Skip to content

Commit e5e887e

Browse files
authored
Merge pull request #232242 from batamig/release-deploy-sanity-xrefs
Release deploy sanity xrefs 1
2 parents 782e597 + bd35c1f commit e5e887e

File tree

6 files changed

+7
-8
lines changed

6 files changed

+7
-8
lines changed

articles/defender-for-iot/organizations/best-practices/certificate-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Defender for IoT uses SSL/TLS certificates to secure communication between the f
2020
- Between an on-premises management console and a high availability (HA) server, if configured
2121
- Between OT sensors or on-premises management consoles and partners servers defined in [alert forwarding rules](../how-to-forward-alert-information-to-partners.md)
2222

23-
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and block encrypted communication between Defender for IoT components.
23+
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
2424

2525
> [!IMPORTANT]
2626
> You must create a unique certificate for each OT sensor, on-premises management console, and high availability server, where each certificate meets required criteria.

articles/defender-for-iot/organizations/best-practices/plan-corporate-monitoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ For more information, see:
7474

7575
For cloud-connected sensors, determine how you'll be connecting each OT sensor to Defender for IoT in the Azure cloud, such as what sort of proxy you might need. For more information, see [Methods for connecting sensors to Azure](../architecture-connections.md).
7676

77-
If you're working in an air-gapped or hybrid environment and will have multiple, locally-managed OT network sensors, you may want to plan to deploy an on-premises management console to configure your settings and view data from a central location.
77+
If you're working in an air-gapped or hybrid environment and will have multiple, locally-managed OT network sensors, you may want to plan to deploy an on-premises management console to configure your settings and view data from a central location. For more information, see the [Air-gapped OT sensor management deployment path](../ot-deploy/air-gapped-deploy.md).
7878

7979
## Plan on-premises SSL/TLS certifications
8080

articles/defender-for-iot/organizations/best-practices/plan-prepare-deploy.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ Prepare a workstation from where you can run Defender for IoT deployment activit
183183

184184
- A supported browser for connecting to sensor consoles and the Azure portal. For more information, see [recommended browsers for the Azure portal](../../../azure-portal/azure-portal-supported-browsers-devices.md#recommended-browsers).
185185

186-
- Required firewall rules configured, with access open for required interfaces.
186+
- Required firewall rules configured, with access open for required interfaces. For more information, see [Networking requirements](../networking-requirements.md).
187187

188188
## Prepare CA-signed certificates
189189

@@ -196,6 +196,7 @@ If you decide to deploy with the built-in, self-signed certificate, we recommend
196196
For more information, see:
197197

198198
- [Create SSL/TLS certificates for OT appliances](../ot-deploy/create-ssl-certificates.md)
199+
- [Manage SSL/TLS certificates](../how-to-manage-individual-sensors.md#manage-ssltls-certificates)
199200

200201
## Next steps
201202

articles/defender-for-iot/organizations/best-practices/traffic-mirroring-methods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Choose a traffic mirroring method - Microsoft Defender for IoT
2+
title: Choose a traffic mirroring methods - Microsoft Defender for IoT
33
description: This article describes traffic mirroring methods for OT monitoring with Microsoft Defender for IoT.
44
ms.date: 09/20/2022
55
ms.topic: install-set-up-deploy

articles/defender-for-iot/organizations/includes/caution-manual-configurations.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,5 @@ ms.date: 01/12/2023
55
ms.topic: include
66
---
77

8-
<!-- docutune:disable -->
9-
108
> [!CAUTION]
11-
> Only documented configuration parameters on the OT network sensor and on-premises management console are supported for customer configuration. Do not change any non-documented configuration parameters, as changes may cause unexpected behavior and system failures.
9+
> Only documented configuration parameters on the OT network sensor and on-premises management console are supported for customer configuration. Do not change any undocumented configuration parameters or system properties, as changes may cause unexpected behavior and system failures.

articles/defender-for-iot/organizations/includes/troubleshoot-ssl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,5 +13,5 @@ You won't be able to upload certificates to your OT sensors or on-premises manag
1313
| **Cannot validate chain of trust. The provided Certificate and Root CA don't match.** | Make sure a `.pem` file correlates to the `.crt` file. <br> If the problem continues, try recreating the certificate using the correct chain of trust, as defined by the `.pem` file. |
1414
| **This SSL certificate has expired and isn't considered valid.** | Create a new certificate with valid dates.|
1515
|**This certificate has been revoked by the CRL and can't be trusted for a secure connection** | Create a new unrevoked certificate. |
16-
|**The CRL (Certificate Revocation List) location is not reachable. Verify the URL can be accessed from this appliance** | Make sure that your network configuration allows the sensor or on-premises management console to reach the CRL server defined in the certificate. |
16+
|**The CRL (Certificate Revocation List) location is not reachable. Verify the URL can be accessed from this appliance** | Make sure that your network configuration allows the sensor or on-premises management console to reach the CRL server defined in the certificate. <br> For more information, see [Verify CRL server access](../ot-deploy/create-ssl-certificates.md#verify-crl-server-access). |
1717
|**Certificate validation failed** | This indicates a general error in the appliance. <br> Contact [Microsoft Support](https://support.microsoft.com/supportforbusiness/productselection?sapId=82c8f35-1b8e-f274-ec11-c6efdd6dd099).|

0 commit comments

Comments
 (0)