{"id":15218,"date":"2024-04-03T00:00:00","date_gmt":"2024-04-03T00:00:00","guid":{"rendered":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/"},"modified":"2025-09-08T16:04:35","modified_gmt":"2025-09-08T21:04:35","slug":"operational-technology-network-security-monitoring","status":"publish","type":"our_work","link":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/","title":{"rendered":"Operational Technology Network Security Monitoring"},"content":{"rendered":"<p>Operational Technology, used in factory automation, faces a growing number of cybersecurity threats. Microsoft&#8217;s Defender for IoT (MD4IoT) monitors these networks for malicious and unusual activity, provides alerts, and notifies users of vulnerabilities that require remediation.<\/p>\r\n\r\n<p>MD4IoT goes beyond monitoring computers on a network. It can scan, detect, and report on OT equipment such as PLCs, HMIs, VFDs, and more. This information is aggregated into a local dashboard on the MD4IoT appliance and in the Azure dashboard for the product. It is ingestible by SOC software like Service Now\u00a0(SNOW), Splunk, and LogRhythm.<\/p>\r\n\r\n<p>DMC\u2019s client reached out to get AD4IoT implemented at their various sites across the globe. We implemented the program in four phases: Discovery, Design, Deployment, and Operationalization.<\/p>\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Discovery<\/strong><\/h3>\r\n\r\n<p>DMC began by collaborating with the client site and their third-party vendor to remotely gather information from the client\u2019s existing network. We developed a questionnaire, and the answers helped us to determine the type of network the client used, the types of devices used, and the number of devices on that network. Our discovery included switch diagnostic information, which allowed developing detailed network diagrams and device relationships.<\/p>\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Design<\/strong><\/h3>\r\n\r\n<p>Using the information gathered during the discovery phase, DMC built a map that plotted the connections between switches at each site. Once we had a thorough understanding of how each switch was connected, we created switch configurations to route OT traffic via SPAN\/RSPAN to the central manager.<\/p>\r\n\r\n<p>RSPAN was used for the distribution switches and SPAN was used for traffic mirroring to the sensor. We then developed commands for the sensor that was to be installed. The sensor is a local AD4IoT instance that aggregates traffic and sends data to the global central manager instance of MD4IoT used for reporting.<\/p>\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Deployment<\/strong><\/h3>\r\n\r\n<p>Next, DMC installed the MD4IoT operating system, which is Ubuntu based, on the client-provided Dell R350 PowerEdge Server at each site. There were three network ports to configure on the server:\u00a0one that was used for AD4IoT Management, one used for ingesting SPAN data, and one used for Dell server administration (iDRAC).<\/p>\r\n\r\n<p>We reconfigured their network by adding around 15 \u2013 20 configuration changes for each distribution and core switch. To minimize risk and issues that are likely to occur in OT Networks such as the high traffic caused by high-definition cameras, we performed thorough testing.<\/p>\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Operationalization<\/strong><\/h3>\r\n\r\n<p>DMC then made improvements to the monitored targets and subnets that the SPAN brought in. We also applied alert filtering to reduce anomalies and false positives in reports. Any alert determined to be a false positive was cleared and filtered so that future alerts provided the most meaningful data.<\/p>\r\n\r\n<p>Each server was connected to a central manager, which allowed the client to access data from multiple sites via a single pane of glass.\u00a0DMC then conducted administrator training for IT and OT personnel so that they could operate the AD4IoT sensor appropriately.<\/p>\r\n\r\n<figure class=\"wp-block-image\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165446\/microsoft-defender-1-edit-2_1.png\"  \/><\/figure>\r\n\r\n<figure class=\"wp-block-image\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165446\/Microsoft-defender-2-edit_1.png\"  \/><\/figure>\r\n\r\n<figure class=\"wp-block-image\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165445\/microsoft-defender-3-ed.png\"  \/><\/figure>\r\n\r\n<p><strong>Learn more about DMC&#8217;s\u00a0<a href=\"https:\/\/www.dmcinfo.com\/services\/digital-workplace-solutions\/microsoft-consulting-services\/microsoft-azure-cloud-solutions-and-services\">Microsoft Azure Cloud Solutions and Services<\/a><\/strong><strong>\u00a0expertise and <a href=\"https:\/\/www.dmcinfo.com\/contact\">contact us<\/a> today for your next project.<\/strong><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Operational Technology, used in factory automation, faces a growing number of cybersecurity threats. Microsoft&#8217;s Defender for IoT (MD4IoT) monitors these networks for malicious and unusual activity, provides alerts, and notifies users of vulnerabilities that require remediation. MD4IoT goes beyond monitoring computers on a network. It can scan, detect, and report on OT equipment such as [&hellip;]<\/p>\n","protected":false},"author":284,"featured_media":15214,"template":"","meta":{"customer":"Mars","summary":"<p>DMC implemented <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/endpoint-security\/microsoft-defender-iot\" target=\"_blank\">Microsoft Defender for IoT<\/a> across 20 sites worldwide for a company in the food and beverage industry.<\/p>\r\n","description":"","customer_benefits":"<ul>\r\n <li>Ability to access data from multiple sites through a single interface<\/li>\r\n <li>Real-time network inventory<\/li>\r\n <li>Real-time alerts for network and equipment vulnerabilities<\/li>\r\n <li>Improved performance and reliability<\/li>\r\n <li>DMC has the ability to implement this solution both locally and remotely. The latter allows us to implement multiple sites in days vs weeks.<\/li>\r\n <li>DMC has an&nbsp;in-house cybersecurity lab with&nbsp;an MD4IoT sensor installed that allows testing for future and present client implementations.<\/li>\r\n<\/ul>\r\n","components_used":"<ol>\r\n <li>Microsoft Defender for IoT<\/li>\r\n <li>Dell Servers and iDRAC<\/li>\r\n <li><a href=\"https:\/\/www.dmcinfo.com\/services\/digital-workplace-solutions\/microsoft-consulting-services\/microsoft-azure-cloud-solutions-and-services\">Microsoft Azure<\/a><\/li>\r\n<\/ol>\r\n","project":"","author":"Tim Johnson","notes":""},"work_category":[721,708,696,711],"class_list":["post-15218","our_work","type-our_work","status-publish","has-post-thumbnail","hentry","work_category-azure","work_category-digital-workplace-solutions","work_category-food-and-beverage","work_category-internet-of-things-iot"],"yoast_head":"<title>Operational Technology Network Security Monitoring | DMC, Inc.<\/title>\n<meta name=\"description\" content=\"Learn how Microsoft Defender enhances factory automation security by monitoring and detecting unusual network activity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operational Technology Network Security Monitoring\" \/>\n<meta property=\"og:description\" content=\"Learn how Microsoft Defender enhances factory automation security by monitoring and detecting unusual network activity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"DMC, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/DMC-Inc\/107982009242929\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-08T21:04:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165447\/Operational-Technology-Network-Security-Monitoring.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/\",\"url\":\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/\",\"name\":\"Operational Technology Network Security Monitoring | DMC, Inc.\",\"isPartOf\":{\"@id\":\"https:\/\/www.dmcinfo.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165447\/Operational-Technology-Network-Security-Monitoring.png\",\"datePublished\":\"2024-04-03T00:00:00+00:00\",\"dateModified\":\"2025-09-08T21:04:35+00:00\",\"description\":\"Learn how Microsoft Defender enhances factory automation security by monitoring and detecting unusual network activity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#primaryimage\",\"url\":\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165447\/Operational-Technology-Network-Security-Monitoring.png\",\"contentUrl\":\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165447\/Operational-Technology-Network-Security-Monitoring.png\",\"width\":1400,\"height\":500,\"caption\":\"Operational Technology Network Security Monitoring\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Work\",\"item\":\"https:\/\/www.dmcinfo.com\/our-work\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operational Technology Network Security Monitoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dmcinfo.com\/#website\",\"url\":\"https:\/\/www.dmcinfo.com\/\",\"name\":\"DMC, Inc.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.dmcinfo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dmcinfo.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dmcinfo.com\/#organization\",\"name\":\"DMC, Inc.\",\"url\":\"https:\/\/www.dmcinfo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dmcinfo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27171146\/dmc-logo-1.png\",\"contentUrl\":\"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27171146\/dmc-logo-1.png\",\"width\":418,\"height\":167,\"caption\":\"DMC, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.dmcinfo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/DMC-Inc\/107982009242929\",\"https:\/\/www.instagram.com\/dmcengineering\",\"https:\/\/www.youtube.com\/DMCEngineering\",\"https:\/\/www.linkedin.com\/company\/dmc-engineering\"]}]}<\/script>","yoast_head_json":{"title":"Operational Technology Network Security Monitoring | DMC, Inc.","description":"Learn how Microsoft Defender enhances factory automation security by monitoring and detecting unusual network activity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"Operational Technology Network Security Monitoring","og_description":"Learn how Microsoft Defender enhances factory automation security by monitoring and detecting unusual network activity.","og_url":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/","og_site_name":"DMC, Inc.","article_publisher":"https:\/\/www.facebook.com\/pages\/DMC-Inc\/107982009242929","article_modified_time":"2025-09-08T21:04:35+00:00","og_image":[{"width":1400,"height":500,"url":"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165447\/Operational-Technology-Network-Security-Monitoring.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/","url":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/","name":"Operational Technology Network Security Monitoring | DMC, Inc.","isPartOf":{"@id":"https:\/\/www.dmcinfo.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165447\/Operational-Technology-Network-Security-Monitoring.png","datePublished":"2024-04-03T00:00:00+00:00","dateModified":"2025-09-08T21:04:35+00:00","description":"Learn how Microsoft Defender enhances factory automation security by monitoring and detecting unusual network activity.","breadcrumb":{"@id":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#primaryimage","url":"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165447\/Operational-Technology-Network-Security-Monitoring.png","contentUrl":"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27165447\/Operational-Technology-Network-Security-Monitoring.png","width":1400,"height":500,"caption":"Operational Technology Network Security Monitoring"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dmcinfo.com\/our-work\/operational-technology-network-security-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Work","item":"https:\/\/www.dmcinfo.com\/our-work\/"},{"@type":"ListItem","position":2,"name":"Operational Technology Network Security Monitoring"}]},{"@type":"WebSite","@id":"https:\/\/www.dmcinfo.com\/#website","url":"https:\/\/www.dmcinfo.com\/","name":"DMC, Inc.","description":"","publisher":{"@id":"https:\/\/www.dmcinfo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dmcinfo.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dmcinfo.com\/#organization","name":"DMC, Inc.","url":"https:\/\/www.dmcinfo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dmcinfo.com\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27171146\/dmc-logo-1.png","contentUrl":"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27171146\/dmc-logo-1.png","width":418,"height":167,"caption":"DMC, Inc."},"image":{"@id":"https:\/\/www.dmcinfo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/DMC-Inc\/107982009242929","https:\/\/www.instagram.com\/dmcengineering","https:\/\/www.youtube.com\/DMCEngineering","https:\/\/www.linkedin.com\/company\/dmc-engineering"]}]}},"_links":{"self":[{"href":"https:\/\/www.dmcinfo.com\/wp-json\/wp\/v2\/our_work\/15218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dmcinfo.com\/wp-json\/wp\/v2\/our_work"}],"about":[{"href":"https:\/\/www.dmcinfo.com\/wp-json\/wp\/v2\/types\/our_work"}],"author":[{"embeddable":true,"href":"https:\/\/www.dmcinfo.com\/wp-json\/wp\/v2\/users\/284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dmcinfo.com\/wp-json\/wp\/v2\/media\/15214"}],"wp:attachment":[{"href":"https:\/\/www.dmcinfo.com\/wp-json\/wp\/v2\/media?parent=15218"}],"wp:term":[{"taxonomy":"work_category","embeddable":true,"href":"https:\/\/www.dmcinfo.com\/wp-json\/wp\/v2\/work_category?post=15218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}