Activate and set up your on-premises management console
Activation and setup of the on-premises management console ensures that:
- Network devices that you're monitoring through connected sensors are registered with an Azure account.
- Sensors send information to the on-premises management console.
- The on-premises management console carries out management tasks on connected sensors.
- You've installed an SSL certificate.
Sign in for the first time
To sign in to the on-premises management console:
Go to the IP address you received for the on-premises management console during the system installation.
Enter the username and password you received for the on-premises management console during the system installation.
If you forgot your password, select the Recover Password option. See Password recovery for instructions on how to recover your password.
Activate the on-premises management console
After you sign in for the first time, you need to activate the on-premises management console by getting and uploading an activation file. Activation files on the on-premises management console enforces the number of committed devices configured for your subscription and Defender for IoT plan. For more information, see Manage Defender for IoT subscriptions.
To activate the on-premises management console:
Sign in to the on-premises management console.
In the alert notification at the top of the screen, select Take Action.
In the Activation pop-up screen, select Azure portal.
Select a subscription to associate the on-premises management console to. Then select Download on-premises management console activation file. The activation file downloads.
The on-premises management console can be associated to one or more subscriptions. The activation file is associated with all the selected subscriptions and the number of committed devices at the time of download.
All files downloaded from the Azure portal are signed by root of trust so that your machines use signed assets only.
If you haven't already onboarded Defender for IoT to a subscription, see Onboard a Defender for IoT plan for OT networks.
Note
If you delete a subscription, you must upload a new activation file to the on-premises management console that was affiliated with the deleted subscription.
Go back to the Activation pop-up screen and select CHOOSE FILE.
Select the downloaded file.
After initial activation, the number of monitored devices might exceed the number of committed devices defined during onboarding. This issue occurs if you connect more sensors to the management console. If there's a discrepancy between the number of monitored devices and the number of committed devices, a warning appears on the management console.
If this warning appears, you need to upload a new activation file.
Activation expirations
After activating an on-premises management console, you'll need to apply new activation files on both the on-premises management console and connected sensors as follows:
Location | Activation process |
---|---|
On-premises management console | Apply a new activation file on your on-premises management console if you've modified the number of committed devices in your subscription. |
Cloud-connected sensors | Cloud-connected sensors remain activated for as long as your Azure subscription with your Defender for IoT plan is active. However, you'll also need to apply a new activation file when updating your sensor software from a legacy version to version 22.2.x. |
Locally-managed | Apply a new activation file to locally managed sensors every year. After a sensor's activation file has expired, the sensor will continue to monitor your network, but you'll see a warning message when signing in to the sensor. |
For more information, see Manage Defender for IoT subscriptions.
Activate expired licenses from versions earlier than 10.0
For users with versions prior to 10.0, your license might expire and the following alert will appear:
To activate your license:
Open a case with support.
Supply support with your Activation ID number.
Support will supply you with new license information in the form of a string of letters.
Read the terms and conditions, and select the checkbox to approve.
Paste the string into the space provided.
Select Activate.
Set up a certificate
After you install the management console, a local self-signed certificate is generated. This certificate is used to access the console. After an administrator signs in to the management console for the first time, that user is prompted to onboard an SSL/TLS certificate.
Two levels of security are available:
- Meet specific certificate and encryption requirements requested by your organization by uploading the CA-signed certificate.
- Allow validation between the management console and connected sensors. Validation is evaluated against a certificate revocation list and the certificate expiration date. If validation fails, communication between the management console and the sensor is halted and a validation error is presented in the console. This option is enabled by default after installation.
The console supports the following types of certificates:
Private and Enterprise Key Infrastructure (private PKI)
Public Key Infrastructure (public PKI)
Locally generated on the appliance (locally self-signed)
Important
We recommend that you don't use a self-signed certificate. The certificate isn't secure and should be used for test environments only. The owner of the certificate can't be validated, and the security of your system can't be maintained. Never use this option for production networks.
To upload a certificate:
When you're prompted after you sign in, define a certificate name.
Upload the CRT and key files.
Enter a passphrase and upload a PEM file if necessary.
You might need to refresh your screen after you upload the CA-signed certificate.
To disable validation between the management console and connected sensors:
Select Next.
Turn off the Enable system-wide validation toggle.
For information about uploading a new certificate, supported certificate files, and related items, see Manage the on-premises management console.
Connect sensors to the on-premises management console
Ensure that sensors send information to the on-premises management console. Make sure that the on-premises management console can perform backups, manage alerts, and carry out other activity on the sensors. Use the following procedures to verify that you make an initial connection between sensors and the on-premises management console.
Two options are available for connecting Microsoft Defender for IoT sensors to the on-premises management console:
After connecting, you must set up a site with these sensors.
Connect sensors to the on-premises management console from the sensor console
To connect sensors to the on-premises management console from the sensor console:
In the on-premises management console, select System Settings.
Copy the string in the Copy Connection String box.
On the sensor, go to System Settings > Connection to Management Console.
Paste the copied connection string from the on-premises management console into the Connection string box.
Select Connect.
Connect sensors by using tunneling
Enhance system security by preventing direct user access to the sensor. Instead of direct access, use proxy tunneling to let users access the sensor from the on-premises management console with a single firewall rule. This technique narrows the possibility of unauthorized access to the network environment beyond the sensor. The user's experience when signing in to the sensor remains the same.
Using tunneling allows you to connect to the on-premises management console from its IP address and a single port (9000 by default) to any sensor.
For example, the following image shows a sample architecture where users access the sensor consoles via the on-premises management console.
To set up tunneling at the on-premises management console:
Sign in to the on-premises management console's CLI with the cyberx or the support user credentials and run the following command:
sudo cyberx-management-tunnel-enable
For more information on users, see Default privileged on-premises users.
Allow a few minutes for the connection to start.
When tunneling access is configured, the following URL syntax is used to access the sensor consoles:
https://<on-premises management console address>/<sensor address>/<page URL>
You can also customize the port range to a number other than 9000. An example is 10000.
To use a new port:
Sign in to the on-premises management console and run the following command:
sudo cyberx-management-tunnel-enable --port 10000
To disable the connection:
Sign in to the on-premises management console and run the following command:
cyberx-management-tunnel-disable
No configuration is needed on the sensor.
To access the tunneling log files:
- From the on-premises management console: Sign in and go to /var/log/apache2.log.
- From the sensor: Sign in and go to /var/cyberx/logs/tunnel.log.
Set up a site
The default enterprise map provides an overall view of your devices according to several levels of geographical locations.
The view of your devices might be required where the organizational structure and user permissions are complex. In these cases, site setup might be determined by a global organizational structure, in addition to the standard site or zone structure.
To support this environment, you must create a global business topology based on your organization's business units, regions, sites, and zones. You also need to define user access permissions around these entities by using access groups.
Access groups enable better control over where users manage and analyze devices in the Defender for IoT platform.
How it works
You can define a business unit and a region for each site in your organization. You can then add zones, which are logical entities that exist in your network.
Assign at least one sensor per zone. The five-level model provides the flexibility and granularity required to deliver the protection system that reflects the structure of your organization.
By using the Enterprise View screen, you can edit your sites directly. When you select a site on the Enterprise View screen, the number of open alerts appears next to each zone.
To set up a site:
Add new business units to reflect your organization's logical structure.
On the Enterprise View screen, select All Sites > Manage Business Units.
Enter the new business unit name and select ADD.
Add new regions to reflect your organization's regions.
On the Enterprise View screen, select All Regions > Manage Regions.
Enter the new region name and select ADD.
Add a site.
On the Enterprise View screen, select
on the top bar. Your cursor appears as a plus sign (+).
Position the + at the location of the new site and select it. The Create New Site dialog opens.
Define the name and the physical address for the new site and select SAVE. The new site appears on the site map.
Delete a site
If you no longer need a site, you can delete it from your on-premises management console.
To delete a site:
In the Site Management window, select
from the bar that contains the site name. Then select Delete Site. A confirmation box appears where you can verify that you want to delete the site.
In the confirmation box, select CONFIRM.
Create enterprise zones
Zones are logical entities that enable you to divide devices within a site into groups according to various characteristics. For example, you can create groups for production lines, substations, site areas, or types of devices. You can define zones based on any characteristic that's suitable for your organization.
You configure zones as a part of the site configuration process.
The following table describes the parameters in the Site Management window.
Parameter | Description |
---|---|
Name | The name of the sensor. You can change this name only from the sensor. For more information, see the Defender for IoT user guide. |
IP | The sensor IP address. |
Version | The sensor version. |
Connectivity | The sensor connectivity status. The status can be Connected or Disconnected. |
Last Update | The date of the last update. |
Update Progress | The progress bar shows the status of the update process, as follows: - Uploading package - Preparing to install - Stopping processes - Backing up data - Taking snapshot - Updating configuration - Updating dependencies - Updating libraries - Patching databases - Starting processes - Validating system sanity - Validation succeeded - Success - Failure - Update started - Starting installation For details about updating, see Microsoft Support for help. |
Devices | The number of OT devices that the sensor monitors. |
Alerts | The number of alerts on the sensor. |
![]() |
Enables assigning a sensor to zones. |
![]() |
Enables deleting a disconnected sensor from the site. |
![]() |
Indicates how many sensors are currently connected to the zone. |
![]() |
Indicates how many OT assets are currently connected to the zone. |
![]() |
Indicates the number of alerts sent by sensors that are assigned to the zone. |
![]() |
Unassigns sensors from zones. |
To add a zone to a site:
In the Site Management window, select
on the bar that contains the site name. Then select Add Zone. The Create New Zone dialog appears.
Enter the zone name.
Enter a description for the new zone that clearly states the characteristics that you used to divide the site into zones.
Select SAVE. The new zone appears in the Site Management window under the site that this zone belongs to.
To edit a zone:
In the Site Management window, select
on the bar that contains the zone name. Then select Edit Zone. The Edit Zone dialog appears.
Edit the zone parameters and select SAVE.
To delete a zone:
In the Site Management window, select
on the bar that contains the zone name. Then select Delete Zone.
In the confirmation box, select YES.
To filter according to the connectivity status:
In the upper-left corner, select
next to Connectivity. Then select one of the following options:
- All: Presents all the sensors that report to this on-premises management console.
- Connected: Presents only connected sensors.
- Disconnected: Presents only disconnected sensors.
To filter according to the upgrade status:
In the upper-left corner, select
next to Upgrade Status. Select one of the following options:
- All: Presents all the sensors that report to this on-premises management console.
- Valid: Presents sensors with a valid upgrade status.
- In Progress: Presents sensors that are in the process of upgrade.
- Failed: Presents sensors whose upgrade process has failed.
Assign sensors to zones
For each zone, you need to assign sensors that perform local traffic analysis and alerting. You can assign only the sensors that are connected to the on-premises management console.
To assign a sensor:
Select Site Management. The unassigned sensors appear in the upper-left corner of the dialog.
Verify that the Connectivity status is Connected. If it's not, see Connect sensors to the on-premises management console for more information about connecting.
Select
for the sensor that you want to assign.
In the Assign Sensor dialog, select the business unit, region, site, and zone to assign.
Select ASSIGN.
To unassign and delete a sensor:
Disconnect the sensor from the on-premises management console. See Connect sensors to the on-premises management console for more information.
In the Site Management window, select the sensor and select
. The sensor appears in the list of unassigned sensors after a few moments.
To delete the unassigned sensor from the site, select the sensor from the list of unassigned sensors and select
.
Next steps
For more information, see Troubleshoot the sensor and on-premises management console and Manage individual sensors.
Feedback
Submit and view feedback for