Connect OT network sensors to Microsoft Sentinel (legacy)
Article
This article describes the legacy method for connecting your OT sensor to Microsoft Sentinel. Stream data into Microsoft Sentinel whenever you want to use Microsoft Sentinel's advanced threat hunting, security analytics, and automation features when responding to security incidents and threats across your network.
Important
This feature will be deprecated in January 2025.
If you're using a cloud connected sensor, we recommend that you connect Defender for IoT data using the Microsoft Sentinel solution instead of the legacy integration method. For more information, see:
If you want to encrypt the data you send to Microsoft Sentinel using TLS, make sure to generate a valid TLS certificate from the proxy server to use in your forwarding alert rule.
When creating your forwarding rule, make sure to select Microsoft Sentinel as the Server value. For example, on the OT sensor:
If you're using TLS encryption, make sure to select Enable encryption and upload your certificate and key files.
Select Save when you're done. Make sure to test the rule to make sure that it works as expected.
Important
To forward alert details to multiple Microsoft Sentinel instances, make sure to create a separate forwarding rule for each instance. Don't use the Add server option in the same forwarding rule to send data to multiple Microsoft Sentinel instances.
This tutorial describes how to integrate Microsoft Sentinel and Microsoft Defender for IoT with the Microsoft Sentinel data connector to secure your entire environment. Detect and respond to threats, including multistage attacks that may cross IT and OT boundaries.
This tutorial describes how to use the Microsoft Sentinel data connector and solution for Microsoft Defender for IoT to secure your entire environment. Detect and respond to threats, including multistage attacks that may cross IT and OT boundaries.
Senior Product Manager Vishakha Ghosh joins this episode to guide us through Microsoft Defender for IoT. You learn the best practices for securing operational technology (OT) and industrial control systems (ICSs), and you gain insights into how organizations using this innovative solution can build a consolidated security operations center that can effectively handle both OT and IT alerts. Don’t miss out as we break down the silos between these two critical areas of cybersecurity. Chapters 00:00 - Introduc