Skip to content

Commit ec2a08e

Browse files
authored
Merge pull request #285689 from tarTech23/pubad
Public addresses
2 parents 05c0cb8 + 361bff5 commit ec2a08e

File tree

4 files changed

+39
-10
lines changed

4 files changed

+39
-10
lines changed

articles/defender-for-iot/organizations/configure-sensor-settings-portal.md

Lines changed: 33 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,8 @@ Define a new setting whenever you want to define a specific configuration for on
4343

4444
|Tab name |Description |
4545
|---------|---------|
46-
|**Basics** | Select the subscription where you want to apply your setting, and your [setting type](#sensor-setting-reference). <br><br>Enter a meaningful name and an optional description for your setting. |
47-
|**Setting** | Define the values for your selected setting type.<br>For details about the options available for each setting type, find your selected setting type in the [Sensor setting reference](#sensor-setting-reference) below. |
46+
|**Basics** | Select the subscription where you want to apply your setting, and your [setting type](#add-sensor-settings). <br><br>Enter a meaningful name and an optional description for your setting. |
47+
|**Setting** | Define the values for your selected setting type.<br>For details about the options available for each setting type, find your selected setting type in the [Sensor setting reference](#add-sensor-settings) below. |
4848
|**Apply** | Use the **Select sites**, **Select zones**, and **Select sensors** dropdown menus to define where you want to apply your setting. <br><br>**Important**: Selecting a site or zone applies the setting to all connected OT sensors, including any OT sensors added to the site or zone later on. <br>If you select to apply your settings to an entire site, you don't also need to select its zones or sensors. |
4949
|**Review and create** | Check the selections made for your setting. <br><br>If your new setting replaces an existing setting, a :::image type="icon" source="media/how-to-manage-individual-sensors/warning-icon.png" border="false"::: warning is shown to indicate the existing setting.<br><br>When you're satisfied with the setting's configuration, select **Create**. |
5050

@@ -108,9 +108,22 @@ If you're in a situation where the OT sensor is disconnected from Azure, and you
108108

109109
Continue by updating the relevant setting directly on the OT network sensor. For more information, see [Manage individual sensors](how-to-manage-individual-sensors.md).
110110

111-
## Sensor setting reference
111+
## Add sensor settings
112112

113-
Use the following sections to learn more about the individual OT sensor settings available from the Azure portal:
113+
Use the following sections to learn more about the individual OT sensor settings available from the Azure portal.
114+
115+
The **Type** settings are:
116+
117+
- [Active Directory](#active-directory)
118+
- [Bandwidth cap](#bandwidth-cap)
119+
- [NTP](#ntp)
120+
- [Local subnets](#local-subnets)
121+
- [VLAN naming](#vlan-naming)
122+
- [Public addresses](#public-addresses)
123+
124+
To add a new setting **Type**, select **Sites and sensors** > **Sensor settings**. Select the setting from the **Type** drop down, for example:
125+
126+
:::image type="content" source="media/configure-sensor-settings-portal/sensor-settings-type.png" alt-text="The screenshot shows the sensor settings page with the type dropdown list options.":::
114127

115128
### Active Directory
116129

@@ -147,24 +160,22 @@ To configure an NTP server for your sensor from the Azure portal, define an IP/D
147160

148161
### Local subnets
149162

150-
To focus the Azure device inventory on devices that are in your OT scope, you need to manually edit the subnet list to include only the locally monitored subnets that are in your OT scope.
163+
To focus the Azure device inventory on devices that are in your OT scope, you need to manually edit the subnet list to include only the locally monitored subnets that are in your OT scope.
151164

152165
Subnets in the subnet list are automatically configured as ICS subnets, which means that Defender for IoT recognizes these subnets as OT networks. You can edit this setting when you [configure the subnets](#configure-subnets-in-the-azure-portal).
153166

154167
Once the subnets are configured, the network location of the devices is shown in the *Network location* (Public preview) column in the Azure device inventory. All of the devices associated with the listed subnets are displayed as *local*, while devices associated with detected subnets not included in the list are displayed as *routed*.
155168

156169
#### Configure subnets in the Azure portal
157170

158-
1. In the Azure portal, go to **Sites and sensors** > **Sensor settings**.
159-
160171
1. Under **Local subnets**, review the configured subnets. To focus the device inventory and view local devices in the inventory, delete any subnets that are not in your IoT/OT scope by selecting the options menu (...) on any subnet you want to delete.
161172

162173
1. To modify additional settings, select any subnet and then select **Edit** for the following options:
163174

164175
- Select **Import subnets** to import a comma-separated list of subnet IP addresses and masks. Select **Export subnets** to export a list of currently configured data, or **Clear all** to start from scratch.
165176

166177
- Enter values in the **IP Address**, **Mask**, and **Name** fields to add subnet details manually. Select **Add subnet** to add additional subnets as needed.
167-
178+
168179
- **ICS Subnet** is on by default, which means that Defender for IoT recognizes the subnet as an OT network. To mark a subnet as non-ICS, toggle off **ICS Subnet**.
169180

170181
### VLAN naming
@@ -173,6 +184,20 @@ To define a VLAN for your OT sensor, enter the VLAN ID and a meaningful name.
173184

174185
Select **Add VLAN** to add more VLANs as needed.
175186

187+
### Public addresses
188+
189+
Add public addresses that might have been used for internal use and shouldn't be included as suspicious IP addresses or tracking the data<!-- Theo is this correct? OR-->.
190+
Excluded public IP addresses that might have been used for internal use and shouldn't be included as suspicious IP addresses or tracking the data.
191+
192+
1. In the **Settings** tab, type the **IP address** and **Mask** address.
193+
194+
:::image type="content" source="media/configure-sensor-settings-portal/sensor-settings-ip-addresses.png" alt-text="The screenshot shows the Settings tab for adding public addresses to the sensor settings.":::
195+
196+
1. Select **Next**.
197+
1. In the **Apply** tab, select sites, and toggle the **Add selection by specific zone/sensor** to optionally apply the IP addresses to specific zones and sensors.
198+
1. Select **Next**.
199+
1. Review the details and select **Create** to add the address to the public addresses list.
200+
176201
## Next steps
177202

178203
> [!div class="nextstepaction"]
33.1 KB
Loading
33.2 KB
Loading

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Features released earlier than nine months ago are described in the [What's new
2222

2323
|Service area |Updates |
2424
|---------|---------|
25-
| **OT networks** | - [Add wildcards to allowlist domain names](#add-wildcards-allowlist-domain-names)<br> - [Added protocol](#added-protocol) <br> - [Improved OT sensor onboarding](#improved-ot-sensor-onboarding) |
25+
| **OT networks** | - [Add wildcards to allowlist domain names](#add-wildcards-allowlist-domain-names)<br> - [Added protocol](#added-protocol) <br> - [New sensor setting type Public addresses](#new-sensor-setting-type-public-addresses) <br> - [Improved OT sensor onboarding](#improved-ot-sensor-onboarding) |
2626

2727
### Add wildcards allowlist domain names
2828

@@ -32,6 +32,10 @@ When adding domain names to the FQDN allowlist use the `*` wildcard to include a
3232

3333
We now support the OCPI protocol. See [the updated protocol list](concept-supported-protocols.md#supported-protocols-for-ot-device-discovery).
3434

35+
### New sensor setting type Public addresses
36+
37+
We're adding the **Public addresses** type to the sensor settings, that allows you to exclude public IP addresses that might have been used for internal use and shouldn't be tracked. For more information, see [add sensor settings](configure-sensor-settings-portal.md#add-sensor-settings).
38+
3539
### Improved OT sensor onboarding
3640

3741
If there are connection problems, during sensor onboarding, between the OT sensor and the Azure portal at the configuration stage, the process can't be completed until the connection problem is solved.
@@ -480,7 +484,7 @@ For more information, see:
480484

481485
Now you can configure Active Directory and NTP settings for your OT sensors remotely from the **Sites and sensors** page in the Azure portal. These settings are available for OT sensor versions 22.3.x and higher.
482486

483-
For more information, see [Sensor setting reference](configure-sensor-settings-portal.md#sensor-setting-reference).
487+
For more information, see [Sensor setting reference](configure-sensor-settings-portal.md#add-sensor-settings).
484488

485489
## April 2023
486490

0 commit comments

Comments
 (0)