Quickstart: Security agent reference architecture
Azure Defender for IoT provides reference architecture for security agents that log, process, aggregate, and send security data through IoT Hub.
Security agents are designed to work in a constrained IoT environment, and are highly customizable in terms of values they provide when compared to the resources they consume.
Security agents support the following features:
Authenticate with existing device identity, or a dedicated module identity. To learn more, see Security agent authentication methods.
Collect raw security events from the underlying Operating System (Linux, Windows). To learn more about available security data collectors, see Defender for IoT agent configuration.
Aggregate raw security events into messages sent through IoT Hub.
Configure remotely through use of the azureiotsecurity module twin. To learn more, see Configure a Defender for IoT agent.
Defender for IoT Security agents is developed as open-source projects, and are available from GitHub:
Agent supported platforms
Defender for IoT offers different installer agents for 32 bit and 64-bit Windows, and the same for 32 bit and 64-bit Linux. Make sure you have the correct agent installer for each of your devices according to the following table:
|64 bit||C# or C||C#||We recommend using the C agent for devices with more restricted or minimal device resources.|
In this article, you got a high-level overview about Defender for IoT Defender-IoT-micro-agent architecture, and the available installers. To continue getting started with Defender for IoT deployment,