Defender for IoT software installation
This article describes how to install software for OT sensors and on-premises management consoles. You might need the procedures in this article if you're reinstalling software on a preconfigured appliance, or if you've chosen to install software on your own appliances.
Pre-installation configuration
Each appliance type comes with its own set of instructions that are required before installing Defender for IoT software.
Make sure that you've completed the procedures as instructed in the Reference > OT monitoring appliance section of our documentation before installing Defender for IoT software.
For more information, see:
- Which appliances do I need?
- Pre-configured physical appliances for OT monitoring, including the catalog of available appliances
- OT monitoring with virtual appliances
Download software files from the Azure portal
Make sure that you've downloaded the relevant software file for the sensor or on-premises management console.
You can obtain the latest versions of our OT sensor and on-premises management console software from the Azure portal, on the Defender for IoT > Getting started page. Select the Sensor, On-premises management console, or Updates tab and locate the software you need.
Mount the ISO file using one of the following options:
Physical media – burn the ISO file to a DVD or USB, and boot from the media.
Virtual mount – use iLO for HPE appliances, or iDRAC for Dell appliances to boot the ISO file.
Install OT monitoring software
This section provides generic procedures for installing OT monitoring software on sensors or an on-premises management console.
Select one of the following tabs, depending on which type of software you're installing.
This procedure describes how to install OT sensor software on a physical or virtual appliance.
Note
At the end of this process you will be presented with the usernames and passwords for your device. Make sure to copy these down as these passwords will not be presented again.
To install the sensor's software:
Select the installation language.
Select the sensor's architecture. For example:
The sensor will reboot, and the Package configuration screen will appear. Press the up or down arrows to navigate, and the SPACE bar to select an option. Press ENTER to advance to the next screen.
Select the monitor interface and press the ENTER key.
If one of the monitoring ports is for ERSPAN, select it, and press the ENTER key.
Select the interface to be used as the management interface, and press the ENTER key.
Enter the sensor's IP address, and press the ENTER key.
Enter the path of the mounted logs folder. We recommend using the default path, and press the ENTER key.
Enter the Subnet Mask IP address, and press the ENTER key.
Enter the default gateway IP address, and press the ENTER key.
Enter the DNS Server IP address, and press the ENTER key.
Enter the sensor hostname and press the ENTER key.
The installation process runs.
When the installation process completes, save the appliance ID, and passwords. Copy these credentials to a safe place as you'll need them to access the platform the first time you use it.
Post-installation validation
After you've finished installing OT monitoring software on your appliance, test your system to make sure that processes are running correctly. The same validation process applies to all appliance types.
System health validations are supported via the sensor or on-premises management console UI or CLI, and is available for both the Support and CyberX users.
After installing OT monitoring software, make sure to run the following tests:
Sanity test: Verify that the system is running.
Version: Verify that the version is correct.
ifconfig: Verify that all the input interfaces configured during the installation process are running.
For more information, see Check system health in our sensor and on-premises management console troubleshooting article.
Access sensors from the on-premises management console
You can enhance system security by preventing direct user access to the sensor. Instead, use proxy tunneling to let users access the sensor from the on-premises management console with a single firewall rule. This technique narrows the possibility of unauthorized access to the network environment beyond the sensor. The user's experience when signing in to the sensor remains the same.
To enable tunneling:
Sign in to the on-premises management console's CLI with the CyberX or the Support user credentials.
Enter
sudo cyberx-management-tunnel-enable.Select Enter.
Enter
--port 10000.
Next steps
For more information, see:
Maklum balas
Kirim dan lihat maklum balas untuk