You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/configure-sensor-settings-portal.md
+33-8Lines changed: 33 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,8 +43,8 @@ Define a new setting whenever you want to define a specific configuration for on
43
43
44
44
|Tab name |Description |
45
45
|---------|---------|
46
-
|**Basics**| Select the subscription where you want to apply your setting, and your [setting type](#sensor-setting-reference). <br><br>Enter a meaningful name and an optional description for your setting. |
47
-
|**Setting**| Define the values for your selected setting type.<br>For details about the options available for each setting type, find your selected setting type in the [Sensor setting reference](#sensor-setting-reference) below. |
46
+
|**Basics**| Select the subscription where you want to apply your setting, and your [setting type](#add-sensor-settings). <br><br>Enter a meaningful name and an optional description for your setting. |
47
+
|**Setting**| Define the values for your selected setting type.<br>For details about the options available for each setting type, find your selected setting type in the [Sensor setting reference](#add-sensor-settings) below. |
48
48
|**Apply**| Use the **Select sites**, **Select zones**, and **Select sensors** dropdown menus to define where you want to apply your setting. <br><br>**Important**: Selecting a site or zone applies the setting to all connected OT sensors, including any OT sensors added to the site or zone later on. <br>If you select to apply your settings to an entire site, you don't also need to select its zones or sensors. |
49
49
|**Review and create**| Check the selections made for your setting. <br><br>If your new setting replaces an existing setting, a :::image type="icon" source="media/how-to-manage-individual-sensors/warning-icon.png" border="false"::: warning is shown to indicate the existing setting.<br><br>When you're satisfied with the setting's configuration, select **Create**. |
50
50
@@ -108,9 +108,22 @@ If you're in a situation where the OT sensor is disconnected from Azure, and you
108
108
109
109
Continue by updating the relevant setting directly on the OT network sensor. For more information, see [Manage individual sensors](how-to-manage-individual-sensors.md).
110
110
111
-
## Sensor setting reference
111
+
## Add sensor settings
112
112
113
-
Use the following sections to learn more about the individual OT sensor settings available from the Azure portal:
113
+
Use the following sections to learn more about the individual OT sensor settings available from the Azure portal.
114
+
115
+
The **Type** settings are:
116
+
117
+
-[Active Directory](#active-directory)
118
+
-[Bandwidth cap](#bandwidth-cap)
119
+
-[NTP](#ntp)
120
+
-[Local subnets](#local-subnets)
121
+
-[VLAN naming](#vlan-naming)
122
+
-[Public addresses](#public-addresses)
123
+
124
+
To add a new setting **Type**, select **Sites and sensors** > **Sensor settings**. Select the setting from the **Type** drop down, for example:
125
+
126
+
:::image type="content" source="media/configure-sensor-settings-portal/sensor-settings-type.png" alt-text="The screenshot shows the sensor settings page with the type dropdown list options.":::
114
127
115
128
### Active Directory
116
129
@@ -147,24 +160,22 @@ To configure an NTP server for your sensor from the Azure portal, define an IP/D
147
160
148
161
### Local subnets
149
162
150
-
To focus the Azure device inventory on devices that are in your OT scope, you need to manually edit the subnet list to include only the locally monitored subnets that are in your OT scope.
163
+
To focus the Azure device inventory on devices that are in your OT scope, you need to manually edit the subnet list to include only the locally monitored subnets that are in your OT scope.
151
164
152
165
Subnets in the subnet list are automatically configured as ICS subnets, which means that Defender for IoT recognizes these subnets as OT networks. You can edit this setting when you [configure the subnets](#configure-subnets-in-the-azure-portal).
153
166
154
167
Once the subnets are configured, the network location of the devices is shown in the *Network location* (Public preview) column in the Azure device inventory. All of the devices associated with the listed subnets are displayed as *local*, while devices associated with detected subnets not included in the list are displayed as *routed*.
155
168
156
169
#### Configure subnets in the Azure portal
157
170
158
-
1. In the Azure portal, go to **Sites and sensors** > **Sensor settings**.
159
-
160
171
1. Under **Local subnets**, review the configured subnets. To focus the device inventory and view local devices in the inventory, delete any subnets that are not in your IoT/OT scope by selecting the options menu (...) on any subnet you want to delete.
161
172
162
173
1. To modify additional settings, select any subnet and then select **Edit** for the following options:
163
174
164
175
- Select **Import subnets** to import a comma-separated list of subnet IP addresses and masks. Select **Export subnets** to export a list of currently configured data, or **Clear all** to start from scratch.
165
176
166
177
- Enter values in the **IP Address**, **Mask**, and **Name** fields to add subnet details manually. Select **Add subnet** to add additional subnets as needed.
167
-
178
+
168
179
-**ICS Subnet** is on by default, which means that Defender for IoT recognizes the subnet as an OT network. To mark a subnet as non-ICS, toggle off **ICS Subnet**.
169
180
170
181
### VLAN naming
@@ -173,6 +184,20 @@ To define a VLAN for your OT sensor, enter the VLAN ID and a meaningful name.
173
184
174
185
Select **Add VLAN** to add more VLANs as needed.
175
186
187
+
### Public addresses
188
+
189
+
Add public addresses that might have been used for internal use and shouldn't be included as suspicious IP addresses or tracking the data<!-- Theo is this correct? OR-->.
190
+
Excluded public IP addresses that might have been used for internal use and shouldn't be included as suspicious IP addresses or tracking the data.
191
+
192
+
1. In the **Settings** tab, type the **IP address** and **Mask** address.
193
+
194
+
:::image type="content" source="media/configure-sensor-settings-portal/sensor-settings-ip-addresses.png" alt-text="The screenshot shows the Settings tab for adding public addresses to the sensor settings.":::
195
+
196
+
1. Select **Next**.
197
+
1. In the **Apply** tab, select sites, and toggle the **Add selection by specific zone/sensor** to optionally apply the IP addresses to specific zones and sensors.
198
+
1. Select **Next**.
199
+
1. Review the details and select **Create** to add the address to the public addresses list.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Features released earlier than nine months ago are described in the [What's new
22
22
23
23
|Service area |Updates |
24
24
|---------|---------|
25
-
|**OT networks**| - [Add wildcards to allowlist domain names](#add-wildcards-allowlist-domain-names)<br> - [Added protocol](#added-protocol) <br> - [Improved OT sensor onboarding](#improved-ot-sensor-onboarding)|
25
+
|**OT networks**| - [Add wildcards to allowlist domain names](#add-wildcards-allowlist-domain-names)<br> - [Added protocol](#added-protocol) <br> - [New sensor setting type Public addresses](#new-sensor-setting-type-public-addresses) <br> - [Improved OT sensor onboarding](#improved-ot-sensor-onboarding)|
26
26
27
27
### Add wildcards allowlist domain names
28
28
@@ -32,6 +32,10 @@ When adding domain names to the FQDN allowlist use the `*` wildcard to include a
32
32
33
33
We now support the OCPI protocol. See [the updated protocol list](concept-supported-protocols.md#supported-protocols-for-ot-device-discovery).
34
34
35
+
### New sensor setting type Public addresses
36
+
37
+
We're adding the **Public addresses** type to the sensor settings, that allows you to exclude public IP addresses that might have been used for internal use and shouldn't be tracked. For more information, see [add sensor settings](configure-sensor-settings-portal.md#add-sensor-settings).
38
+
35
39
### Improved OT sensor onboarding
36
40
37
41
If there are connection problems, during sensor onboarding, between the OT sensor and the Azure portal at the configuration stage, the process can't be completed until the connection problem is solved.
@@ -480,7 +484,7 @@ For more information, see:
480
484
481
485
Now you can configure Active Directory and NTP settings for your OT sensors remotely from the **Sites and sensors** page in the Azure portal. These settings are available for OT sensor versions 22.3.x and higher.
482
486
483
-
For more information, see [Sensor setting reference](configure-sensor-settings-portal.md#sensor-setting-reference).
487
+
For more information, see [Sensor setting reference](configure-sensor-settings-portal.md#add-sensor-settings).
0 commit comments