Skip to content

Commit fc32c9c

Browse files
authored
Merge pull request #108344 from jameshkramer/1598649-meta-title-fixes
US 1698649 meta titles and misc cleanup
2 parents ebf2c0e + 9585b0c commit fc32c9c

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+717
-725
lines changed

articles/asc-for-iot/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@
6666
- name: Local configuration C
6767
href: azure-iot-security-local-configuration-c.md
6868
- name: Local configuration C#
69-
href: azure-iot-security-local-configuration-csharp.md
69+
href: azure-iot-security-local-configuration-csharp.md
7070
- name: Deploy Edge security module
7171
href: how-to-deploy-edge.md
7272
- name: Configure security agents

articles/asc-for-iot/architecture.md

Lines changed: 15 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Understanding Azure Security Center for IoT solution architecture| Microsoft Docs
2+
title: Solution architecture
33
description: Learn about the flow of information in the Azure Security Center for IoT service.
44
services: asc-for-iot
55
ms.service: asc-for-iot
@@ -16,41 +16,44 @@ ms.tgt_pltfrm: na
1616
ms.workload: na
1717
ms.date: 07/23/2019
1818
ms.author: mlottner
19-
2019
---
20+
2121
# Azure Security Center for IoT architecture
2222

23-
This article explains the functional system architecture of the Azure Security Center for IoT solution.
23+
This article explains the functional system architecture of the Azure Security Center for IoT solution.
2424

2525
## Azure Security Center for IoT components
2626

2727
Azure Security Center for IoT is composed of the following components:
28+
2829
- IoT Hub integration
2930
- Device agents (optional)
3031
- Send security message SDK
3132
- Analytics pipeline
32-
33+
3334
### Azure Security Center for IoT workflows
3435

35-
Azure Security Center for IoT works in one of two feature workflows: Built-in and Enhanced
36+
Azure Security Center for IoT works in one of two feature workflows: Built-in and Enhanced
3637

3738
### Built-in
38-
In **Built-in** mode, Azure Security Center for IoT is enabled when you elect to turn on the **Security** option in your IoT Hub. Offering real-time monitoring, recommendations and alerts, Built-in mode offers single-step device visibility and unmatched security. Build-in mode does not require agent installation on any devices and uses advanced analytics on logged activities to analyze and protect your field device.
3939

40-
### Enhanced
40+
In **Built-in** mode, Azure Security Center for IoT is enabled when you elect to turn on the **Security** option in your IoT Hub. Offering real-time monitoring, recommendations and alerts, Built-in mode offers single-step device visibility and unmatched security. Build-in mode does not require agent installation on any devices and uses advanced analytics on logged activities to analyze and protect your field device.
41+
42+
### Enhanced
43+
4144
In **Enhanced** mode, after turning on the **Security** option in your IoT Hub and installing Azure Security Center for IoT device agents on your devices, the agents collect, aggregate and analyze raw security events from your devices. Raw security events can include IP connections, process creation, user logins, and other security-relevant information. Azure Security Center for IoT device agents also handle event aggregation to help avoid high network throughput. The agents are highly customizable, allowing you to use them for specific tasks, such as sending only important information at the fastest SLA, or for aggregating extensive security information and context into larger segments, avoiding higher service costs.
4245

4346
![Azure Security Center for IoT architecture](./media/architecture/azure-iot-security-architecture.png)
44-
47+
4548
Device agents, and other applications use the **Azure send security message SDK** to send security information into Azure IoT Hub. IoT Hub picks up this information and forwards it to the Azure Security Center for IoT service.
4649

4750
Once the Azure Security Center for IoT service is enabled, in addition to the forwarded data, IoT Hub also sends out all of its internal data for analysis by Azure Security Center for IoT. This data includes device-cloud operation logs, device identities, and Hub configuration. All of this information helps to create the Azure Security Center for IoT analytics pipeline.
48-
51+
4952
Azure Security Center for IoT analytics pipeline also receives additional threat intelligence streams from various sources within Microsoft and Microsoft partners. The Azure Security Center for IoT entire analytics pipeline works with every customer configuration made on the service (such as custom alerts and use of the send security message SDK).
50-
53+
5154
Using the analytics pipeline, Azure Security Center for IoT combines all of the streams of information to generate actionable recommendations and alerts. The pipeline contains both custom rules created by security researchers and experts as well as machine learning models searching for deviation from standard device behavior and risk analysis.
52-
53-
Azure Security Center for IoT recommendations and alerts (analytics pipeline output) is written to the Log Analytics workspace of each customer. Including the raw events in the workspace as well as the alerts and recommendations enables deep dive investigations and queries using the exact details of the suspicious activities detected.
55+
56+
Azure Security Center for IoT recommendations and alerts (analytics pipeline output) is written to the Log Analytics workspace of each customer. Including the raw events in the workspace as well as the alerts and recommendations enables deep dive investigations and queries using the exact details of the suspicious activities detected.
5457

5558
## Next steps
5659

articles/asc-for-iot/azure-iot-security-local-configuration-c.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Understanding Azure Security Center for agent local configurations for C | Microsoft Docs
2+
title: Security agent local configuration (C)
33
description: Learn about Azure Security Center for agent local configurations for C.
44
services: asc-for-iot
55
ms.service: asc-for-iot
@@ -16,22 +16,22 @@ ms.tgt_pltfrm: na
1616
ms.workload: na
1717
ms.date: 07/26/2019
1818
ms.author: mlottner
19-
2019
---
2120

2221
# Understanding the LocalConfiguration.json file - C agent
2322

2423
The Azure Security Center for IoT security agent uses configurations from a local configuration file.
2524
The security agent reads the configuration once, at agent start-up.
2625
The configuration found in the local configuration file contains authentication configuration and other agent related configurations.
27-
The file contains configurations in "Key-Value" pairs in JSON notation and the configurations get populated when the agent is installed.
26+
The file contains configurations in "Key-Value" pairs in JSON notation and the configurations get populated when the agent is installed.
2827

2928
By default, the file is located at: /var/ASCIoTAgent/LocalConfiguration.json
3029

31-
Changes to the configuration file take place when the agent is restarted.
30+
Changes to the configuration file take place when the agent is restarted.
3231

3332
## Security agent configurations for C
34-
| Configuration Name | Possible values | Details |
33+
34+
| Configuration Name | Possible values | Details |
3535
|:-----------|:---------------|:--------|
3636
| AgentId | GUID | The agent Unique identifier |
3737
| TriggerdEventsInterval | ISO8601 string | Scheduler interval for triggered events collection |
@@ -50,6 +50,7 @@ Changes to the configuration file take place when the agent is restarted.
5050
| DiagnosticEventMinimumSeverity | 0 <= number <= 4 | log messages equal and above this severity will be sent as diagnostic events (0 is the lowest severity) |
5151

5252
## Security agent configurations code example
53+
5354
```JSON
5455
{
5556
"Configuration" : {
@@ -76,10 +77,11 @@ Changes to the configuration file take place when the agent is restarted.
7677
```
7778

7879
## Next steps
80+
7981
- Read the Azure Security Center for IoT service [Overview](overview.md)
8082
- Learn more about Azure Security Center for IoT [Architecture](architecture.md)
8183
- Enable the Azure Security Center for IoT [service](quickstart-onboard-iot-hub.md)
8284
- Read the Azure Security Center for IoT service [FAQ](resources-frequently-asked-questions.md)
8385
- Learn how to access [raw security data](how-to-security-data-access.md)
8486
- Understand [recommendations](concept-recommendations.md)
85-
- Understand security [alerts](concept-security-alerts.md)
87+
- Understand security [alerts](concept-security-alerts.md)

articles/asc-for-iot/azure-iot-security-local-configuration-csharp.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Understanding Azure Security Center for IoT security agent local configuration file for C# | Microsoft Docs
2+
title: Security agent local configuration (C#)
33
description: Learn more about the Azure Security Center for IoT security service, security agent local configuration file for C#.
44
services: asc-for-iot
55
ms.service: asc-for-iot
@@ -16,12 +16,10 @@ ms.tgt_pltfrm: na
1616
ms.workload: na
1717
ms.date: 07/26/2019
1818
ms.author: mlottner
19-
2019
---
2120

2221
# Understanding the local configuration file (C# agent)
2322

24-
2523
The Azure Security Center for IoT security agent uses configurations from a local configuration file.
2624

2725
The security agent reads the configuration file once when the agent starts up. Configurations found in the local configuration file contains both authentication configuration and other agent related configurations.
@@ -32,18 +30,21 @@ The C# security agent uses multiple configuration files:
3230
- **Authentication.config** - Authentication related configuration (including authentication details).
3331
- **SecurityIotInterface.config** - IoT related configurations.
3432

35-
The configuration files contain the default configuration. Authentication configuration is populated during agent installation and changes to the configuration file are made when the agent is restarted.
33+
The configuration files contain the default configuration. Authentication configuration is populated during agent installation and changes to the configuration file are made when the agent is restarted.
3634

3735
## Configuration file location
36+
3837
For Linux:
38+
3939
- Operating system configuration files are located in `/var/ASCIoTAgent`.
4040

4141
For Windows:
42-
- Operating system configuration files are located within the directory of the security agent.
42+
43+
- Operating system configuration files are located within the directory of the security agent.
4344

4445
### General.config configurations
4546

46-
| Configuration Name | Possible values | Details |
47+
| Configuration Name | Possible values | Details |
4748
|:-----------|:---------------|:--------|
4849
| agentId | GUID | Agent unique identifier |
4950
| readRemoteConfigurationTimeout | TimeSpan | Time period for fetching remote configuration from IoT Hub. If the agent can't fetch the configuration within the specified time, the operation will time out.|
@@ -58,6 +59,7 @@ For Windows:
5859
| defaultEventPriority | "High", "Low", "Off" | Default event priority. |
5960

6061
### General.config example
62+
6163
```XML
6264
<?xml version="1.0" encoding="utf-8"?>
6365
<General>
@@ -77,7 +79,7 @@ For Windows:
7779

7880
### Authentication.config
7981

80-
| Configuration name | Possible values | Details |
82+
| Configuration name | Possible values | Details |
8183
|:-----------|:---------------|:--------|
8284
| moduleName | string | Name of the security module identity. This name must correspond to the module identity name in the device. |
8385
| deviceId | string | ID of the device (as registered in Azure IoT Hub). || schedulerInterval | TimeSpan string | Internal scheduler interval. |
@@ -91,6 +93,7 @@ For Windows:
9193
|
9294

9395
### Authentication.config example
96+
9497
```XML
9598
<?xml version="1.0" encoding="utf-8"?>
9699
<Authentication>
@@ -105,14 +108,16 @@ For Windows:
105108
<add key="registrationId" value="d1"/>
106109
</Authentication>
107110
```
111+
108112
### SecurityIotInterface.config
109113

110-
| Configuration Name | Possible values | Details |
114+
| Configuration Name | Possible values | Details |
111115
|:-----------|:---------------|:--------|
112116
| transportType | "Ampq" "Mqtt" | IoT Hub transport type. |
113117
|
114118

115119
### SecurityIotInterface.config example
120+
116121
```XML
117122
<ExternalInterface>
118123
<add key="facadeType" value="Microsoft.Azure.Security.IoT.Agent.Common.SecurityIoTHubInterface, Security.Common" />
@@ -121,10 +126,11 @@ For Windows:
121126
```
122127

123128
## Next steps
129+
124130
- Read the Azure Security Center for IoT service [Overview](overview.md)
125131
- Learn more about Azure Security Center for IoT [Architecture](architecture.md)
126132
- Enable the Azure Security Center for IoT [service](quickstart-onboard-iot-hub.md)
127133
- Read the Azure Security Center for IoT service [FAQ](resources-frequently-asked-questions.md)
128134
- Learn how to access [raw security data](how-to-security-data-access.md)
129135
- Understand [recommendations](concept-recommendations.md)
130-
- Understand security [alerts](concept-security-alerts.md)
136+
- Understand security [alerts](concept-security-alerts.md)

articles/asc-for-iot/concept-baseline.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
2-
3-
title: Understand Azure Security Center for IoT baseline| Microsoft Docs
4-
description: Learn about the concept of Azure Security Center for IoT baseline.
2+
title: Baseline and custom checks
3+
description: Learn about the concept of Azure Security Center for IoT baseline.
54
services: asc-for-iot
65
ms.service: asc-for-iot
76
documentationcenter: na
@@ -17,19 +16,19 @@ ms.tgt_pltfrm: na
1716
ms.workload: na
1817
ms.date: 10/07/2019
1918
ms.author: mlottner
20-
2119
---
20+
2221
# Azure Security Center for IoT baseline and custom checks
2322

2423
This article explains Azure Security Center for IoT baseline, and summarizes all associated properties of baseline custom checks.
2524

2625
## Baseline
2726

28-
A baseline establishes standard behavior for each device and makes it easier to establish unusual behavior or deviation from expected norms.
27+
A baseline establishes standard behavior for each device and makes it easier to establish unusual behavior or deviation from expected norms.
2928

3029
## Baseline custom checks
3130

32-
Baseline custom checks establish a custom list of checks for each device baseline using the **Module identity twin** of the device.
31+
Baseline custom checks establish a custom list of checks for each device baseline using the **Module identity twin** of the device.
3332

3433
## Setting baseline properties
3534

articles/asc-for-iot/concept-customizable-security-alerts.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Customizable security alert guide for Azure Security Center for IoT| Microsoft Docs
2+
title: Customizable security alerts
33
description: Learn about customizable security alerts and recommended remediation using Azure Security Center for IoT features and service.
44
services: asc-for-iot
55
ms.service: asc-for-iot
@@ -15,19 +15,17 @@ ms.tgt_pltfrm: na
1515
ms.workload: na
1616
ms.date: 03/04/2020
1717
ms.author: mlottner
18-
1918
---
19+
2020
# Azure Security Center for IoT security alerts
2121

2222
Azure Security Center for IoT continuously analyzes your IoT solution using advanced analytics and threat intelligence to alert you to malicious activity.
2323

24-
We encourage you to create custom alerts based on your knowledge of expected device behavior to ensure alerts act as the most efficient indicators of potential compromise in your unique organizational deployment and landscape.
24+
We encourage you to create custom alerts based on your knowledge of expected device behavior to ensure alerts act as the most efficient indicators of potential compromise in your unique organizational deployment and landscape.
2525

2626
The following list of Azure Security Center for IoT alerts are definable by you based on your expected IoT Hub and/or device behavior. For more details about how to customize each alert, see [create custom alerts](quickstart-create-custom-alerts.md).
2727

28-
## IoT Hub alerts available for customization
29-
30-
28+
## IoT Hub alerts available for customization
3129

3230
| Severity | Alert name | Data source | Description | Suggested remediation|
3331
|---|---|---|---|---|
@@ -47,7 +45,7 @@ The following list of Azure Security Center for IoT alerts are definable by you
4745
| Low | Custom alert - number of unauthorized operations is outside the allowed range | IoT Hub | The amount of unauthorized operations within a specific time window is outside the currently configured and allowable range.|
4846
|
4947

50-
## Agent alerts available for customization
48+
## Agent alerts available for customization
5149

5250
| Severity | Alert name | Data source | Description | Suggested remediation|
5351
|---|---|---|---|---|
@@ -63,4 +61,4 @@ The following list of Azure Security Center for IoT alerts are definable by you
6361
- Learn how to [customize an alert](quickstart-create-custom-alerts.md)
6462
- Azure Security Center for IoT service [Overview](overview.md)
6563
- Learn how to [Access your security data](how-to-security-data-access.md)
66-
- Learn more about [Investigating a device](how-to-investigate-device.md)
64+
- Learn more about [Investigating a device](how-to-investigate-device.md)

articles/asc-for-iot/concept-pricing.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
2-
3-
title: Understand Azure Security Center for IoT costs| Microsoft Docs
4-
description: Learn about the costs associated with Azure Security Center for IoT, and how to control them.
2+
title: Pricing and associated costs
3+
description: Learn about the costs associated with Azure Security Center for IoT, and how to control them.
54
services: asc-for-iot
65
ms.service: asc-for-iot
76
documentationcenter: na
@@ -17,8 +16,8 @@ ms.tgt_pltfrm: na
1716
ms.workload: na
1817
ms.date: 09/27/2019
1918
ms.author: mlottner
20-
2119
---
20+
2221
# Pricing and associated costs
2322

2423
This article explains Azure Security Center for IoT pricing model, summarizes all associated costs and explains how to manage them.
@@ -31,14 +30,12 @@ The Azure Security Center for IoT pricing model is comprised of two parts, and i
3130

3231
- Cost by message - enhanced security capabilities based on security messages from IoT Edge or leaf devices.
3332

34-
3533
For more information, see [Security Center pricing](https://azure.microsoft.com/pricing/details/security-center/).
3634

3735
## Associated costs
3836

3937
Azure Security Center for IoT has associated costs, which are not part of the direct pricing:
4038

41-
4239
- Log Analytics storage costs
4340

4441
You can reduce associated costs by opting out of certain solution features. Opt out by changing your settings.
@@ -47,9 +44,9 @@ To change your settings:
4744

4845
1. Open IoT Hub.
4946

50-
2. Under **Security**, click **Overview**.
47+
1. Under **Security**, click **Overview**.
5148

52-
3. Click **Settings**.
49+
1. Click **Settings**.
5350

5451
The following table provides a summary of associated costs and implications of each option.
5552

@@ -61,8 +58,8 @@ The following table provides a summary of associated costs and implications of e
6158
|
6259

6360
>[!Important]
64-
> Opting out has severe implications to Azure Security Center for IoT security feature availability.
65-
61+
> Opting out has severe implications to Azure Security Center for IoT security feature availability.
62+
6663
| Opt out | Implications |
6764
| --- | --- |
6865
| _Twin metadata collection_ | Disable [custom alerts](quickstart-create-custom-alerts.md) |
@@ -72,7 +69,6 @@ The following table provides a summary of associated costs and implications of e
7269
| | Details on [alert](concept-security-alerts.md) and [recommendation](concept-recommendations.md) investigations are not available |
7370
|
7471

75-
7672
## See also
7773

7874
- Access your [raw security data](how-to-security-data-access.md)

0 commit comments

Comments
 (0)