Skip to content

Commit ff89bb4

Browse files
committed
Cyberark-forescout-paloalto tutuorials - sensor redesign
1 parent aecaabf commit ff89bb4

File tree

5 files changed

+24
-38
lines changed

5 files changed

+24
-38
lines changed
4.18 KB
Loading
19.2 KB
Loading

articles/defender-for-iot/organizations/tutorial-cyberark.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: In this tutorial, you will learn how to integrate Microsoft Defende
44
author: ElazarK
55
ms.author: v-ekrieg
66
ms.topic: tutorial
7-
ms.date: 11/09/2021
7+
ms.date: 02/08/2022
88
ms.custom: template-tutorial
99
---
1010

@@ -117,11 +117,10 @@ Whenever PSM authorizes a remote connection, it is visible in the Defender for
117117

118118
1. Sign in to the Defender for IoT sensor.
119119

120-
1. Select **Event Timeline** from the left side panel.
120+
1. Select **Event timeline** from the left side panel.
121121

122122
1. Locate any event titled PSM Remote Session.
123123

124-
:::image type="content" source="media/tutorial-cyberark/event.png" alt-text="A view of the Event Log screen.":::
125124

126125
### Auditing & forensics
127126

@@ -131,12 +130,10 @@ Administrators can audit, and investigate remote access sessions by querying the
131130

132131
1. Sign in to the Defender for IoT sensor.
133132

134-
1. Select **Data Mining** from the left side panel.
133+
1. Select **Data mining** from the left side panel.
135134

136135
1. Select **Remote Access**.
137136

138-
:::image type="content" source="media/tutorial-cyberark/data-mining.png" alt-text="A view of the data mining interface.":::
139-
140137
## Stop the Integration
141138

142139
At any point in time, you can stop the integration from communicating.

articles/defender-for-iot/organizations/tutorial-forescout.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: In this tutorial, you will learn how to integrate Microsoft Defende
44
author: ElazarK
55
ms.author: v-ekrieg
66
ms.topic: tutorial
7-
ms.date: 11/09/2021
7+
ms.date: 02/08/2022
88
ms.custom: template-tutorial
99
---
1010

@@ -62,17 +62,15 @@ To ensure communication from Defender for IoT to Forescout, you must generate an
6262

6363
1. Sign in to the Defender for IoT sensor that will be queried by Forescout.
6464

65-
1. Select **System Settings** > **Access Tokens** from the **General** section.
65+
1. Select **System Settings** > **Integrations** > **Access Tokens**.
6666

67-
1. Select **Generate new token**.
67+
1. Select **Generate token**.
6868

69-
:::image type="content" source="media/tutorial-forescout/generate-access-tokens-screen.png" alt-text="Screenshot of the access token generation screen.":::
70-
71-
1. Enter a token description in the **New access token** dialog box.
69+
1. Enter a token description in the **Description** field.
7270

7371
:::image type="content" source="media/tutorial-forescout/new-forescout-token.png" alt-text="New access token":::
7472

75-
1. Select **Next**. The token is then displayed in the dialog box.
73+
1. Select **Generate**. The token is then displayed in the dialog box.
7674

7775
> [!NOTE]
7876
> Record the token in a safe place. You will need it when you configure the Forescout Platform.
@@ -192,7 +190,7 @@ You can create custom policies in Forescout using Defender for IoT conditional p
192190

193191
1. In the Properties Tree, expand the CyberX Platform folder. The Defender for IoT following properties are available.
194192

195-
:::image type="content" source="media/tutorial-forescout/forescout-property-tree.png" alt-text="Properties":::
193+
:::image type="content" source="media/tutorial-forescout/forescout-property-tree.png" alt-text="Properties":::
196194

197195
## Clean up resources
198196

articles/defender-for-iot/organizations/tutorial-palo-alto.md

Lines changed: 15 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -33,22 +33,18 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
3333

3434
## Configure immediate blocking by a specified Palo Alto firewall
3535

36-
In cases, such as malware-related alerts, you can enable automatic blocking. Defender for IoT forwarding rules are utilized to send a blocking command directly to a specific Palo Alto firewall.
36+
In cases, such as malware-related alerts, you can enable automatic blocking. Defender for IoT forwarding rules is utilized to send a blocking command directly to a specific Palo Alto firewall.
3737

3838
When Defender for IoT identifies a critical threat, it sends an alert that includes an option of blocking the infected source. Selecting **Block Source** in the alert’s details activates the forwarding rule, which sends the blocking command to the specified Palo Alto firewall.
3939

4040
**To configure immediate blocking**:
4141

4242
1. In the left pane, select **Forwarding**.
4343

44-
1. Select **Create Forwarding Rule**.
45-
46-
:::image type="content" source="media/tutorial-palo-alto/forwarding.png" alt-text="Screenshot of the forwarding alert screen.":::
44+
1. Select **Create rule**.
4745

4846
1. From the Actions drop down menu, select **Send to Palo Alto NGFW**.
4947

50-
:::image type="content" source="media/tutorial-palo-alto/forward-rule.png" alt-text="Screenshot of the create Forwarding Rule screen.":::
51-
5248
1. In the Actions pane, set the following parameters:
5349

5450
- **Host**: Enter the NGFW server IP address.
@@ -66,7 +62,7 @@ When Defender for IoT identifies a critical threat, it sends an alert that inclu
6662

6763
1. Select **Submit**.
6864

69-
You will then need to block any suspicious source.
65+
You'll then need to block any suspicious source.
7066

7167
**To block a suspicious source**:
7268

@@ -108,27 +104,22 @@ The first step in creating Panorama blocking policies in Defender for IoT is to
108104

109105
**To configure DNS lookup**:
110106

111-
1. In the left pane, select **System Settings**.
112-
113-
1. Select the **DNS Settings** :::image type="icon" source="media/tutorial-palo-alto/settings.png"::: button.
107+
1. In the console left pane, select **System settings** > **Network monitoring** > **DNS Reverse Lookup**.
108+
1. Select **Add DNS server**.
109+
1. In the **Schedule Reverse Lookup** field define the scheduling options:
110+
- By specific times: Specify when to perform the reverse lookup daily.
111+
- By fixed intervals (in hours): Set the frequency for performing the reverse lookup.
112+
1. In the **Number of Labels** field instruct Defender for IoT to automatically resolve network IP addresses to device FQDNs. <br />To configure DNS FQDN resolution, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
113+
1. Add the following server details:
114114

115-
1. In the **Edit DNS Settings** dialog box, set the following parameters:
116-
117-
- **Status**: The status of the DNS resolver.
118-
119-
- **DNS Server Address**: Enter the IP address, or the FQDN of the network DNS Server.
115+
- **DNS Server Address**: Enter the IP address, or the FQDN of the network DNS Server.
120116
- **DNS Server Port**: Enter the port used to query the DNS server.
121117
- **Subnets**: Set the Dynamic IP address subnet range. The range that Defender for IoT reverses lookup their IP address in the DNS server to match their current FQDN name.
122-
- **Schedule Reverse Lookup**: Define the scheduling options as follows:
123-
- By specific times: Specify when to perform the reverse lookup daily.
124-
- By fixed intervals (in hours): Set the frequency for performing the reverse lookup.
125-
- **Number of Labels**: Instruct Defender for IoT to automatically resolve network IP addresses to device FQDNs. <br />To configure DNS FQDN resolution, add the number of domain labels to display. Up to 30 characters are displayed from left to right.
126-
127-
:::image type="content" source="media/tutorial-palo-alto/configuration.png" alt-text="Screenshot of the Configure the DNS settings screen.":::
128118

129-
1. Select **SAVE**.
119+
1. Select **Save**.
120+
1. Turn on the **Enabled** toggle to activate the lookup.
130121

131-
To ensure your DNS settings are correct, select **Lookup Test**. The test ensures that the DNS server IP address, and DNS server port are set correctly.
122+
1. To ensure your DNS settings are correct, select **Test**. The test ensures that the DNS server IP address, and DNS server port are set correctly.
132123

133124
## Block suspicious traffic with the Palo Alto firewall
134125

@@ -181,7 +172,7 @@ Suspicious traffic will need to be blocked with the Palo Alto firewall. You can
181172

182173
1. Select **Submit**.
183174

184-
You will then need to block the suspicious source.
175+
You'll then need to block the suspicious source.
185176

186177
**To block the suspicious source**:
187178

0 commit comments

Comments
 (0)