Skip to content

Commit f2c0317

Browse files
Merge pull request #233126 from yoninalmsft/define-subnets
Define subnets and network location
2 parents f3a5c50 + dee934b commit f2c0317

File tree

6 files changed

+41
-19
lines changed

6 files changed

+41
-19
lines changed

articles/defender-for-iot/organizations/configure-sensor-settings-portal.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,11 +122,19 @@ For a bandwidth cap, define the maximum bandwidth you want the sensor to use for
122122

123123
### Subnet
124124

125-
To define your sensor's subnets, do any of the following:
125+
To focus the Azure device inventory on devices that are in your IoT/OT scope, you will need to manually edit the subnet list to include only the locally monitored subnets that are in your IoT/OT scope. Once the subnets have been configured, the network location of the devices is shown in the *Network location* (Public preview) column in the Azure device inventory. All of the devices associated with the listed subnets will be displayed as *local*, while devices associated with detected subnets not included in the list will be displayed as *routed*.
126126

127-
- Select **Import subnets** to import a comma-separated list of subnet IP addresses and masks. Select **Export subnets** to export a list of currently configured data, or **Clear all** to start from scratch.
127+
**To configure your subnets in the Azure portal**:
128128

129-
- Enter values in the **IP Address**, **Mask**, and **Name** fields to add subnet details manually. Select **Add subnet** to add more subnets as needed.
129+
1. In the Azure portal, go to **Sites and sensors** > **Sensor settings**.
130+
131+
1. Under **Subnets**, review the detected subnets. To focus the device inventory and view local devices in the inventory, delete any subnets that are not in your IoT/OT scope by selecting the options menu (...) on any subnet you want to delete.
132+
133+
1. To modify additional settings, select any subnet and then select **Edit** for the following options:
134+
135+
- Select **Import subnets** to import a comma-separated list of subnet IP addresses and masks. Select **Export subnets** to export a list of currently configured data, or **Clear all** to start from scratch.
136+
137+
- Enter values in the **IP Address**, **Mask**, and **Name** fields to add subnet details manually. Select **Add subnet** to add additional subnets as needed.
130138

131139
### VLAN naming
132140

articles/defender-for-iot/organizations/device-inventory.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,9 @@ Mark OT devices as *important* to highlight them for extra tracking. On an OT se
104104

105105
The following table lists the columns available in the Defender for IoT device inventory on the Azure portal. Starred items **(*)** are also available from the OT sensor.
106106

107+
> [!NOTE]
108+
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
109+
107110
|Name |Description
108111
|---------|---------|
109112
|**Authorization** * |Editable. Determines whether or not the device is marked as *authorized*. This value may need to change as the device security changes. |
@@ -124,6 +127,7 @@ The following table lists the columns available in the Defender for IoT device i
124127
| **MAC Address** * | The device's MAC address. |
125128
|**Model** *| Editable The device's hardware model. |
126129
|**Name** * | Mandatory, and editable. The device's name as the sensor discovered it, or as entered by the user. |
130+
|**Network location** (Public preview) | The device's network location. Displays whether the device is defined as *local* or *routed*, according to the configured subnets. |
127131
|**OS architecture** | Editable. The device's operating system architecture. |
128132
|**OS distribution** | Editable. The device's operating system distribution, such as Android, Linux, and Haiku. |
129133
|**OS platform** * | Editable. The device's operating system, if detected. On the OT sensor, shown as **Operating System**. |

articles/defender-for-iot/organizations/how-to-control-what-traffic-is-monitored.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -27,33 +27,39 @@ This step is performed by your deployment teams.
2727

2828
## Define OT and IoT subnets
2929

30-
Subnet configurations affect how devices are displayed in the sensor's [device maps](how-to-work-with-the-sensor-device-map.md). In the device maps, IT devices are automatically aggregated by subnet, where you can expand and collapse each subnet view to drill down as needed.
30+
After [onboarding](onboard-sensors.md) a new OT network sensor to Microsoft Defender for IoT, define the sensor's subnet settings directly on the OT sensor console to determine how devices are displayed in the sensor's [device map](how-to-work-with-the-sensor-device-map.md) and the [Azure device inventory](device-inventory.md).
3131

32-
While the OT network sensor automatically learns the subnets in your network, we recommend confirming the learned settings and updating them as needed to optimize your map views.
32+
- **In the device map**, IT devices are automatically aggregated by subnet, where you can expand and collapse each subnet view to drill down as needed.
33+
- **In the Azure device inventory**, once the subnets have been configured, use the *Network location* (Public preview) filter to view *local* or *routed* devices as defined in your subnets list. All of the devices associated with the listed subnets will be displayed as *local*, while devices associated with detected subnets not included in the list will be displayed as *routed*.
3334

34-
Any subnets not listed as subnets are treated as external networks.
35+
> [!TIP]
36+
> When you're ready to start managing your OT sensor settings at scale, define subnets from the Azure portal. Once you apply settings from the Azure portal, settings on the sensor console are read-only. For more information, see [Configure OT sensor settings from the Azure portal (Public preview)](configure-sensor-settings-portal.md).
37+
38+
While the OT network sensor automatically learns the subnets in your network, we recommend confirming the learned settings and updating them as needed to optimize your map views and device inventory. Any subnets not listed as subnets are treated as external networks.
3539

3640
> [!NOTE]
37-
> For cloud-connected sensors, you may eventually start configuring OT sensor settings from the Azure portal. Once you start configuring settings from the Azure portal, the **Subnets** pane on the OT sensor is read-only. For more information, see [Configure OT sensor settings from the Azure portal](configure-sensor-settings-portal.md).
41+
> If sensor settings have already been applied from the Azure portal, the subnet settings on the individual sensor will be read-only and are managed from the Azure portal.
42+
43+
**To configure your subnets on a locally managed sensor**:
3844

39-
**To define subnets**:
45+
1. Sign into your OT sensor as an Admin user and select **System settings** > **Basic** > **Subnets**.
4046

41-
1. Sign into your OT sensor as an **Admin** user and select **System settings > Basic > Subnets**.
47+
1. Disable the **Auto subnet learning** setting to manually edit the subnets.
4248

43-
1. Confirm the current subnets listed and modify settings as needed.
49+
1. Review the discovered subnets list and delete any subnets unrelated to your IoT/OT network scope. We recommend giving each subnet a meaningful name to specify the network role. Subnet names can have up to 60 characters.
4450

45-
We recommend giving each subnet a meaningful name to differentiate between IT and OT networks. Subnet names can have up to 60 characters.
51+
Once the **Auto subnet learning** setting is disabled and the subnet list has been edited to include only the locally monitored subnets that are in your IoT/OT scope, you can filter the Azure device inventory by *Network location* to view only the devices defined as *local*.
4652

4753
1. Use any of the following options to help you optimize your subnet settings:
4854

4955
|Name |Description |
5056
|---------|---------|
51-
|**Import subnets** | Import a .CSV file of subnet definitions |
57+
|**Import subnets** | Import a .CSV file of subnet definitions. The subnet information is updated with the information that you imported. If you import an empty field, you'll lose the data in that field. |
5258
|**Export subnets** | Export the currently listed subnets to a .CSV file. |
53-
|**Clear all** | Clear all currently defined subnets |
54-
|**Auto subnet learning** | Selected by default. Clear this option to define your subnets manually instead of having them be automatically detected by your OT sensor as new devices are detected. |
59+
|**Clear all** | Clear all currently defined subnets. |
60+
|**Auto subnet learning** | Selected by default. Clear this option to define your subnets manually instead of having them automatically detected by your OT sensor as new devices are detected. |
5561
|**Resolve all Internet traffic as internal/private** | Select to consider all public IP addresses as private, local addresses. If selected, public IP addresses are treated as local addresses, and alerts aren't sent about unauthorized internet activity. <br><br>This option reduces notifications and alerts received about external addresses. |
56-
|**ICS Subnet** | Select to define a specific subnet as a separate OT subnet. Selecting this option helps you collapse device maps to a minimum of IT network elements. |
62+
|**ICS subnet** | Read-only. ICS/OT subnets are marked automatically when the system recognizes OT activity or protocols. |
5763
|**Segregated** | Select to show this subnet separately when displaying the device map according to Purdue level. |
5864

5965
1. When you're done, select **Save** to save your updates.

articles/defender-for-iot/organizations/how-to-troubleshoot-sensor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -276,7 +276,7 @@ To connect a sensor controlled by the management console to NTP:
276276
Sometimes ICS devices are configured with external IP addresses. These ICS devices aren't shown on the map. Instead of the devices, an internet cloud appears on the map. The IP addresses of these devices are included in the cloud image. Another indication of the same problem is when multiple internet-related alerts appear. Fix the issue as follows:
277277

278278
1. Right-click the cloud icon on the device map and select **Export IP Addresses**.
279-
1. Copy the public ranges that are private, and add them to the subnet list. For more information, see [Define ICS or IoT and segregated subnets](how-to-control-what-traffic-is-monitored.md#define-ot-and-iot-subnets).
279+
1. Copy the public ranges that are private, and add them to the subnet list. For more information, see [Define OT and IoT subnets](how-to-control-what-traffic-is-monitored.md#define-ot-and-iot-subnets).
280280
1. Generate a new data-mining report for internet connections.
281281
1. In the data-mining report, enter the administrator mode and delete the IP addresses of your ICS devices.
282282

articles/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -195,9 +195,9 @@ The following table lists available responses for each notification, and when we
195195
| Type | Description | Available responses | Auto-resolve|
196196
|--|--|--|--|
197197
| **New IP detected** | A new IP address is associated with the device. This may occur in the following scenarios: <br><br>- A new or additional IP address was associated with a device already detected, with an existing MAC address.<br><br> - A new IP address was detected for a device that's using a NetBIOS name. <br /><br /> - An IP address was detected as the management interface for a device associated with a MAC address. <br /><br /> - A new IP address was detected for a device that's using a virtual IP address. | - **Set Additional IP to Device**: Merge the devices <br />- **Replace Existing IP**: Replaces any existing IP address with the new address <br /> - **Dismiss**: Remove the notification. |**Dismiss** |
198-
| **No subnets configured** | No subnets are currently configured in your network. <br /><br /> We recommend configuring subnets for the ability to differentiate between OT and IT devices on the map. | - **Open Subnets Configuration** and [configure subnets](how-to-control-what-traffic-is-monitored.md#define-ot-and-iot-subnets). <br />- **Dismiss**: Remove the notification. |**Dismiss** |
198+
| **No subnets configured** | No subnets are currently configured in your network. <br /><br /> We recommend configuring subnets for the ability to differentiate between OT and IT devices on the map. | - **Open Subnet Configuration** and [configure subnets](how-to-control-what-traffic-is-monitored.md#define-ot-and-iot-subnets). <br />- **Dismiss**: Remove the notification. |**Dismiss** |
199199
| **Operating system changes** | One or more new operating systems have been associated with the device. | - Select the name of the new OS that you want to associate with the device.<br /> - **Dismiss**: Remove the notification. |No automatic handling|
200-
| **New subnets** | New subnets were discovered. |- **Learn**: Automatically add the subnet.<br />- **Open Subnet Configuration**: Add all missing subnet information.<br />- **Dismiss**<br />Remove the notification. |**Dismiss** |
200+
| **New subnets** | New subnets were discovered. |- **Learn**: Automatically add the subnet.<br />- **Open Subnet Configuration**: Add all missing subnet information.<br />- **Dismiss**: <br />Remove the notification. |**Dismiss** |
201201
| **Device type changes** | A new device type has been associated with the device. | - **Set as {…}**: Associate the new type with the device.<br />- **Dismiss**: Remove the notification. |No automatic handling|
202202

203203
## View a device map for a specific zone

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ For more information, see [Tutorial: Investigate and detect threats for IoT devi
102102

103103
|Service area |Updates |
104104
|---------|---------|
105-
| **OT networks** | **Cloud features**: <br>- [Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2](#microsoft-sentinel-microsoft-defender-for-iot-solution-version-202) <br>- [Download updates from the Sites and sensors page (Public preview)](#download-updates-from-the-sites-and-sensors-page-public-preview) <br>- [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) <br>- [Device inventory GA in the Azure portal](#device-inventory-ga-in-the-azure-portal) <br>- [Device inventory grouping enhancements (Public preview)](#device-inventory-grouping-enhancements-public-preview) <br><br> **Sensor version 22.2.3**: [Configure OT sensor settings from the Azure portal (Public preview)](#configure-ot-sensor-settings-from-the-azure-portal-public-preview) |
105+
| **OT networks** | **Cloud features**: <br>- [Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2](#microsoft-sentinel-microsoft-defender-for-iot-solution-version-202) <br>- [Download updates from the Sites and sensors page (Public preview)](#download-updates-from-the-sites-and-sensors-page-public-preview) <br>- [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) <br>- [Device inventory GA in the Azure portal](#device-inventory-ga-in-the-azure-portal) <br>- [Device inventory grouping enhancements (Public preview)](#device-inventory-grouping-enhancements-public-preview) <br>- [Focused inventory in the Azure device inventory (Public preview)](#focused-inventory-in-the-azure-device-inventory-public-preview) <br><br> **Sensor version 22.2.3**: [Configure OT sensor settings from the Azure portal (Public preview)](#configure-ot-sensor-settings-from-the-azure-portal-public-preview) |
106106
| **Enterprise IoT networks** | **Cloud features**: [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) |
107107

108108
### Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2
@@ -158,6 +158,10 @@ Rich security, governance and admin controls also provide the ability to assign
158158

159159
The **Device inventory** page on the Azure portal supports new grouping categories. Now you can group your device inventory by *class*, *data source*, *location*, *Purdue level*, *site*, *type*, *vendor*, and *zone*. For more information, see [View full device details](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory).
160160

161+
### Focused inventory in the Azure device inventory (Public preview)
162+
163+
The **Device inventory** page on the Azure portal now includes a network location indication for your devices, to help focus your device inventory on the devices within your IoT/OT scope. See and filter which devices are defined as *local* or *routed*, according to your configured subnets. The *Network location* filter is on by default, and the *Network location* column can be added by editing the columns in the device inventory. For more information, see [Subnet](configure-sensor-settings-portal.md#subnet).
164+
161165
### Configure OT sensor settings from the Azure portal (Public preview)
162166

163167
For sensor versions 22.2.3 and higher, you can now configure selected settings for cloud-connected sensors using the new **Sensor settings (Preview)** page, accessed via the Azure portal's **Sites and sensors** page. For example:

0 commit comments

Comments
 (0)