azure | Sensor |**For OT sensor versions 22.x**: Download the list from the **Sites and sensors** page in the Azure portal. Select an OT sensor with software versions 22.x or higher, or a site with one or more supported sensor versions. Then, select **More options > Download endpoint details**. For more information, see [Sensor management options from the Azure portal](how-to-manage-sensors-on-the-cloud.md#sensor-management-options-from-the-azure-portal).<br><br>**For OT sensor versions 10.x**: `*.azure-devices.net`<br> `*.blob.core.windows.net`<br> `*.servicebus.windows.net`|
136
+
| HTTPS | TCP | Out | 443 | Remote sensor updates from the Azure portal | Sensor|`download.microsoft.com`|
137
+
137
138
138
139
### Sensor access to the on-premises management console
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/integrate-with-active-directory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ You can associate Active Directory groups defined here with specific permission
46
46
| Domain controller port | Define the port on which your LDAP is configured. |
47
47
| Primary domain | Set the domain name (for example, `subdomain.domain.com`) and the connection type according to your LDAP configuration. |
48
48
| Active Directory groups | Enter the group names that are defined in your Active Directory configuration on the LDAP server. You can enter a group name that you'll associate with Admin, Security Analyst and Read-only permission levels. Use these groups when creating new sensor users.|
49
-
| Trusted domains| To add a trusted domain, add the domain name and the connection type of a trusted domain. <br />You can configure trusted domains only for users who were defined under users. |
49
+
| Trusted endpoints| To add a trusted domain, add the domain name and the connection type of a trusted domain. <br />You can configure trusted endpoints only for users who were defined under users. |
50
50
51
51
### Active Directory groups for the on-premises management console
0 commit comments