You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/alert-engine-messages.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ title: Microsoft Defender for IoT alert reference
3
3
description: This article provides a reference of all alerts that are generated by Microsoft Defender for IoT network sensors, including a list of all alert types and descriptions.
4
4
ms.date: 11/23/2022
5
5
ms.topic: reference
6
+
ms.custom: enterprise-iot
6
7
---
7
8
8
9
# Microsoft Defender for IoT alert reference
@@ -12,7 +13,6 @@ This article provides a reference of the [alerts](how-to-manage-cloud-alerts.md)
12
13
> [!IMPORTANT]
13
14
> The **Alerts** page in the Azure portal is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
14
15
15
-
16
16
## OT alerts turned off by default
17
17
18
18
Several alerts are turned off by default, as indicated by asterisks (*) in the tables below. OT sensor **Admin** users can enable or disable alerts from the **Support** page on a specific OT network sensor.
| Title | Description| Severity | Category | MITRE ATT&CK <br> tactics and techniques |
247
247
|--|--|--|--|--|
248
-
|**Connection Attempt to Known Malicious IP**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br>Triggered by both OT and Enterprise IoT network sensors. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br> - Command And Control <br><br> **Techniques:** <br> - T0883: Internet Accessible Device <br> - T0884: Connection Proxy |
248
+
|**Connection Attempt to Known Malicious IP**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br>Triggered by both OT and Enterprise IoT network sensors. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br> - Command And Control <br><br> **Techniques:** <br> - T0883: Internet Accessible Device <br> - T0884: Connection Proxy |
249
249
|**Invalid SMB Message (DoublePulsar Backdoor Implant)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - LateralMovement <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
250
-
|**Malicious Domain Name Request**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br>Triggered by both OT and Enterprise IoT network sensors. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br> - Command And Control <br><br> **Techniques:** <br> - T0883: Internet Accessible Device <br> - T0884: Connection Proxy |
250
+
|**Malicious Domain Name Request**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br>Triggered by both OT and Enterprise IoT network sensors. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br> - Command And Control <br><br> **Techniques:** <br> - T0883: Internet Accessible Device <br> - T0884: Connection Proxy |
251
251
|**Malware Test File Detected - EICAR AV Success**| An EICAR AV test file was detected in traffic between two devices (over any transport - TCP or UDP). The file isn't malware. It's used to confirm that the antivirus software is installed correctly. Demonstrate what happens when a virus is found, and check internal procedures and reactions when a virus is found. Antivirus software should detect EICAR as if it were a real virus. | Critical | Suspicion of Malicious Activity |**Tactics:** <br> - Discovery <br><br> **Techniques:** <br> - T0842: Network Sniffing |
252
252
|**Suspicion of Conficker Malware**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Major | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Impact <br><br> **Techniques:** <br> - T0826: Loss of Availability <br> - T0828: Loss of Productivity and Revenue <br> - T0847: Replication Through Removable Media |
253
253
|**Suspicion of Denial Of Service Attack**| A source device attempted to initiate an excessive number of new connections to a destination device. This may indicate a Denial Of Service (DOS) attack against the destination device, and might interrupt device functionality, affect performance and service availability, or cause unrecoverable errors. <br><br> Threshold: 3000 attempts in 1 minute | Critical | Suspicion of Malicious Activity |**Tactics:** <br> - Inhibit Response Function <br><br> **Techniques:** <br> - T0814: Denial of Service |
254
-
|**Suspicion of Malicious Activity**| Suspicious network activity was detected. This activity may be associated with an attack that triggered known 'Indicators of Compromise' (IOCs). Alert metadata should be reviewed by the security team. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Lateral Movement <br><br> **Techniques:** <br> - T0867: Lateral Tool Transfer |
254
+
|**Suspicion of Malicious Activity**| Suspicious network activity was detected. This activity may be associated with an attack that triggered known 'Indicators of Compromise' (IOCs). Alert metadata should be reviewed by the security team. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Lateral Movement <br><br> **Techniques:** <br> - T0867: Lateral Tool Transfer |
255
255
|**Suspicion of Malicious Activity (BlackEnergy)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Command And Control <br><br> **Techniques:** <br> - T0869: Standard Application Layer Protocol |
256
256
|**Suspicion of Malicious Activity (DarkComet)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information |
257
257
|**Suspicion of Malicious Activity (Duqu)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information |
258
258
|**Suspicion of Malicious Activity (Flame)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Collection <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information <br> - T0811: Data from Information Repositories |
259
259
|**Suspicion of Malicious Activity (Havex)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Collection <br> - Discovery <br> - Inhibit Response Function <br><br> **Techniques:** <br> - T0861: Point & Tag Identification <br> - T0846: Remote System Discovery <br> - T0814: Denial of Service |
260
260
|**Suspicion of Malicious Activity (Karagany)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information |
261
261
|**Suspicion of Malicious Activity (LightsOut)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Evasion <br><br> **Techniques:** <br> - T0849: Masquerading |
262
-
|**Suspicion of Malicious Activity (Name Queries)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br> Threshold: 25 name queries in 1 minute |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Command And Control <br><br> **Techniques:** <br> - T0884: Connection Proxy |
262
+
|**Suspicion of Malicious Activity (Name Queries)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br> Threshold: 25 name queries in 1 minute |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Command And Control <br><br> **Techniques:** <br> - T0884: Connection Proxy |
263
263
|**Suspicion of Malicious Activity (Poison Ivy)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
264
264
|**Suspicion of Malicious Activity (Regin)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br> - Impact <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services <br> - T0882: Theft of Operational Information |
265
265
|**Suspicion of Malicious Activity (Stuxnet)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br> - Impact <br><br> **Techniques:** <br> - T0818: Engineering Workstation Compromise <br> - T0866: Exploitation of Remote Services <br> - T0831: Manipulation of Control |
266
266
|**Suspicion of Malicious Activity (WannaCry) [*](#ot-alerts-turned-off-by-default)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Major | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services <br> - T0867: Lateral Tool Transfer |
267
267
|**Suspicion of NotPetya Malware - Illegal SMB Parameters Detected**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
268
268
|**Suspicion of NotPetya Malware - Illegal SMB Transaction Detected**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Lateral Movement <br><br> **Techniques:** <br> - T0867: Lateral Tool Transfer |
269
-
|**Suspicion of Remote Code Execution with PsExec**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Lateral Movement <br> - Initial Access <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
270
-
|**Suspicion of Remote Windows Service Management [*](#ot-alerts-turned-off-by-default)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br><br> **Techniques:** <br> - T0822: NetworkExternal Remote Services |
271
-
|**Suspicious Executable File Detected on Endpoint**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Evasion <br> - Inhibit Response Function <br><br> **Techniques:** <br> - T0851: Rootkit |
269
+
|**Suspicion of Remote Code Execution with PsExec**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Lateral Movement <br> - Initial Access <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
270
+
|**Suspicion of Remote Windows Service Management [*](#ot-alerts-turned-off-by-default)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br><br> **Techniques:** <br> - T0822: NetworkExternal Remote Services |
271
+
|**Suspicious Executable File Detected on Endpoint**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Evasion <br> - Inhibit Response Function <br><br> **Techniques:** <br> - T0851: Rootkit |
272
272
|**Suspicious Traffic Detected [*](#ot-alerts-turned-off-by-default)**| Suspicious network activity was detected. This activity may be associated with an attack that triggered known 'Indicators of Compromise' (IOCs). Alert metadata should be reviewed by the security team | Critical | Suspicion of Malicious Activity |**Tactics:** <br> - Discovery <br><br> **Techniques:** <br> - T0842: Network Sniffing |
273
273
|**Backup Activity with Antivirus Signatures**| Traffic detected between the source device and the destination backup server triggered this alert. The traffic includes backup of antivirus software that might contain malware signatures. This is most likely legitimate backup activity. | Warning | Backup |**Tactics:** <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information |
A *transient* device type indicates a device that was detected for only a short time. We recommend investigating these devices carefully to understand their impact on your network.
63
+
62
64
*Unclassified* devices are devices that don't otherwise have an out-of-the-box category defined.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md
+35Lines changed: 35 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,7 @@ This article describes the following methods for reducing OT network alert fatig
22
22
23
23
- To create alert comments or custom alert rules on an OT network sensor, you must have an OT network sensor installed and access to the sensor as an **Admin** user.
24
24
25
+
- To create a DNS allowlist on an OT sensor, you must have an OT network sensor installed and access to the sensor as a **Support** user.
25
26
- To create alert exclusion rules on an on-premises management console, you must have an on-premises management console installed and access to the on-premises management console as an **Admin** user.
26
27
27
28
For more information, see [Install OT agentless monitoring software](how-to-install-software.md) and [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
@@ -83,6 +84,40 @@ Disable custom alert rules to prevent them from running without deleting them al
83
84
84
85
In the **Custom alert rules** page, select one or more rules, and then select **Disable**, **Enable**, or **Delete** in the toolbar as needed.
85
86
87
+
## Allow internet connections on an OT network
88
+
89
+
Decrease the number of unauthorized internet alerts by creating an allowlist of domain names on your OT sensor. When a DNS allowlist is configured, the sensor checks each unauthorized internet connectivity attempt against the list before triggering an alert. If the domain's FQDN is included in the allowlist, the sensor doesn’t trigger the alert and allows the traffic automatically.
90
+
91
+
All OT sensor users can view a currently configured list of domains in a [data mining report](how-to-create-data-mining-queries.md), including the FQDNs, resolved IP addresses, and the last resolution time.
92
+
93
+
94
+
**To define a DNS allowlist:**
95
+
96
+
1. Sign into your OT sensor as the *support* user and select the **Support** page.
97
+
98
+
1. In the search box, search for **DNS** and then locate the engine with the **Internet Domain Allowlist** description.
99
+
100
+
1. Select **Edit** :::image type="icon" source="media/how-to-generate-reports/manage-icon.png" border="false"::: for the **Internet Domain Allowlist** row. For example:
101
+
102
+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/dns-edit-configuration.png" alt-text="Screenshot of how to edit configurations for DNS in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/dns-edit-configuration.png":::
103
+
104
+
1. In the **Edit configuration** pane > **Fqdn allowlist** field, enter one or more domain names. Separate multiple domain names with commas. Your sensor won't generate alerts for unauthorized internet connectivity attempts on the configured domains.
105
+
106
+
1. Select **Submit** to save your changes.
107
+
108
+
109
+
**To view the current allowlist in a data mining report:**
110
+
111
+
When selecting a category in your [custom data mining report](how-to-create-data-mining-queries.md#create-an-ot-sensor-custom-data-mining-report), make sure to select **Internet Domain Allowlist** under the **DNS** category.
112
+
113
+
For example:
114
+
115
+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/data-mining-allowlist.png" alt-text="Screenshot of how to generate a custom data mining report for the allowlist in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/data-mining-allowlist.png":::
116
+
117
+
The generated data mining report shows a list of the allowed domains and each IP address that’s being resolved for those domains. The report also includes the TTL, in seconds, during which those IP addresses won't trigger an internet connectivity alert. For example:
118
+
119
+
:::image type="content" source="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png" alt-text="Screenshot of data mining report of allowlist in the sensor console." lightbox="media/how-to-accelerate-alert-incident-response/data-mining-report-allowlist.png":::
120
+
86
121
## Create alert exclusion rules on an on-premises management console
87
122
88
123
Create alert exclusion rules to instruct your sensors to ignore specific traffic on your network that would otherwise trigger an alert.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-on-premises-management-console.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,8 +70,7 @@ After activating an on-premises management console, you'll need to apply new act
70
70
|Location |Activation process |
71
71
|---------|---------|
72
72
|**On-premises management console**| Apply a new activation file on your on-premises management console if you've [modified the number of committed devices](how-to-manage-subscriptions.md#edit-a-plan-for-ot-networks) in your subscription. |
73
-
|**Cloud-connected sensors**| Cloud-connected sensors remain activated for as long as your Azure subscription with your Defender for IoT plan is active. <br><br>If you're [updating an OT sensor from a legacy version](update-ot-software.md#update-legacy-ot-sensor-software), you'll need to re-activate your updated sensor. |
74
-
|**Locally-managed**| Apply a new activation file to locally managed sensors every year. After a sensor's activation file has expired, the sensor will continue to monitor your network, but you'll see a warning message when signing in to the sensor. |
73
+
|**Cloud-connected and locally-managed sensors**| Cloud-connected and locally-managed sensors remain activated for as long as your Azure subscription with your Defender for IoT plan is active. <br><br>If you're [updating an OT sensor from a legacy version](update-ot-software.md#update-legacy-ot-sensor-software), you'll need to re-activate your updated sensor. |
75
74
76
75
For more information, see [Manage Defender for IoT subscriptions](how-to-manage-subscriptions.md).
0 commit comments