You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/iot-advanced-threat-monitoring.md
+10-11Lines changed: 10 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,24 +93,23 @@ After you’ve [configured your Defender for IoT data to trigger new incidents i
93
93
94
94
:::image type="content" source="media/iot-solution/investigate-iot-incidents.png" alt-text="Screenshot of a Microsoft Defender for IoT incident in Microsoft Sentinel.":::
95
95
96
-
> [!TIP]
97
-
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane.
96
+
1. Select the incident to open the incident details page, where you can find additional details. For example:
98
97
99
-
For more information on how to investigate incidents and use the investigation graph, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
100
-
101
-
### Investigate further with IoT device entities
98
+
- Understand the incident's business impact and physical location using details like the an IoT device's site, zone, sensor name, and device importance.
99
+
- Learn about recommended remediation steps by selecting an alert in the incident timeline and viewing the **Remediation steps** area.
102
100
103
-
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to open its device entity page. You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
101
+
For more information on how to investigate incidents and use the investigation graph, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
104
102
105
-
If you don't see your IoT device entity right away, select **View full details** under the entities listed to open the full incident page. In the **Entities** tab, select an IoT device to open its entity page. For example:
103
+
> [!TIP]
104
+
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane.
106
105
107
-
:::image type="content" source="media/iot-solution/incident-full-details-iot-device.png" alt-text="Screenshot of a full detail incident page.":::
106
+
### Investigate further with IoT device entities
108
107
109
-
The IoT device entity page provides contextual device information, with basic device details and device owner contact information. The device entity page can help prioritize remediation based on device importance and business impact, as per each alert's site, zone, and sensor. For example:
108
+
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to view more details in the entities pane on the right. You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
110
109
111
-
:::image type="content" source="media/iot-solution/iot-device-entity-page.png" alt-text="Screenshot of the IoT device entity page.":::
110
+
If you don't see your IoT deviceentity right away, select **View full details** under the entities listed to open the full incident page, and then check the **Entities** tab. Select an IoT device entity to view entity details on the right, including basic device details, owner contact information, and a timeline of events that occurred on the device.
112
111
113
-
For more information on entity pages, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md).
112
+
To drill down even further, select the IoT device entity link and open the device entity details page. For more information, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md).
114
113
115
114
You can also hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+13-1Lines changed: 13 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: What's new in Microsoft Defender for IoT
3
3
description: This article describes features available in Microsoft Defender for IoT, across both OT and Enterprise IoT networks, and both on-premises and in the Azure portal.
4
4
ms.topic: overview
5
-
ms.date: 01/03/2023
5
+
ms.date: 01/25/2023
6
6
---
7
7
8
8
# What's new in Microsoft Defender for IoT?
@@ -20,6 +20,18 @@ Features released earlier than nine months ago are described in the [What's new
20
20
|Service area |Updates |
21
21
|---------|---------|
22
22
|**OT networks**| - **Sensor version 22.3.4**: [Azure connectivity status shown on OT sensors](#azure-connectivity-status-shown-on-ot-sensors)<br>- **Sensor version 22.2.3**: [Update sensor software from the Azure portal](#update-sensor-software-from-the-azure-portal-public-preview)|
23
+
|**Cloud features**| - [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot)|
24
+
25
+
### New Microsoft Sentinel incident experience for Defender for IoT
26
+
27
+
Microsoft Sentinel's new [incident experience](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/the-new-incident-experience-is-here/ba-p/3717042) includes specific features for Defender for IoT customers. SOC analysts can now use the following incident enhancements when investigating OT/IoT-related incidents:
28
+
29
+
- Better understand an incident's business impact and physical location by viewing the related sites, zones, sensors, and device importance on an incident details page
30
+
- Review a timeline of affected devices and related device details directly on the incident page, instead of investigating on entity details pages for the related devices
31
+
- Review OT alert remediation steps directly on the incident details page
32
+
33
+
For more information, see [Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md) and [Navigate and investigate incidents in Microsoft Sentinel](/azure/sentinel/investigate-incidents).
34
+
23
35
24
36
### Update sensor software from the Azure portal (Public preview)
0 commit comments