Manage individual sensors
This article describes how to manage individual sensors, such as managing activation files, certificates, backups, and more.
You can also perform some management tasks for multiple sensors simultaneously from the Azure portal or an on-premises management console. For more information, see Next steps.
Manage sensor activation files
Your sensor was onboarded with Microsoft Defender for IoT from the Azure portal. Each sensor was onboarded as either a locally connected sensor or a cloud-connected sensor.
A unique activation file is uploaded to each sensor that you deploy. For more information about when and how to use a new file, see Upload new activation files. If you can't upload the file, see Troubleshoot activation file upload.
About activation files for locally connected sensors
Locally connected sensors are associated with an Azure subscription. The activation file for your locally connected sensors contains an expiration date. One month before this date, a warning message appears in the System Messages window in the top-right corner of the console. The warning remains until after you've updated the activation file.
You can continue to work with Defender for IoT features even if the activation file has expired.
About activation files for cloud-connected sensors
Sensors that are cloud connected aren't limited by time periods for their activation file. The activation file for cloud-connected sensors is used to ensure the connection to Defender for IoT.
Upload new activation files
You might need to upload a new activation file for an onboarded sensor when:
An activation file expires on a locally connected sensor.
You want to work in a different sensor management mode.
For sensors connected via an IoT Hub (legacy), you want to assign a new Defender for IoT hub to a cloud-connected sensor.
To add a new activation file:
Go to the Azure portal for Defender for IoT.
Use the search bar to find the sensor you need.
Select the three dots (...) on the row and select Delete sensor.
Onboard the sensor again by selecting Getting Started> Set up OT/ICS Security > Register this sensor with Microsoft Defender for IoT.
Go to the Sites and sensors page.
Use the search bar to find the sensor you just added, and select it.
Select the three dots (...) on the row and select Download activation file.
All files downloaded from the Azure portal are signed by root of trust so that your machines use signed assets only.
Save the file.
Sign in to the Defender for IoT sensor console.
Select System Settings > Sensor management > Subscription & Activation Mode.
Select Upload and select the file that you saved.
Select Activate.
Troubleshoot activation file upload
You'll receive an error message if the activation file couldn't be uploaded. The following events might have occurred:
For locally connected sensors: The activation file isn't valid. If the file isn't valid, go to Defender for IoT in the Azure portal. On the Sensor Management page, select the sensor with the invalid file, and download a new activation file.
For cloud-connected sensors: The sensor can't connect to the internet. Check the sensor's network configuration. If your sensor needs to connect through a web proxy to access the internet, verify that your proxy server is configured correctly on the Sensor Network Configuration screen. Verify that *.azure-devices.net:443 is allowed in the firewall and/or proxy. If wildcards are not supported or you want more control, the FQDN for your specific endpoint (either a sensor, or for legacy connections, an IoT hub) should be opened in your firewall and/or proxy. For more information, see Reference - IoT Hub endpoints.
For cloud-connected sensors: The activation file is valid but Defender for IoT rejected it. If you can't resolve this problem, you can download another activation from the Sites and Sensors page in the Azure portal. If this doesn't work, contact Microsoft Support.
Manage certificates
Following sensor installation, a local self-signed certificate is generated and used to access the sensor web application. When logging in to the sensor for the first time, Administrator users are prompted to provide an SSL/TLS certificate.
Sensor Administrators may be required to update certificates that were uploaded after initial login. This may happen for example if a certificate expired.
To update a certificate:
Select System Settings and then select Basic.
Select SSL/TLS Certificate.
In the SSL/TLS Certificates dialog box, delete the existing certificate and add a new one.
- Add a certificate name.
- Upload a CRT file and key file.
- Upload a PEM file if necessary.
If the upload fails, contact your security or IT administrator, or review the information in About Certificates.
To change the certificate validation setting:
Enable or disable the Enable Certificate Validation toggle. If the option is enabled and validation fails, communication between relevant components is halted and a validation error is presented in the console. If disabled, certificate validation is not carried out. See About certificate validation for more information.
Select Save.
For more information about first-time certificate upload see, First-time sign-in and activation checklist
Connect a sensor to the management console
This section describes how to ensure connection between the sensor and the on-premises management console. You need to do this if you're working in an air-gapped network and want to send device and alert information to the management console from the sensor. This connection also allows the management console to push system settings to the sensor and perform other management tasks on the sensor.
To connect:
Sign in to the on-premises management console.
Select System Settings.
In the Sensor Setup – Connection String section, copy the automatically generated connection string.
Sign in to the sensor console.
On the left pane, select System Settings.
Select Management Console Connection.
Paste the connection string in the Connection string box and select Connect.
In the on-premises management console, in the Site Management window, assign the sensor to a zone.
Change the name of a sensor
You can change the name of your sensor console. The new name will appear in:
- The sensor console web browser
- Various console windows
- Troubleshooting logs
- The Sites and sensors page in the Defender for IoT portal on Azure.
The process for changing sensor names is the same for locally managed sensors and cloud-connected sensors.
The sensor name is defined by the name assigned during the registration. The name is included in the activation file that you uploaded when signing in for the first time. To change the name of the sensor, you need to upload a new activation file.
To change the name:
In the Azure portal, go to the Sites and sensors page.
Delete the sensor from the page.
Register with the new name by selecting Set up OT/ICS Security from the Getting Started page.
Download the new activation file.
Sign in to the Defender for IoT sensor console.
In the sensor console, select System settings > Sensor management and then select Subscription & Activation Mode.
Select Upload and select the file you saved.
Select Activate.
Update the sensor network configuration
The sensor network configuration was defined during the sensor installation. You can change configuration parameters. You can also set up a proxy configuration.
If you create a new IP address, you might be required to sign in again.
To change the configuration:
On the side menu, select System Settings.
In the System Settings window, select Network.
Set the parameters:
Parameter Description IP address The sensor IP address Subnet mask The mask address Default gateway The default gateway address DNS The DNS server address Hostname The sensor hostname Proxy Proxy host and port name Select Save.
Synchronize time zones on the sensor
You can configure the sensor's time and region so that all the users see the same time and region.
| Parameter | Description |
|---|---|
| Timezone | The time zone definition for: - Alerts - Trends and statistics widgets - Data mining reports -Risk assessment reports - Attack vectors |
| Date format | Select one of the following format options: - dd/MM/yyyy HH:mm:ss - MM/dd/yyyy HH:mm:ss - yyyy/MM/dd HH:mm:ss |
| Date and time | Displays the current date and local time in the format that you selected. For example, if your actual location is America and New York, but the time zone is set to Europe and Berlin, the time is displayed according to Berlin local time. |
To configure the sensor time:
On the side menu, select System settings > Basic, > Time & Region.
Set the parameters and select Save.
Set up backup and restore files
System backup is performed automatically at 3:00 AM daily. The data is saved on a different disk in the sensor. The default location is /var/cyberx/backups.
You can automatically transfer this file to the internal network.
Note
- The backup and restore procedure can be performed between the same versions only.
- In some architectures, the backup is disabled. You can enable it in the
/var/cyberx/properties/backup.propertiesfile.
When you control a sensor by using the on-premises management console, you can use the sensor's backup schedule to collect these backups and store them on the management console or on an external backup server.
What is backed up: Configurations and data.
What is not backed up: PCAP files and logs. You can manually back up and restore PCAPs and logs.
Sensor backup files are automatically named through the following format: <sensor name>-backup-version-<version>-<date>.tar. An example is Sensor_1-backup-version-2.6.0.102-2019-06-24_09:24:55.tar.
To configure backup:
- Sign in to an administrative account and enter
$ sudo cyberx-xsense-system-backup.
To restore the latest backup file:
- Sign in to an administrative account and enter
$ sudo cyberx-xsense-system-restore.
To save the backup to an external SMB server:
Create a shared folder in the external SMB server.
Get the folder path, username, and password required to access the SMB server.
In the sensor, make a directory for the backups:
sudo mkdir /<backup_folder_name_on_cyberx_server>sudo chmod 777 /<backup_folder_name_on_cyberx_server>/
Edit
fstab:sudo nano /etc/fstabadd - //<server_IP>/<folder_path> /<backup_folder_name_on_cyberx_server> cifsrw,credentials=/etc/samba/user,vers=X.X,uid=cyberx,gid=cyberx,file_mode=0777,dir_mode=0777 0 0
Edit and create credentials to share for the SMB server:
sudo nano /etc/samba/userAdd:
username=>:user name<:password=<password>
Mount the directory:
sudo mount -aConfigure a backup directory to the shared folder on the Defender for IoT sensor:
sudo nano /var/cyberx/properties/backup.propertiesset backup_directory_path to <backup_folder_name_on_cyberx_server>
Restore sensors
You can restore backups from the sensor console and by using the CLI.
To restore from the console:
- Select Restore Image from the sensor's System Settings window.
The console will display restore failures.
To restore by using the CLI:
- Sign in to an administrative account and enter
$ sudo cyberx-management-system-restore.
Forward sensor failure alerts
You can forward alerts to third parties to provide details about:
Disconnected sensors
Remote backup failures
This information is sent when you create a forwarding rule for system notifications.
Note
Administrators can send system notifications.
To send notifications:
- Sign in to the on-premises management console.
- Select Forwarding from the side menu.
- Create a forwarding rule.
- Select Report System Notifications.
For more information about forwarding rules, see Forward alert information.
Upload and play PCAP files
When troubleshooting, you may want to examine data recorded by a specific PCAP file. To do so, you can upload a PCAP file to your sensor console and replay the data recorded.
To view the PCAP player in your sensor console, you'll first need to configure the relevant advanced configuration option.
Maximum size for uploaded files is 2 GB.
To show the PCAP player in your sensor console:
On your sensor console, go to System settings > Sensor management > Advanced Configurations.
In the Advanced configurations pane, select the Pcaps category.
In the configurations displayed, change
enabled=0toenabled=1, and select Save.
The Play PCAP option is now available in the sensor console's settings, under: System settings > Basic > Play PCAP.
To upload and play a PCAP file:
On your sensor console, select System settings > Basic > Play PCAP.
In the PCAP PLAYER pane, select Upload and then navigate to and select the file you want to upload.
Select Play to play your PCAP file, or Play All to play all PCAP files currently loaded.
Tip
Select Clear All to clear the sensor of all PCAP files loaded.
Adjust system properties
System properties control various operations and settings in the sensor. Editing or modifying them might damage the operation of the sensor console.
Consult with Microsoft Support before you change your settings.
To access system properties:
Sign in to the on-premises management console or the sensor.
Select System Settings.
Select System Properties from the General section.
Download a diagnostics log for support
This procedure describes how to download a diagnostics log to send to support in connection with a specific support ticket.
This feature is supported for the following sensor versions:
- 22.1.1 - Download a diagnostic log from the sensor console
- 22.1.3 - For locally-managed sensors, upload a diagnostics log from the Sites and sensors page in the Azure portal. This file is automatically sent to support when you open a ticket on a cloud-connected sensor.
All files downloaded from the Azure portal are signed by root of trust so that your machines use signed assets only.
To download a diagnostics log:
On the sensor console, select System settings > Backup & Restore > Backup.
Under Logs, select Support Ticket Diagnostics, and then select Export.
For a locally-managed sensor, version 22.1.3 or higher, continue with Upload a diagnostics log for support.
Next steps
For more information, see:
- Activate and set up your sensor
- Connect your OT sensors to the cloud
- Track sensor activity
- Update OT system software
- Manage sensors with Defender for IoT in the Azure portal
- Threat intelligence research and packages
- Manage sensors from the management console
- Troubleshoot the sensor and on-premises management console
Povratne informacije
Pošalјite i prikažite povratne informacije za