Forward alert information
You can send alert information to partners who are integrating with Microsoft Defender for IoT, to syslog servers, to email addresses, and more. Working with forwarding rules lets you quickly deliver alert information to security stakeholders.
Define criteria by which to trigger a forwarding rule. Working with forwarding rule criteria helps pinpoint and manage the volume of information sent from the sensor to external systems.
Syslog and other default forwarding actions are delivered with your system. More forwarding actions might become available when you integrate with partner vendors, such as Microsoft Sentinel, ServiceNow, or Splunk.
Defender for IoT administrators have permission to use forwarding rules.
About forwarded alert information
Alerts provide information about an extensive range of security and operational events. For example:
Date and time of the alert
Engine that detected the event
Alert title and descriptive message
Alert severity
Source and destination name and IP address
Suspicious traffic detected
Disconnected sensors
Remote backup failures
Relevant information is sent to partner systems when forwarding rules are created in the sensor console or the on-premises management console.
About Forwarding rules and certificates
Certain Forwarding rules allow encryption and certificate validation between the sensor or on-premises management console, and the server of the integrated vendor.
In these cases, the sensor or on-premises management console is the client and initiator of the session. The certificates are typically received from the server, or use asymmetric encryption where a specific certificate will be provided to set up the integration.
Your Defender for IoT system was set up to either validate certificates or ignore certificate validation. See About certificate validation for information about enabling and disabling validation.
If validation is enabled and the certificate cannot be verified, communication between Defender for IoT and the server will be halted. The sensor will display an error message indicating the validation failure. If the validation is disabled and the certificate isn't valid, communication will still be carried out.
The following Forwarding rules allow encryption and certificate validation:
- Syslog CEF
- Microsoft Sentinel
- QRadar
Create forwarding rules
To create a new forwarding rule:
Sign in to the sensor.
Select Forwarding on the side menu.
Select Create new rule.
Add a rule name.
Define rule conditions:
Select the severity level. This is the minimum incident to forward, in terms of severity level. For example, if you select Minor, minor alerts and any alert above this severity level will be forwarded. Levels are predefined.
Select a protocol(s) that should be detected. Information will be forwarded if the traffic detected was running selected protocols.
Select which engines the rule should apply to. Alert information detected from selected engines will be forwarded
Define rule actions by selecting a server.
Forwarding rule actions instruct the sensor to forward alert information to selected partner vendors or servers. You can create multiple actions for each forwarding rule.
Select Save.
Forwarding rule actions
You can send alert information to the servers described in this section.
Email address action
Send mail that includes the alert information. You can enter one email address per rule.
To define email for the forwarding rule:
Enter a single email address. If you need to add more than one email, you'll need to create another action for each email address.
Enter the time zone for the time stamp for the alert detection at the SIEM.
Select Save.
Syslog server actions
The following formats are supported:
Text messages
CEF messages
LEEF messages
Object messages
Enter the following parameters:
Syslog host name and port.
Protocol TCP and UDP.
Time zone for the time stamp for the alert detection at the SIEM.
TLS encryption certificate file and key file for CEF servers (optional).
| Syslog text message output fields | Description |
|---|---|
| Date and time | Date and time that the syslog server machine received the information. |
| Priority | User. Alert |
| Hostname | Sensor IP address |
| Protocol | TCP or UDP |
| Message | Sensor: The sensor name. Alert: The title of the alert. Type: The type of the alert. Can be Protocol Violation, Policy Violation, Malware, Anomaly, or Operational. Severity: The severity of the alert. Can be Warning, Minor, Major, or Critical. Source: The source device name. Source IP: The source device IP address. Destination: The destination device name. Destination IP: The IP address of the destination device. Message: The message of the alert. Alert group: The alert group associated with the alert. |
| Syslog object output | Description |
|---|---|
| Date and Time | Date and time that the syslog server machine received the information. |
| Priority | User.Alert |
| Hostname | Sensor IP |
| Message | Sensor name: The name of the appliance. Alert time: The time that the alert was detected: Can vary from the time of the syslog server machine, and depends on the time-zone configuration of the forwarding rule. Alert title: The title of the alert. Alert message: The message of the alert. Alert severity: The severity of the alert: Warning, Minor, Major, or Critical. Alert type: Protocol Violation, Policy Violation, Malware, Anomaly, or Operational. Protocol: The protocol of the alert. Source_MAC: IP address, name, vendor, or OS of the source device. Destination_MAC: IP address, name, vendor, or OS of the destination. If data is missing, the value will be N/A. alert_group: The alert group associated with the alert. |
| Syslog CEF output format | Description |
|---|---|
| Date and time | Date and time that the syslog server machine received the information. |
| Priority | User.Alert |
| Hostname | Sensor IP address |
| Message | CEF:0 Microsoft Defender for IoT Sensor name: The name of the sensor appliance. Sensor version Alert title: The title of the alert. msg: The message of the alert. protocol: The protocol of the alert. severity: Warning, Minor, Major, or Critical. type: Protocol Violation, Policy Violation, Malware, Anomaly, or Operational. start: The time that the alert was detected. Might vary from the time of the syslog server machine, and depends on the time-zone configuration of the forwarding rule. src_ip: IP address of the source device. dst_ip: IP address of the destination device. cat: The alert group associated with the alert. |
| Syslog LEEF output format | Description |
|---|---|
| Date and time | Date and time that the syslog server machine received the information. |
| Priority | User.Alert |
| Hostname | Sensor IP |
| Message | Sensor name: The name of the Microsoft Defender for IoT appliance. LEEF:1.0 Microsoft Defender for IoT Sensor Sensor version Microsoft Defender for IoT Alert title: The title of the alert. msg: The message of the alert. protocol: The protocol of the alert. severity: Warning, Minor, Major, or Critical. type: The type of the alert: Protocol Violation, Policy Violation, Malware, Anomaly, or Operational. start: The time of the alert. It may be different from the time of the syslog server machine. (This depends on the time-zone configuration.) src_ip: IP address of the source device. dst_ip: IP address of the destination device. cat: The alert group associated with the alert. |
Webhook server action
Send alert information to a webhook server. Working with webhook servers lets you set up integrations that subscribe to alert events with Defender for IoT. When an alert event is triggered, the management console sends an HTTP POST payload to the webhook's configured URL. Webhooks can be used to update an external SIEM system, SOAR systems, Incident management systems, etc.
This action is available from the on-premises management console.
To define to a webhook action:
Select the Webhook action.
Enter the server address in the URL field.
In the Key and Value fields, customize the HTTP header with a key and value definition. Keys can only contain letters, numbers, dashes, and underscores. Values can only contain one leading and/or one trailing space.
Select Save.
Webhook extended
Webhook extended can be used to send extra data to the endpoint. The extended feature includes all of the information in the Webhook alert, and adds the following information to the report:
- sensorID
- sensorName
- zoneID
- zoneName
- siteID
- siteName
- sourceDeviceAddress
- destinationDeviceAddress
- remediationSteps
- handled
- additionalInformation
To define a webhook extended action:
Add the endpoint data URL in the URL field.
(Optional) Customize the HTTP header with a key and value definition. Add extra headers by selecting the
button.Select Save.
Once the Webhook Extended forwarding rule has been configured, you can test the alert from the Forwarding screen on the management console.
To test the Webhook Extended forwarding rule:
In the management console, select Forwarding from the left-hand pane.
Select the run button to test your alert.
You'll know the forwarding rule is working if you see the Success notification.
NetWitness action
Send alert information to a NetWitness server.
To define NetWitness forwarding parameters:
Enter NetWitness Hostname and Port information.
Enter the time zone for the time stamp for the alert detection at the SIEM.
Select Save.
Integrated vendor actions
You might have integrated your system with a security, device management, or other industry vendor. These integrations let you:
Send alert information.
Send device inventory information.
Communicate with vendor-side firewalls.
Integrations help bridge previously siloed security solutions, enhance device visibility, and accelerate system-wide response to more rapidly mitigate risks.
Use the actions section to enter the credentials and other information required to communicate with integrated vendors.
For details about setting up forwarding rules for the integrations, refer to the relevant partner integration articles.
Test forwarding rules
Test the connection between the sensor and the partner server that's defined in your forwarding rules:
In the Forwarding page, find the rule you need and select the three dots (...) at the end of the row.
Select Send Test Message.
Go to your partner system to verify that the information sent by the sensor was received.
Edit and delete forwarding rules
To edit a forwarding rule:
- In the Forwarding page, find the rule you need and select the three dots (...) at the end of the row.
- Select Edit and update the rule.
- Select Save.
To remove a forwarding rule:
- In the Forwarding page, find the rule you need and select the three dots (...) at the end of the row.
- Select Delete and confirm.
- Select Save.
Forwarding rules and alert exclusion rules
The administrator might have defined alert exclusion rules. These rules help administrators achieve more granular control over alert triggering by instructing the sensor to ignore alert events based on various parameters. These parameters might include device addresses, alert names, or specific sensors.
This means that the forwarding rules you define might be ignored based on exclusion rules that your administrator has created. Exclusion rules are defined in the on-premises management console.
Next steps
For more information, see Accelerate alert workflows.
Povratne informacije
Pošalјite i prikažite povratne informacije za