About Defender for IoT console users
This article describes how to create and manage users of sensors and the on-premises management console. User roles include Administrator, Security Analyst, or Read-only users. Each role is associated with a range of permissions to tools for the sensor or on-premises management console. Roles are designed to facilitate granular, secure access to Microsoft Defender for IoT.
Features are also available to track user activity and enable Active Directory sign in.
By default, each sensor and on-premises management console is installed with a cyberx, support and cyberx_host user. These users have access to advanced tools for troubleshooting and setup. Administrator users should sign in with these user credentials, create an admin user, and then create extra users for security analysts and read-only users.
Role-based permissions
The following user roles are available:
Read only: Read-only users perform tasks such as viewing alerts and devices on the device map. These users have access to options displayed under Discover.
Security analyst: Security Analysts have Read-only user permissions. They can also perform actions on devices, acknowledge alerts, and use investigation tools. These users have access to options displayed under Discover and Analyze.
Administrator: Administrators have access to all tools, including system configurations, creating and managing users, and more. These users have access to options displayed under Discover, Analyze, and Manage sections of the console main screen.
Role-based permissions to on-premises management console tools
This section describes permissions available to Administrators, Security Analysts, and Read-only users for the on-premises management console.
| Permission | Read-only | Security Analyst | Administrator |
|---|---|---|---|
| View and filter the enterprise map | ✓ | ✓ | ✓ |
| Build a site | ✓ | ||
| Manage a site (add and edit zones) | ✓ | ||
| View and filter device inventory | ✓ | ✓ | ✓ |
| View and manage alerts: acknowledge, learn, and pin | ✓ | ✓ | ✓ |
| Generate reports | ✓ | ✓ | |
| View risk assessment reports | ✓ | ✓ | |
| Set alert exclusions | ✓ | ✓ | |
| View or define access groups | ✓ | ||
| Manage system settings | ✓ | ||
| Manage users | ✓ | ||
| Send alert data to partners | ✓ | ||
| Manage certificates | ✓ | ||
| Session timeout when users aren't active | 30 minutes | 30 minutes | 30 minutes |
Assign users to access groups
Administrators can enhance user access control in Defender for IoT by assigning users to specific access groups. Access groups are assigned to zones, sites, regions, and business units where a sensor is located. By assigning users to access groups, administrators gain specific control over where users manage and analyze device detections.
Working this way accommodates large organizations where user permissions can be complex or determined by a global organizational security policy. For more information, see Define global access control.
Role-based permissions to sensor tools
This section describes permissions available to sensor Administrators, Security Analysts, and Read-only users.
| Permission | Read-only | Security Analyst | Administrator |
|---|---|---|---|
| View the dashboard | ✓ | ✓ | ✓ |
| Control map zoom views | ✓ | ||
| View alerts | ✓ | ✓ | ✓ |
| Manage alerts: acknowledge, learn, and pin | ✓ | ✓ | |
| View events in a timeline | ✓ | ✓ | |
| Authorize devices, known scanning devices, programming devices | ✓ | ✓ | |
| View investigation data | ✓ | ✓ | ✓ |
| Manage system settings | ✓ | ||
| Manage users | ✓ | ||
| DNS servers for reverse lookup | ✓ | ||
| Send alert data to partners | ✓ | ✓ | |
| Create alert comments | ✓ | ✓ | |
| View programming change history | ✓ | ✓ | ✓ |
| Create customized alert rules | ✓ | ✓ | |
| Manage multiple notifications simultaneously | ✓ | ✓ | |
| Manage certificates | ✓ | ||
| Session timeout when users are not active | 30 minutes | 30 minutes | 30 minutes |
Define users
This section describes how to define users. Cyberx, support, and administrator users can add, remove, and update other user definitions.
To define a user:
From the left pane for the sensor or the on-premises management console, select Users.
In the Users window, select Create User.
In the Create User pane, define the following parameters:
- Username: Enter a username.
- Email: Enter the user's email address.
- First Name: Enter the user's first name.
- Last Name: Enter the user's last name.
- Role: Define the user's role. For more information, see Role-based permissions.
- Access Group: If you're creating a user for the on-premises management console, define the user's access group. For more information, see Define global access control.
- Password: Select the user type as follows:
- Local User: Define a password for the user of a sensor or an on-premises management console. Password must have at least eight characters and contain lowercase and uppercase alphabetic characters, numbers, and symbols.
- Active Directory User: You can allow users to sign in to the sensor or management console by using Active Directory credentials. Defined Active Directory groups can be associated with specific permission levels. For example, configure a specific Active Directory group and assign all users in the group to the Read-only user type.
User session timeout
If users aren't active at the keyboard or mouse for a specific time, they're signed out of their session and must sign in again.
When users haven't worked with their console mouse or keyboard for 30 minutes, a session sign-out is forced.
This feature is enabled by default and on upgrade, but can be disabled. In addition, session counting times can be updated. Session times are defined in seconds. Definitions are applied per sensor and on-premises management console.
A session timeout message appears at the console when the inactivity timeout has passed.
Control inactivity sign-out
Administrator users can enable and disable inactivity sign-out and adjust the inactivity thresholds.
To access the command:
Sign in to the CLI for the sensor or on-premises management console by using Defender for IoT administrative credentials.
Enter
sudo nano /var/cyberx/properties/authentication.
infinity_session_expiration = true
session_expiration_default_seconds = 0
# half an hour in seconds (comment)
session_expiration_admin_seconds = 1800
# a day in seconds
session_expiration_security_analyst_seconds = 1800
# a week in seconds
session_expiration_read_only_users_seconds = 1800
To disable the feature, change infinity_session_expiration = true to infinity_session_expiration = false.
To update sign-out counting periods, adjust the = <number> value to the required time.
Track user activity
Track user activity on a sensor's event timeline, or by viewing audit logs generated on an on-premises management console.
The timeline displays the event or affected device, and the time and date that the user carried out the activity.
Audit logs record key activity data at the time of occurrence. Use audit logs generated on the on-premises management console to understand which changes were made, when, and by whom.
View user activity on the sensor's Event Timeline
Select Event Timeline from the sensor side menu. If needed, verify that User Operations filter is set to Show.
For example:
Use the filters or search using CTRL+F to find the information of interest to you.
View audit log data on the on-premises management console
In the on-premises management console, select System Settings > System Statistics, and then select Audit log.
The dialog displays data from the currently active audit log. For example:
For example:
New audit logs are generated at every 10 MB. One previous log is stored in addition to the current active log file.
Audit logs include the following data:
| Action | Information logged |
|---|---|
| Learn, and remediation of alerts | Alert ID |
| Password changes | User, User ID |
| Login | User |
| User creation | User, User role |
| Password reset | User name |
| Exclusion rules-Creation | Rule summary |
| Exclusion rules-Editing | Rule ID, Rule Summary |
| Exclusion rules-Deletion | Rule ID |
| Management Console Upgrade | The upgrade file used |
| Sensor upgrade retry | Sensor ID |
| Uploaded TI package | No additional information recorded. |
Tip
You may also want to export your audit logs to send them to the support team for extra troubleshooting. For more information, see Export audit logs for troubleshooting
Change a user's password
User passwords can be changed for users created with a local password.
Administrator users
The Administrator can change the password for the Security Analyst and Read-only roles. The Administrator role user can't change their own password and must contact a higher-level role.
Security Analyst and Read-only users
The Security Analyst and Read-only roles can't reset any passwords. The Security Analyst and Read-only roles need to contact a user with a higher role level to have their passwords reset.
CyberX and Support users
CyberX role can change the password for all user roles. The Support role can change the password for a Support, Administrator, Security Analyst, and Read-only user roles.
To reset a user's password on the sensor:
Sign in to the sensor using a user with the role Administrator, Support, or CyberX.
Select Users from the left-hand panel.
Locate the local user whose password needs to be changed.
On this row, select three dots (...) and then select Edit.
Enter and confirm the new password in the Change Password section.
Note
Passwords must be at least 16 characters, contain lowercase and uppercase alphabetic characters, numbers and one of the following symbols: #%*+,-./:=?@[]^_{}~
Select Update.
To reset a user's password on the on-premises management console:
Sign in to the on-premises management console using a user with the role Administrator, Support, or CyberX.
Select Users from the left-hand panel.
Locate your user and select the edit icon
.Enter the new password in the New Password and Confirm New Password fields.
Note
Passwords must be at least 16 characters, contain lowercase and uppercase alphabetic characters, numbers and one of the following symbols: #%*+,-./:=?@[]^_{}~
Select Update.
Recover the password for the on-premises management console, or the sensor
You can recover the password for the on-premises management console or the sensor with the Password recovery feature. Only the CyberX and Support users have access to the Password recovery feature.
To recover the password for the on-premises management console, or the sensor:
On the sign-in screen of either the on-premises management console or the sensor, select Password recovery. The Password recovery screen opens.
Select either CyberX or Support from the drop-down menu, and copy the unique identifier code.
Navigate to the Azure portal, and select Sites and Sensors.
Select the Subscription Filter icon
from the top toolbar, and select the subscription your sensor is connected to.Select the More Actions drop down menu, and select Recover on-premises management console password.
Enter the unique identifier that you received on the Password recovery screen and select Recover. The
password_recovery.zipfile is downloaded.All files downloaded from the Azure portal are signed by root of trust so that your machines use signed assets only.
On the Password recovery screen, select Upload. The Upload Password Recovery File window will open.
Select Browse to locate your
password_recovery.zipfile, or drag thepassword_recovery.zipto the window.Note
An error message may appear indicating the file is invalid. To fix this error message, ensure you selected the right subscription before downloading the
password_recovery.zipand download it again.Select Next, and your user, and a system-generated password for your management console will then appear.
Next steps
Povratne informacije
Pošalјite i prikažite povratne informacije za