You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/other-threat-protections.md
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Additional threat protections from Microsoft Defender for Cloud
3
3
description: Learn about the threat protections available from Microsoft Defender for Cloud
4
4
ms.topic: overview
5
-
ms.date: 11/09/2021
5
+
ms.date: 07/24/2022
6
6
---
7
7
# Additional threat protections in Microsoft Defender for Cloud
8
8
@@ -71,6 +71,13 @@ To defend against DDoS attacks, purchase a license for Azure DDoS Protection and
71
71
72
72
If you have Azure DDoS Protection enabled, your DDoS alerts are streamed to Defender for Cloud with no additional configuration needed. For more information on the alerts generated by DDoS Protection, see [Reference table of alerts](alerts-reference.md#alerts-azureddos).
[Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP.
77
+
78
+
As part of the integration, each onboarded Azure subscription, AWS account, and GCP project give you a view of your [Permission Creep Index (PCI)](../active-directory/cloud-infrastructure-entitlement-management/ui-dashboard.md). The PCI is an aggregated metric that periodically evaluates the level of risk associated with the number of unused or excessive permissions across identities and resources. PCI measures how risky identities can potentially be, based on the permissions available to them.
79
+
80
+
:::image type="content" source="media/other-threat-protections/permission-creep-index.png" alt-text="Screenshot of the three associated permission creed index recommendations for Azure, AWS and GCP." lightbox="media/other-threat-protections/permission-creep-index.png":::
74
81
75
82
## Next steps
76
83
To learn more about the security alerts from these threat protection features, see the following articles:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/troubleshooting-guide.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,7 +141,7 @@ If you experience issues loading the workload protection dashboard, make sure th
141
141
142
142
You can also find troubleshooting information for Defender for Cloud at the [Defender for Cloud Q&A page](/answers/topics/azure-security-center.html). If you need further troubleshooting, you can open a new support request using **Azure portal** as shown below:
:::image type="content" source="media/troubleshooting-guide/troubleshooting-guide-fig2.png" alt-text="Screenshot of creating a support request in the Help + support area.":::
title: Microsoft Defender for IoT - OT monitoring appliance catalog
4
+
summary: Learn about the OT monitoring appliances supported for Microsoft Defender for IoT OT sensors and on-premises management consoles, including any extra procedures required for each appliance type.
5
+
6
+
metadata:
7
+
title: Microsoft Defender for IoT - OT monitoring appliance reference
8
+
description: Learn about the appliances available for use with Microsoft Defender for IoT OT sensors and on-premises management consoles.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-install-software.md
+79-32Lines changed: 79 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,14 @@
1
1
---
2
2
title: Install OT network monitoring software - Microsoft Defender for IoT
3
3
description: Learn how to install agentless monitoring software for an OT sensor and an on-premises management console for Microsoft Defender for IoT. Use this article if you're reinstalling software on a preconfigured appliance, or if you've chosen to install software on your own appliances.
4
-
ms.date: 07/11/2022
4
+
ms.date: 07/13/2022
5
5
ms.topic: how-to
6
6
---
7
7
8
8
# Install OT agentless monitoring software
9
9
10
10
This article describes how to install agentless monitoring software for OT sensors and on-premises management consoles. You might need the procedures in this article if you're reinstalling software on a preconfigured appliance, or if you've chosen to install software on your own appliances.
11
11
12
-
## Pre-installation configuration
13
-
14
-
Each appliance type comes with its own set of instructions that are required before installing Defender for IoT software.
15
-
16
-
Make sure that you've completed the procedures as instructed in the **Reference > OT monitoring appliance** section of our documentation before installing Defender for IoT software.
17
-
18
-
For more information, see:
19
-
20
-
-[Which appliances do I need?](ot-appliance-sizing.md)
21
-
-[Pre-configured physical appliances for OT monitoring](ot-pre-configured-appliances.md), including the catalog of available appliances
22
-
-[OT monitoring with virtual appliances](ot-virtual-appliances.md)
23
-
24
12
## Download software files from the Azure portal
25
13
26
14
Make sure that you've downloaded the relevant software file for the sensor or on-premises management console.
@@ -33,6 +21,19 @@ Mount the ISO file using one of the following options:
33
21
34
22
-**Virtual mount** – use iLO for HPE appliances, or iDRAC for Dell appliances to boot the ISO file.
35
23
24
+
## Pre-installation configuration
25
+
26
+
Each appliance type comes with its own set of instructions that are required before installing Defender for IoT software.
27
+
28
+
Make sure that you've completed any specific procedures required for your appliance before installing Defender for IoT software. For more information, see the [OT monitoring appliance catalog](appliance-catalog/appliance-catalog-overview.md).
29
+
30
+
For more information, see:
31
+
32
+
-[Which appliances do I need?](ot-appliance-sizing.md)
33
+
-[Pre-configured physical appliances for OT monitoring](ot-pre-configured-appliances.md), including the catalog of available appliances
34
+
-[OT monitoring with virtual appliances](ot-virtual-appliances.md)
35
+
36
+
36
37
## Install OT monitoring software
37
38
38
39
This section provides generic procedures for installing OT monitoring software on sensors or an on-premises management console.
@@ -41,59 +42,99 @@ Select one of the following tabs, depending on which type of software you're ins
41
42
42
43
# [OT sensor](#tab/sensor)
43
44
44
-
This procedure describes how to install OT sensor software on a physical or virtual appliance.
45
+
This procedure describes how to install OT sensor software on a physical or virtual appliance after you've booted the ISO file on your appliance.
45
46
46
47
> [!Note]
47
-
> At the end of this process you will be presented with the usernames and passwords for your device. Make sure to copy these down as these passwords will not be presented again.
48
+
> Towards the end of this process you will be presented with the usernames and passwords for your device. Make sure to copy these down as these passwords will not be presented again.
48
49
49
50
**To install the sensor's software**:
50
51
51
-
1.Select the installation language.
52
+
1.When the installation boots, you're first prompted to select the hardware profile you want to install.
52
53
53
-
:::image type="content" source="media/tutorial-install-components/language-select.png" alt-text="Screenshot of the sensor's language select screen.":::
54
+
:::image type="content" source="media/tutorial-install-components/sensor-architecture.png" alt-text="Screenshot of the sensor's hardware profile options." lightbox="media/tutorial-install-components/sensor-architecture.png":::
54
55
55
-
1. Select the sensor's architecture. For example:
56
+
For more information, see [Which appliances do I need?](ot-appliance-sizing.md).
56
57
57
-
:::image type="content" source="media/tutorial-install-components/sensor-architecture.png" alt-text="Screenshot of the sensor's architecture select screen.":::
58
+
System files are installed, the sensor reboots, and then sensor files are installed. This process can take a few minutes.
58
59
59
-
1. The sensor will reboot, and the **Package configuration** screen will appear. Press the up or down arrows to navigate, and the SPACE bar to select an option. Press ENTER to advance to the next screen.
60
+
When the installation steps are complete, the Ubuntu **Package configuration** screen is displayed, with the `Configuring iot-sensor` wizard, showing a prompt to select your monitor interfaces.
60
61
61
-
1. Select the monitor interface. For example:
62
+
In this wizard, use the up or down arrows to navigate, and the SPACE bar to select an option. Press ENTER to advance to the next screen.
63
+
64
+
1. In the `Select monitor interfaces` screen, select the interfaces you want to monitor.
65
+
66
+
By default, eno1 is reserved for the management interface. and we recommend that you leave this option unselected.
67
+
68
+
For example:
62
69
63
70
:::image type="content" source="media/tutorial-install-components/monitor-interface.png" alt-text="Screenshot of the select monitor interface screen.":::
64
71
65
-
1. If one of the monitoring ports is for ERSPAN, select it. For example:
72
+
1. In the `Select erspan monitor interfaces` screen, select any ERSPAN monitoring ports that you have. The wizard lists available interfaces, even if you don't have any ERSPAN monitoring ports in your system. If you have no ERSPAN monitoring ports, leave all options unselected.
73
+
74
+
For example:
66
75
67
76
:::image type="content" source="media/tutorial-install-components/erspan-monitor.png" alt-text="Screenshot of the select erspan monitor screen.":::
68
77
69
-
1. Select the interface to be used as the management interface. For example:
78
+
1. In the `Select management interface` screen, we recommend keeping the default `eno1` value selected as the management interface.
79
+
80
+
For example:
70
81
71
82
:::image type="content" source="media/tutorial-install-components/management-interface.png" alt-text="Screenshot of the management interface select screen.":::
72
83
73
-
1.Enter the sensor's IP address. For example:
84
+
1.In the `Enter sensor IP address` screen, enter the IP address for the sensor appliance you're installing.
74
85
75
86
:::image type="content" source="media/tutorial-install-components/sensor-ip-address.png" alt-text="Screenshot of the sensor IP address screen.":::
76
87
77
-
1.Enter the path of the mounted logs folder. We recommend using the default path. For example:
88
+
1.In the `Enter path to the mounted backups folder` screen, enter the path to the sensor's mounted backups. We recommend using the default path of `/opt/sensor/persist/backups`. For example:
78
89
79
90
:::image type="content" source="media/tutorial-install-components/mounted-backups-path.png" alt-text="Screenshot of the mounted backup path screen.":::
80
91
81
-
1. Enter the Subnet Mask IP address. For example:
92
+
1. In the `Enter Subnet Mask` screen, enter the IP address for the sensor's subnet mask. For example:
93
+
94
+
:::image type="content" source="media/tutorial-install-components/sensor-subnet-ip.png" alt-text="Screenshot of the Enter Subnet Mask screen.":::
82
95
83
-
1. Enter the default gateway IP address.
96
+
1.In the `Enter Gateway` screen, enter the sensor's default gateway IP address. For example:
84
97
85
-
1. Enter the DNS Server IP address.
98
+
:::image type="content" source="media/tutorial-install-components/sensor-gateway-ip.png" alt-text="Screenshot of the Enter Gateway screen.":::
86
99
87
-
1. Enter the sensor hostname. For example:
100
+
1.In the `Enter DNS server` screen, enter the sensor's DNS server IP address. For example:
88
101
89
-
:::image type="content" source="media/tutorial-install-components/sensor-hostname.png" alt-text="Screenshot of the screen where you enter a hostname for your sensor.":::
102
+
:::image type="content" source="media/tutorial-install-components/sensor-dns-ip.png" alt-text="Screenshot of the Enter DNS server screen.":::
90
103
91
-
The installation process runs.
104
+
1. In the `Enter hostname` screen, enter the sensor hostname. For example:
92
105
93
-
1. When the installation process completes, save the appliance ID, and passwords. Copy these credentials to a safe place as you'll need them to access the platform the first time you use it.
106
+
:::image type="content" source="media/tutorial-install-components/sensor-hostname.png" alt-text="Screenshot of the Enter hostname screen.":::
107
+
108
+
1. In the `Run this sensor as a proxy server (Preview)` screen, select `<Yes>` only if you want to configure a proxy, and then enter the proxy credentials as prompted.
109
+
110
+
The default configuration is without a proxy.
111
+
112
+
For more information, see [Connect Microsoft Defender for IoT sensors without direct internet access by using a proxy (legacy)](how-to-connect-sensor-by-proxy.md).
113
+
114
+
115
+
1. <aname=credentials></a>The installation process starts running and then shows the credentials screen. For example:
94
116
95
117
:::image type="content" source="media/tutorial-install-components/login-information.png" alt-text="Screenshot of the final screen of the installation with usernames, and passwords.":::
96
118
119
+
Save the usernames and passwords listed, as the passwords are unique and this is the only time that the credentials are listed. Copy the credentials to a safe place so that you can use them when signing into the sensor for the first time.
120
+
121
+
Select `<Ok>` when you're ready to continue.
122
+
123
+
The installation continues running again, and then reboots when the installation is complete. Upon reboot, you're prompted to enter credentials to sign in. For example:
124
+
125
+
:::image type="content" source="media/tutorial-install-components/sensor-sign-in.png" alt-text="Screenshot of a sensor sign-in screen after installation.":::
126
+
127
+
1. Enter the credentials for one of the users that you'd copied down in the [previous step](#credentials).
128
+
129
+
- If the `iot-sensor login:` prompt disappears, press **ENTER** to have it shown again.
130
+
- When you enter your password, the password characters don't display on the screen. Make sure you enter them carefully.
131
+
132
+
When you've successfully signed in, the following confirmation screen appears:
133
+
134
+
:::image type="content" source="media/tutorial-install-components/install-complete.png" alt-text="Screenshot of the sign-in confirmation.":::
135
+
136
+
Make sure that your sensor is connected to your network, and then you can sign in to your sensor via a network-connected browser. For more information, see [Activate and set up your sensor](how-to-activate-and-set-up-your-sensor.md#activate-and-set-up-your-sensor).
137
+
97
138
# [On-premises management console](#tab/on-prem)
98
139
99
140
@@ -109,6 +150,12 @@ During the installation process, you can add a secondary NIC. If you choose not
109
150
110
151
:::image type="content" source="media/tutorial-install-components/on-prem-language-select.png" alt-text="Select your preferred language for the installation process.":::
111
152
153
+
1. Select your location. For example:
154
+
155
+
1. Detect keyboard layout? default no, then select a keyboard layout
156
+
157
+
1. Configure the network - your system has detected multiple interfaces.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-investigate-sensor-detections-in-a-device-inventory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
9
9
10
10
Use the **Device inventory** page from a sensor console to manage all OT and IT devices detected by that console. Identify new devices detected, devices that might need troubleshooting, and more.
11
11
12
-
For more information, see [What is a Defender for IoT committed device?](architecture.md#what-is-a-defender-for-iot-committed-device).
12
+
For more information, see [What is a Defender for IoT committed device?](architecture.md#what-is-a-defender-for-iot-committed-device)
13
13
14
14
> [!TIP]
15
15
> Alternately, view your device inventory from a [the Azure portal](how-to-manage-device-inventory-for-organizations.md), or from an [on-premises management console](how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md).
0 commit comments