Skip to content

Commit ff64ff6

Browse files
authored
Merge pull request #291075 from limwainstein/deployment-guide-fix
Deployment guide fix
2 parents 1fec9ca + 7dfd259 commit ff64ff6

14 files changed

+122
-23
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,8 +92,10 @@
9292
items:
9393
- name: Configure traffic mirroring
9494
items:
95-
- name: Overview
95+
- name: Traffic mirroring overview
9696
href: traffic-mirroring/traffic-mirroring-overview.md
97+
- name: Set up traffic mirroring
98+
href: traffic-mirroring/set-up-traffic-mirroring.md
9799
- name: Configure a switch SPAN port
98100
href: traffic-mirroring/configure-mirror-span.md
99101
- name: Configure a remote SPAN (RSPAN)

articles/defender-for-iot/organizations/ot-deploy/ot-deploy-path.md

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The following image shows the steps included in the planning and preparing phase
3232

3333
:::image type="content" source="../media/deployment-paths/plan-prepare.png" alt-text="Diagram of the steps included in the planning and preparing stage." border="false" :::
3434

35-
#### Plan your OT monitoring system
35+
### Plan your OT monitoring system
3636

3737
Plan basic details about your monitoring system, such as:
3838

@@ -47,7 +47,7 @@ For more information, see [Plan your OT monitoring system with Defender for IoT]
4747
> [!TIP]
4848
> If you're using several locally managed sensors, you may also want to deploy an [on-premises management console](air-gapped-deploy.md) for central visibility and management.
4949
>
50-
#### Prepare for an OT site deployment
50+
### Prepare for an OT site deployment
5151

5252
Define additional details for each site planned in your system, including:
5353

@@ -67,7 +67,7 @@ The following image shows the step included in the onboard sensors phase. Sensor
6767

6868
:::image type="content" source="../media/deployment-paths/onboard-sensors.png" alt-text="Diagram of the onboard sensors phase."border="false" :::
6969

70-
#### Onboard OT sensors on the Azure portal
70+
### Onboard OT sensors on the Azure portal
7171

7272
Onboard as many OT sensors to Defender for IoT as you've planned. Make sure to download the activation files provided for each OT sensor and save them in a location that will be accessible from your sensor machines.
7373

@@ -79,10 +79,12 @@ The following image shows the steps included in the site networking setup phrase
7979

8080
:::image type="content" source="../media/deployment-paths/site-networking-setup.png" alt-text="Diagram of the site networking setup phase." border="false":::
8181

82-
#### Configure traffic mirroring in your network
82+
### Configure traffic mirroring in your network
8383

8484
Use the plans you'd created [earlier](#prepare-for-an-ot-site-deployment) to configure traffic mirroring at the places in your network where you'll be deploying OT sensors and mirroring traffic to Defender for IoT.
8585

86+
A brief summary of the information needed to choose the best location for your OT sensor and deploy it on your network is available in [traffic mirroring set up overview](../traffic-mirroring/set-up-traffic-mirroring.md).
87+
8688
For more information, see:
8789

8890
- [Configure mirroring with a switch SPAN port](../traffic-mirroring/configure-mirror-span.md)
@@ -92,7 +94,7 @@ For more information, see:
9294
- [Configure traffic mirroring with a ESXi vSwitch](../traffic-mirroring/configure-mirror-esxi.md)
9395
- [Configure traffic mirroring with a Hyper-V vSwitch](../traffic-mirroring/configure-mirror-hyper-v.md)
9496

95-
#### Provision for cloud management
97+
### Provision for cloud management
9698

9799
Configure any firewall rules to ensure that your OT sensor appliances will be able to access Defender for IoT on the Azure cloud. If you're planning to connect via a proxy, you'll configure those settings only after installing your sensor.
98100

@@ -106,7 +108,7 @@ The following image shows the steps included in the sensor deployment phase. OT
106108

107109
:::image type="content" source="../media/deployment-paths/deploy-sensors.png" alt-text="Diagram of the OT sensor deployment phase." border="false":::
108110

109-
#### Install your OT sensors
111+
### Install your OT sensors
110112

111113
If you're installing Defender for IoT software on your own appliances, download installation software from the Azure portal and install it on your OT sensor appliance.
112114

@@ -119,13 +121,13 @@ For more information, see:
119121

120122
Skip these steps if you're purchasing [pre-configured appliances](../ot-pre-configured-appliances.md).
121123

122-
#### Activate your OT sensors and initial setup
124+
### Activate your OT sensors and initial setup
123125

124126
Use an initial setup wizard to confirm network settings, activate the sensor, and apply SSH/TLS certificates.
125127

126128
For more information, see [Configure and activate your OT sensor](activate-deploy-sensor.md).
127129

128-
#### Configure proxy connections
130+
### Configure proxy connections
129131

130132
If you've decided to use a proxy to connect your sensors to the cloud, set up your proxy and configure settings on your sensor. For more information, see [Configure proxy settings on an OT sensor](../connect-sensors.md).
131133

@@ -134,7 +136,7 @@ Skip this step in the following situations:
134136
- For any OT sensor where you're connecting directly to Azure, without a proxy
135137
- For any sensor that is planned to be air-gapped and managed locally, either directly on the sensor console, or via an [on-premises management console](air-gapped-deploy.md).
136138

137-
#### Configure optional settings
139+
### Configure optional settings
138140

139141
We recommend that you configure an Active Directory connection for managing on-premises users on your OT sensor, and also setting up sensor health monitoring via SNMP.
140142

@@ -151,19 +153,19 @@ The following image shows the steps involved in calibrating and fine-tuning OT m
151153

152154
:::image type="content" source="../media/deployment-paths/calibrate-fine-tune.png" alt-text="Diagram of the calibrate and fine-tuning phase." border="false":::
153155

154-
#### Control OT monitoring on your sensor
156+
### Control OT monitoring on your sensor
155157

156158
By default, your OT sensor may not detect the exact networks that you want to monitor, or identify them in precisely the way you'd like to see them displayed. Use the [lists you'd created earlier](#prepare-for-an-ot-site-deployment) to verify and manually configure the subnets, customize port and VLAN names, and configure DHCP address ranges as needed.
157159

158160
For more information, see [Control the OT traffic monitored by Microsoft Defender for IoT](../how-to-control-what-traffic-is-monitored.md).
159161

160-
#### Verify and update your detected device inventory
162+
### Verify and update your detected device inventory
161163

162164
After your devices are fully detected, review the device inventory and modify the device details as needed. For example, you might identify duplicate device entries that can be merged, device types or other properties to modify, and more.
163165

164166
For more information, see [Verify and update your detected device inventory](update-device-inventory.md).
165167

166-
#### Learn OT alerts to create a network baseline
168+
### Learn OT alerts to create a network baseline
167169

168170
The alerts triggered by your OT sensor may include several alerts that you'll want to regularly ignore, or *Learn*, as authorized traffic.
169171

@@ -189,6 +191,8 @@ Once Defender for IoT has been deployed, send security alerts and manage OT/IoT
189191
Integrate Defender for IoT alerts with your organizational SIEM by [integrating with Microsoft Sentinel](../iot-advanced-threat-monitoring.md) and leveraging the out-of-the-box Microsoft Defender for IoT solution, or by [creating forwarding rules](../how-to-forward-alert-information-to-partners.md) to other SIEM systems.
190192
Defender for IoT integrates out-of-the-box with Microsoft Sentinel, as well as [a broad range of SIEM systems](../integrate-overview.md), such as Splunk, IBM QRadar, LogRhythm, Fortinet, and more.
191193

194+
A brief summary of the information needed to choose the best location for your OT sensor and deploy it on your network is available in [traffic mirroring set up overview](../traffic-mirroring/set-up-traffic-mirroring.md).
195+
192196
For more information, see:
193197

194198
- [OT threat monitoring in enterprise SOCs](../concept-sentinel-integration.md)
@@ -202,7 +206,7 @@ After integrating Defender for IoT alerts with a SIEM, we recommend the followin
202206
- Identify and define relevant IoT/OT security threats and SOC incidents you would like to monitor based on your specific OT needs and environment.
203207

204208
- Create detection rules and severity levels in the SIEM. Only relevant incidents will be triggered, thus reducing unnecessary noise. For example, you would define PLC code changes performed from unauthorized devices, or outside of work hours, as a high severity incident due to the high fidelity of this specific alert.
205-
209+
206210
In Microsoft Sentinel, the Microsoft Defender for IoT solution includes [a set of out-of-the-box detection rules](../iot-advanced-threat-monitoring.md#detect-threats-out-of-the-box-with-defender-for-iot-data), which are built specifically for Defender for IoT data, and help you fine-tune the incidents created in Sentinel.
207211

208212
- Define the appropriate workflow for mitigation, and create automated investigation playbooks for each use case. In Microsoft Sentinel, the Microsoft Defender for IoT solution includes [out-of-the-box playbooks for automated response to Defender for IoT alerts](../iot-advanced-threat-monitoring.md#automate-response-to-defender-for-iot-alerts).
55.1 KB
Loading
35.5 KB
Loading
33.7 KB
Loading
48.4 KB
Loading
31.7 KB
Loading
29.7 KB
Loading
15.8 KB
Loading
59.7 KB
Loading

0 commit comments

Comments
 (0)