Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article is part of a series of articles that describes the deployment path for operational technology (OT) monitoring with Microsoft Defender for IoT. The article lists the catalog of the preconfigured appliances available for Microsoft Defender for IoT OT appliances. To jump to articles with more details about each appliance, use the links in the tables in this article
Microsoft is partnered with Arrow Electronics to provide preconfigured appliances. To purchase a preconfigured appliance, contact Arrow at: hardware.sales@arrow.com.
Advantages of preconfigured appliances
Preconfigured physical appliances are validated for Defender for IoT OT system monitoring, and have the following advantages over installing your own software:
- Performance over the total assets monitored
- Compatibility with new Defender for IoT releases, with validations for upgrades and driver support
- Stability, validated physical appliances undergo traffic monitoring and packet loss tests
- In-lab experience, Microsoft support teams train using validated physical appliances and have a working knowledge of the hardware
- Availability, components are selected to offer long-term worldwide availability
Appliances for OT network sensors
You can order any of the following preconfigured appliances for monitoring your OT networks:
| Hardware profile | Appliance |
|---|---|
| C5600 | HPE ProLiant DL360 Gen 11 Dell PowerEdge R660 |
| E1800 | HPE ProLiant DL20 Gen11 (4SFF) Dell PowerEdge R360 |
| E500 | Dell Edge 5200 (Rugged MIL-STD-810G) |
| L500 | HPE ProLiant DL20 Gen11 Plus (NHP 2LFF) DELL XE4 Small Form Factor (SFF) |
| L100 | YS-Techsystems YS-FIT2 (Rugged MIL-STD-810G) Dell Edge Gateway 3200 |
Note
The performance, capacity, and activity of an OT/IoT network might vary depending on its size, capacity, protocols distribution, and overall activity. For deployments, it's important to factor in raw network speed, the size of the network to monitor, and application configuration. These deployment configurations heavily influence the selection of processors, memory, and network cards. The amount of space needed on your disk differs depending on how long you store data, and the amount and type of data you store.
Performance values are presented as upper thresholds under the assumption of intermittent traffic profiles, such as those found in OT/IoT systems and machine-to-machine communication networks.