You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
:::image type="content" source="media/tutorial-forescout/generate-access-tokens-screen.png" alt-text="Screenshot of the access token generation screen.":::
70
-
71
-
1. Enter a token description in the **New access token** dialog box.
69
+
1. Enter a token description in the **Description** field.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/tutorial-palo-alto.md
+15-24Lines changed: 15 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,22 +33,18 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
33
33
34
34
## Configure immediate blocking by a specified Palo Alto firewall
35
35
36
-
In cases, such as malware-related alerts, you can enable automatic blocking. Defender for IoT forwarding rules are utilized to send a blocking command directly to a specific Palo Alto firewall.
36
+
In cases, such as malware-related alerts, you can enable automatic blocking. Defender for IoT forwarding rules is utilized to send a blocking command directly to a specific Palo Alto firewall.
37
37
38
38
When Defender for IoT identifies a critical threat, it sends an alert that includes an option of blocking the infected source. Selecting **Block Source** in the alert’s details activates the forwarding rule, which sends the blocking command to the specified Palo Alto firewall.
39
39
40
40
**To configure immediate blocking**:
41
41
42
42
1. In the left pane, select **Forwarding**.
43
43
44
-
1. Select **Create Forwarding Rule**.
45
-
46
-
:::image type="content" source="media/tutorial-palo-alto/forwarding.png" alt-text="Screenshot of the forwarding alert screen.":::
44
+
1. Select **Create rule**.
47
45
48
46
1. From the Actions drop down menu, select **Send to Palo Alto NGFW**.
49
47
50
-
:::image type="content" source="media/tutorial-palo-alto/forward-rule.png" alt-text="Screenshot of the create Forwarding Rule screen.":::
51
-
52
48
1. In the Actions pane, set the following parameters:
53
49
54
50
-**Host**: Enter the NGFW server IP address.
@@ -66,7 +62,7 @@ When Defender for IoT identifies a critical threat, it sends an alert that inclu
66
62
67
63
1. Select **Submit**.
68
64
69
-
You will then need to block any suspicious source.
65
+
You'll then need to block any suspicious source.
70
66
71
67
**To block a suspicious source**:
72
68
@@ -108,27 +104,22 @@ The first step in creating Panorama blocking policies in Defender for IoT is to
108
104
109
105
**To configure DNS lookup**:
110
106
111
-
1. In the left pane, select **System Settings**.
112
-
113
-
1. Select the **DNS Settings** :::image type="icon" source="media/tutorial-palo-alto/settings.png"::: button.
107
+
1. In the console left pane, select **System settings** > **Network monitoring** > **DNS Reverse Lookup**.
108
+
1. Select **Add DNS server**.
109
+
1. In the **Schedule Reverse Lookup** field define the scheduling options:
110
+
- By specific times: Specify when to perform the reverse lookup daily.
111
+
- By fixed intervals (in hours): Set the frequency for performing the reverse lookup.
112
+
1. In the **Number of Labels** field instruct Defender for IoT to automatically resolve network IP addresses to device FQDNs. <br />To configure DNS FQDN resolution, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
113
+
1. Add the following server details:
114
114
115
-
1. In the **Edit DNS Settings** dialog box, set the following parameters:
116
-
117
-
-**Status**: The status of the DNS resolver.
118
-
119
-
-**DNS Server Address**: Enter the IP address, or the FQDN of the network DNS Server.
115
+
-**DNS Server Address**: Enter the IP address, or the FQDN of the network DNS Server.
120
116
-**DNS Server Port**: Enter the port used to query the DNS server.
121
117
-**Subnets**: Set the Dynamic IP address subnet range. The range that Defender for IoT reverses lookup their IP address in the DNS server to match their current FQDN name.
122
-
-**Schedule Reverse Lookup**: Define the scheduling options as follows:
123
-
- By specific times: Specify when to perform the reverse lookup daily.
124
-
- By fixed intervals (in hours): Set the frequency for performing the reverse lookup.
125
-
-**Number of Labels**: Instruct Defender for IoT to automatically resolve network IP addresses to device FQDNs. <br />To configure DNS FQDN resolution, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
126
-
127
-
:::image type="content" source="media/tutorial-palo-alto/configuration.png" alt-text="Screenshot of the Configure the DNS settings screen.":::
128
118
129
-
1. Select **SAVE**.
119
+
1. Select **Save**.
120
+
1. Turn on the **Enabled** toggle to activate the lookup.
130
121
131
-
To ensure your DNS settings are correct, select **Lookup Test**. The test ensures that the DNS server IP address, and DNS server port are set correctly.
122
+
1.To ensure your DNS settings are correct, select **Test**. The test ensures that the DNS server IP address, and DNS server port are set correctly.
132
123
133
124
## Block suspicious traffic with the Palo Alto firewall
134
125
@@ -181,7 +172,7 @@ Suspicious traffic will need to be blocked with the Palo Alto firewall. You can
181
172
182
173
1. Select **Submit**.
183
174
184
-
You will then need to block the suspicious source.
0 commit comments