Skip to content

Commit 15068db

Browse files
committed
sentinel incident page update
1 parent 731bc4c commit 15068db

File tree

3 files changed

+23
-12
lines changed

3 files changed

+23
-12
lines changed

articles/defender-for-iot/organizations/iot-advanced-threat-monitoring.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -93,24 +93,23 @@ After you’ve [configured your Defender for IoT data to trigger new incidents i
9393

9494
:::image type="content" source="media/iot-solution/investigate-iot-incidents.png" alt-text="Screenshot of a Microsoft Defender for IoT incident in Microsoft Sentinel.":::
9595

96-
> [!TIP]
97-
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane.
96+
1. Select the incident to open the incident details page, where you can find additional details. For example:
9897

99-
For more information on how to investigate incidents and use the investigation graph, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
100-
101-
### Investigate further with IoT device entities
98+
- Understand the incident's business impact and physical location using details like the an IoT device's site, zone, sensor name, and device importance.
99+
- Learn about recommended remediation steps by selecting an alert in the incident timeline and viewing the **Remediation steps** area.
102100

103-
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to open its device entity page. You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
101+
For more information on how to investigate incidents and use the investigation graph, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
104102

105-
If you don't see your IoT device entity right away, select **View full details** under the entities listed to open the full incident page. In the **Entities** tab, select an IoT device to open its entity page. For example:
103+
> [!TIP]
104+
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane.
106105
107-
:::image type="content" source="media/iot-solution/incident-full-details-iot-device.png" alt-text="Screenshot of a full detail incident page.":::
106+
### Investigate further with IoT device entities
108107

109-
The IoT device entity page provides contextual device information, with basic device details and device owner contact information. The device entity page can help prioritize remediation based on device importance and business impact, as per each alert's site, zone, and sensor. For example:
108+
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to view more details in the entities pane on the right. You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
110109

111-
:::image type="content" source="media/iot-solution/iot-device-entity-page.png" alt-text="Screenshot of the IoT device entity page.":::
110+
If you don't see your IoT device entity right away, select **View full details** under the entities listed to open the full incident page, and then check the **Entities** tab. Select an IoT device entity to view entity details on the right, including basic device details, owner contact information, and a timeline of events that occurred on the device.
112111

113-
For more information on entity pages, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md).
112+
To drill down even further, select the IoT device entity link and open the device entity details page. For more information, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md).
114113

115114
You can also hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
116115

227 KB
Loading

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What's new in Microsoft Defender for IoT
33
description: This article describes features available in Microsoft Defender for IoT, across both OT and Enterprise IoT networks, and both on-premises and in the Azure portal.
44
ms.topic: overview
5-
ms.date: 01/03/2023
5+
ms.date: 01/25/2023
66
---
77

88
# What's new in Microsoft Defender for IoT?
@@ -20,6 +20,18 @@ Features released earlier than nine months ago are described in the [What's new
2020
|Service area |Updates |
2121
|---------|---------|
2222
|**OT networks** | - **Sensor version 22.3.4**: [Azure connectivity status shown on OT sensors](#azure-connectivity-status-shown-on-ot-sensors)<br>- **Sensor version 22.2.3**: [Update sensor software from the Azure portal](#update-sensor-software-from-the-azure-portal-public-preview) |
23+
| **Cloud features** | - [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot) |
24+
25+
### New Microsoft Sentinel incident experience for Defender for IoT
26+
27+
Microsoft Sentinel's new [incident experience](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/the-new-incident-experience-is-here/ba-p/3717042) includes specific features for Defender for IoT customers. SOC analysts can now use the following incident enhancements when investigating OT/IoT-related incidents:
28+
29+
- Better understand an incident's business impact and physical location by viewing the related sites, zones, sensors, and device importance on an incident details page
30+
- Review a timeline of affected devices and related device details directly on the incident page, instead of investigating on entity details pages for the related devices
31+
- Review OT alert remediation steps directly on the incident details page
32+
33+
For more information, see [Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md) and [Navigate and investigate incidents in Microsoft Sentinel](/azure/sentinel/investigate-incidents).
34+
2335

2436
### Update sensor software from the Azure portal (Public preview)
2537

0 commit comments

Comments
 (0)