You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/ot-deploy/ot-deploy-path.md
+17-13Lines changed: 17 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ The following image shows the steps included in the planning and preparing phase
32
32
33
33
:::image type="content" source="../media/deployment-paths/plan-prepare.png" alt-text="Diagram of the steps included in the planning and preparing stage." border="false" :::
34
34
35
-
####Plan your OT monitoring system
35
+
### Plan your OT monitoring system
36
36
37
37
Plan basic details about your monitoring system, such as:
38
38
@@ -47,7 +47,7 @@ For more information, see [Plan your OT monitoring system with Defender for IoT]
47
47
> [!TIP]
48
48
> If you're using several locally managed sensors, you may also want to deploy an [on-premises management console](air-gapped-deploy.md) for central visibility and management.
49
49
>
50
-
####Prepare for an OT site deployment
50
+
### Prepare for an OT site deployment
51
51
52
52
Define additional details for each site planned in your system, including:
53
53
@@ -67,7 +67,7 @@ The following image shows the step included in the onboard sensors phase. Sensor
67
67
68
68
:::image type="content" source="../media/deployment-paths/onboard-sensors.png" alt-text="Diagram of the onboard sensors phase."border="false" :::
69
69
70
-
####Onboard OT sensors on the Azure portal
70
+
### Onboard OT sensors on the Azure portal
71
71
72
72
Onboard as many OT sensors to Defender for IoT as you've planned. Make sure to download the activation files provided for each OT sensor and save them in a location that will be accessible from your sensor machines.
73
73
@@ -79,10 +79,12 @@ The following image shows the steps included in the site networking setup phrase
79
79
80
80
:::image type="content" source="../media/deployment-paths/site-networking-setup.png" alt-text="Diagram of the site networking setup phase." border="false":::
81
81
82
-
####Configure traffic mirroring in your network
82
+
### Configure traffic mirroring in your network
83
83
84
84
Use the plans you'd created [earlier](#prepare-for-an-ot-site-deployment) to configure traffic mirroring at the places in your network where you'll be deploying OT sensors and mirroring traffic to Defender for IoT.
85
85
86
+
A brief summary of the information needed to choose the best location for your OT sensor and deploy it on your network is available in [traffic mirroring set up overview](../traffic-mirroring/set-up-traffic-mirroring.md).
87
+
86
88
For more information, see:
87
89
88
90
-[Configure mirroring with a switch SPAN port](../traffic-mirroring/configure-mirror-span.md)
@@ -92,7 +94,7 @@ For more information, see:
92
94
-[Configure traffic mirroring with a ESXi vSwitch](../traffic-mirroring/configure-mirror-esxi.md)
93
95
-[Configure traffic mirroring with a Hyper-V vSwitch](../traffic-mirroring/configure-mirror-hyper-v.md)
94
96
95
-
####Provision for cloud management
97
+
### Provision for cloud management
96
98
97
99
Configure any firewall rules to ensure that your OT sensor appliances will be able to access Defender for IoT on the Azure cloud. If you're planning to connect via a proxy, you'll configure those settings only after installing your sensor.
98
100
@@ -106,7 +108,7 @@ The following image shows the steps included in the sensor deployment phase. OT
106
108
107
109
:::image type="content" source="../media/deployment-paths/deploy-sensors.png" alt-text="Diagram of the OT sensor deployment phase." border="false":::
108
110
109
-
####Install your OT sensors
111
+
### Install your OT sensors
110
112
111
113
If you're installing Defender for IoT software on your own appliances, download installation software from the Azure portal and install it on your OT sensor appliance.
112
114
@@ -119,13 +121,13 @@ For more information, see:
119
121
120
122
Skip these steps if you're purchasing [pre-configured appliances](../ot-pre-configured-appliances.md).
121
123
122
-
####Activate your OT sensors and initial setup
124
+
### Activate your OT sensors and initial setup
123
125
124
126
Use an initial setup wizard to confirm network settings, activate the sensor, and apply SSH/TLS certificates.
125
127
126
128
For more information, see [Configure and activate your OT sensor](activate-deploy-sensor.md).
127
129
128
-
####Configure proxy connections
130
+
### Configure proxy connections
129
131
130
132
If you've decided to use a proxy to connect your sensors to the cloud, set up your proxy and configure settings on your sensor. For more information, see [Configure proxy settings on an OT sensor](../connect-sensors.md).
131
133
@@ -134,7 +136,7 @@ Skip this step in the following situations:
134
136
- For any OT sensor where you're connecting directly to Azure, without a proxy
135
137
- For any sensor that is planned to be air-gapped and managed locally, either directly on the sensor console, or via an [on-premises management console](air-gapped-deploy.md).
136
138
137
-
####Configure optional settings
139
+
### Configure optional settings
138
140
139
141
We recommend that you configure an Active Directory connection for managing on-premises users on your OT sensor, and also setting up sensor health monitoring via SNMP.
140
142
@@ -151,19 +153,19 @@ The following image shows the steps involved in calibrating and fine-tuning OT m
151
153
152
154
:::image type="content" source="../media/deployment-paths/calibrate-fine-tune.png" alt-text="Diagram of the calibrate and fine-tuning phase." border="false":::
153
155
154
-
####Control OT monitoring on your sensor
156
+
### Control OT monitoring on your sensor
155
157
156
158
By default, your OT sensor may not detect the exact networks that you want to monitor, or identify them in precisely the way you'd like to see them displayed. Use the [lists you'd created earlier](#prepare-for-an-ot-site-deployment) to verify and manually configure the subnets, customize port and VLAN names, and configure DHCP address ranges as needed.
157
159
158
160
For more information, see [Control the OT traffic monitored by Microsoft Defender for IoT](../how-to-control-what-traffic-is-monitored.md).
159
161
160
-
####Verify and update your detected device inventory
162
+
### Verify and update your detected device inventory
161
163
162
164
After your devices are fully detected, review the device inventory and modify the device details as needed. For example, you might identify duplicate device entries that can be merged, device types or other properties to modify, and more.
163
165
164
166
For more information, see [Verify and update your detected device inventory](update-device-inventory.md).
165
167
166
-
####Learn OT alerts to create a network baseline
168
+
### Learn OT alerts to create a network baseline
167
169
168
170
The alerts triggered by your OT sensor may include several alerts that you'll want to regularly ignore, or *Learn*, as authorized traffic.
169
171
@@ -189,6 +191,8 @@ Once Defender for IoT has been deployed, send security alerts and manage OT/IoT
189
191
Integrate Defender for IoT alerts with your organizational SIEM by [integrating with Microsoft Sentinel](../iot-advanced-threat-monitoring.md) and leveraging the out-of-the-box Microsoft Defender for IoT solution, or by [creating forwarding rules](../how-to-forward-alert-information-to-partners.md) to other SIEM systems.
190
192
Defender for IoT integrates out-of-the-box with Microsoft Sentinel, as well as [a broad range of SIEM systems](../integrate-overview.md), such as Splunk, IBM QRadar, LogRhythm, Fortinet, and more.
191
193
194
+
A brief summary of the information needed to choose the best location for your OT sensor and deploy it on your network is available in [traffic mirroring set up overview](../traffic-mirroring/set-up-traffic-mirroring.md).
195
+
192
196
For more information, see:
193
197
194
198
-[OT threat monitoring in enterprise SOCs](../concept-sentinel-integration.md)
@@ -202,7 +206,7 @@ After integrating Defender for IoT alerts with a SIEM, we recommend the followin
202
206
- Identify and define relevant IoT/OT security threats and SOC incidents you would like to monitor based on your specific OT needs and environment.
203
207
204
208
- Create detection rules and severity levels in the SIEM. Only relevant incidents will be triggered, thus reducing unnecessary noise. For example, you would define PLC code changes performed from unauthorized devices, or outside of work hours, as a high severity incident due to the high fidelity of this specific alert.
205
-
209
+
206
210
In Microsoft Sentinel, the Microsoft Defender for IoT solution includes [a set of out-of-the-box detection rules](../iot-advanced-threat-monitoring.md#detect-threats-out-of-the-box-with-defender-for-iot-data), which are built specifically for Defender for IoT data, and help you fine-tune the incidents created in Sentinel.
207
211
208
212
- Define the appropriate workflow for mitigation, and create automated investigation playbooks for each use case. In Microsoft Sentinel, the Microsoft Defender for IoT solution includes [out-of-the-box playbooks for automated response to Defender for IoT alerts](../iot-advanced-threat-monitoring.md#automate-response-to-defender-for-iot-alerts).
0 commit comments