You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md
+13-15Lines changed: 13 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,15 +9,14 @@ ms.topic: how-to
9
9
10
10
Attack vector reports show a chain of vulnerable devices in a specified attack path. Simulate an attack on a specific target in your network to discover vulnerable devices and analyze attack vectors in real time.
11
11
12
-
Attack vector reports can also help evaluate mitigation activities to ensure that you're taking all required steps to reduce the risk to your network. For example, use an attack vector report to understand whether a system upgrade would disrupt the attacker's path, or if an alternate attack path still remains.
12
+
Attack vector reports can also help evaluate mitigation activities to ensure that you're taking all required steps to reduce the risk to your network. For example, use an attack vector report to understand whether a system upgrade would disrupt the attacker's path, or if an alternate attack path still remains.
13
13
14
14
## Prerequisites
15
15
16
-
You must be an **Admin** or **Security Analyst** user to create an attack vector report.
16
+
You must be an **Admin** or **Security Analyst**[user](roles-on-premises.md) to create an attack vector report.
17
17
18
18
## Generate an attack vector simulation
19
19
20
-
21
20
Generate an attack vector simulation so that you can view the resulting report.
22
21
23
22
**To generate an attack vector simulation:**
@@ -31,28 +30,27 @@ Generate an attack vector simulation so that you can view the resulting report.
31
30
|**Maximum Vectors**| The maximum number of attack vectors you want to include in the simulation. |
32
31
|**Show in Device Map**| Select to show the attack vector as a group in the **Device map**. |
33
32
|**Show All Source Devices**| Select to consider all devices as a possible attack source. |
34
-
|**Attack Source**|Shown only, and required, if the **Show All Source Devices** option is toggled off. Select one or more devices to consider as the attack source.|
33
+
|**Attack Source**|Appears only, and required, if the **Show All Source Devices** option is toggled off. Select one or more devices to consider as the attack source.|
35
34
|**Show All Target Devices**| Select to consider all devices as possible attack targets.|
36
-
|**Attack Target**|Shown only, and required, if the **Show All Target Devices** option is toggled off. Select one or more devices to consider as the attack target.|
35
+
|**Attack Target**|Appears only, and required, if the **Show All Target Devices** option is toggled off. Select one or more devices to consider as the attack target.|
37
36
|**Exclude Devices**| Select one or more devices to exclude from the attack vector simulation.|
38
37
|**Exclude Subnets**| Select one or more subnets to exclude from the attack vector simulation.|
39
38
40
-
1. Select **Save**.
41
-
42
-
## Attack vector report contents
39
+
1. Select **Save**. Your simulation is added to the list, with the number of attack paths indicated in parenthesis.
40
+
1. Expand your simulation to view the list of possible attack vector, and select one to view more details on the right. For example:
41
+
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report." lightbox="media/how-to-generate-reports/sample-attack-vectors.png":::
43
42
44
-
You can use the report that is saved from the Attack vector page to review:
43
+
## View an attack vector in the Device Map
45
44
46
-
- network attack paths and insights
47
-
- a risk score
48
-
- source and target devices
49
-
- a graphical representation of attack vectors
45
+
The Device map provides, among [other things](how-to-work-with-the-sensor-device-map.md), a graphical representation of vulnerable devices detected in attack vector reports. To view an attack vector in the Device map:
50
46
51
-
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report.":::
47
+
1. In the **Attack vector** page, make sure your simulation has **Show in Device map** toggled on.
48
+
1. Select **Device map** from the side menu.
49
+
1. Select your simulation and then select an attack vector to visualize the devices in your map. For example:
50
+
:::image type="content" source="media/how-to-generate-reports/sample-device-map.png" alt-text="Screen shot of Device map." lightbox="media/how-to-generate-reports/sample-device-map.png":::
52
51
53
52
## Next steps
54
53
55
-
56
54
Continue creating other reports for more security data from your OT sensor. For more information, see:
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md
+13-19Lines changed: 13 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Create data mining queries and reports in Defender for IoT
3
3
description: Learn how to create granular reports about network devices.
4
-
ms.date: 02/02/2022
4
+
ms.date: 12/05/2022
5
5
ms.topic: how-to
6
6
---
7
7
@@ -13,11 +13,11 @@ Data mining information is saved and stored continuously, except for when a devi
13
13
14
14
## Prerequisites
15
15
16
-
You must be an **Admin** or **Security Analyst** user to access predefined data mining reports.
16
+
You must be an **Admin** or **Security Analyst**[user](roles-on-premises.md) to access predefined data mining reports.
17
17
18
18
## Create a report
19
19
20
-
Reports are dynamically updated each time you open them, meaning that the report will show information that's accurate for the date of viewing the report, rather than the date of creating the report.
20
+
Reports are dynamically updated each time you open them. The report shows information that's accurate for the date of viewing the report, rather than the date of creating the report.
21
21
22
22
**To generate a report**:
23
23
@@ -35,11 +35,11 @@ Reports are dynamically updated each time you open them, meaning that the report
35
35
36
36
1. Select **Save** to save your report and display results on the **Data Mining** page.
37
37
38
-
## Data mining report contents
38
+
## Custom data mining reports
39
39
40
-
You can use data mining queries for:
40
+
Customize your data mining queries, using the different parameters in the **Create new report** pane, to:
41
41
42
-
|Information| Description |
42
+
|Purpose| Description |
43
43
|---------|---------|
44
44
|**SOC incident response**| Generate a report in real time to help deal with immediate incident response. For example, Data Mining can generate a report for a list of devices that might require patching. |
45
45
|**Forensics**| Generate a report based on historical data for investigative reports. |
@@ -49,37 +49,33 @@ You can use data mining queries for:
49
49
50
50
## Predefined data mining reports
51
51
52
-
The following predefined reports are available in **Analyze** > **Data Mining**. These queries are generated in real time.
52
+
The following predefined reports are available in the **Data Mining** page. These queries are generated in real time.
53
53
54
54
| Report | Description |
55
55
|---------|---------|
56
56
|**Programming commands**| Devices that send industrial programming. |
57
57
|**Remote access**| Devices that communicate through remote session protocols. |
58
58
|**Internet activity**| Devices that are connected to the internet. |
59
59
|**CVEs**| A list of devices detected with known vulnerabilities, along with CVSSv2 risk scores. |
60
-
|**Excluded CVEs**| A list of all the CVEs that were manually excluded. Customize the CVE list manually if you want the VA reports and attack vectors to reflect your network more accurately by excluding or including particular CVEs and updating the CVSSv2 score accordingly. |
60
+
|**Excluded CVEs**| A list of all the CVEs that were manually excluded. Customize the CVE list manually if you want the VA reports and attack vectors to reflect your network more accurately. Customization includes excluding or including particular CVEs and updating the CVSSv2 score accordingly. |
61
61
|**Nonactive devices**| Devices that haven't communicated for the past seven days. |
62
62
|**Active devices**| Active network devices within the last 24 hours. |
63
63
64
64
## Generate reports in on-premises management console
65
65
66
-
The on-premises management console lets you generate reports for each sensor that's connected to it. For each sensor, you can generate a default report or a custom report configured on that sensor.
66
+
The on-premises management console lets you generate reports for each sensor that's connected to it. For each sensor, you can generate a default report or a custom report configured on that sensor. When you choose a sensor from the on-premises management console, all the custom reports configured on that sensor appear in the list of reports.
67
67
68
68
**To generate a report**:
69
69
70
-
1.On the left pane, select **Reports**. The **Reports** window appears.
70
+
1.Select **Reports** from the side menu.
71
71
72
72
2. From the **Sensors** drop-down list, select the sensor for which you want to generate the report.
73
73
74
-
:::image type="content" source="media/how-to-generate-reports/sensor-drop-down-list.png" alt-text="Screenshot of sensors view.":::
75
-
76
-
3. From the right drop-down list, select the report that you want to generate.
74
+
3. From the **Select Report** drop-down list, select the report that you want to generate.
77
75
78
76
4. To create a PDF of the report results, select :::image type="icon" source="media/how-to-generate-reports/pdf-report-icon.png" border="false":::.
79
77
80
-
## View reports in on-premises management console
81
-
82
-
When you choose a sensor from the on-premises management console, all the custom reports configured on that sensor appear in the list of reports.
78
+
## Default reports in on-premises management console
83
79
84
80
Reports are based on sensor data-mining queries that are performed, and include:
85
81
@@ -92,9 +88,7 @@ Reports are based on sensor data-mining queries that are performed, and include:
92
88
93
89
## Next steps
94
90
95
-
Reports can be viewed in the **Data Mining** page. You can refresh a report, edit report parameters, and export to a CSV file or PDF. You can also take a snapshot of a report.
96
-
97
-
For more information, see:
91
+
Continue creating other reports for more security data from your OT sensor. For more information, see:
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-trends-and-statistics-reports.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Create trends and statistics reports in Defender for IoT
3
3
description: Gain insight into network activity, statistics, and trends by using Defender for IoT Trends and Statistics widgets.
4
-
ms.date: 02/01/2022
4
+
ms.date: 12/05/2022
5
5
ms.topic: how-to
6
6
---
7
7
@@ -11,7 +11,7 @@ On your sensor console, create reports that provide insight into network trends
11
11
12
12
## Prerequisites
13
13
14
-
You must be an **Administrator** or **Security Analyst** user to create dashboards.
14
+
You must be an **Administrator** or **Security Analyst**[user](roles-on-premises.md) to create dashboards.
15
15
16
16
## Create dashboards
17
17
@@ -27,13 +27,13 @@ You can create many different types of dashboards, based on traffic, device stat
27
27
|---------|---------|
28
28
|**Dashboard name**| Enter a meaningful name for your dashboard. |
29
29
|**Dashboard widget type** (Optional) | Filter the widgets displayed by selecting a category or protocol from the menu. |
30
-
|**Widget**| Scroll down as needed and select the widget you want to add. Each widget has a short description and indicates whether it focuses on operations, security, or traffic. |
30
+
|**Widget**| Scroll down as needed and select the widget you want to add. Each widget has a short description and indicates what it focuses on. |
31
31
32
32
1. Select **Save** to start your new dashboard.
33
33
34
34
1. Your widget is added to the new dashboard. Use the toolbar at the top of page to continue modifying your dashboard.
35
35
36
-
By default, results display detections for over the last seven days. Select the **Filter**button at the top left of each widget to change this range.
36
+
By default, results display detections for the current day. Select the **Filter**icon at the top left of each widget to change this range.
37
37
38
38
> [!NOTE]
39
39
> The time shown in the widget is set according to the sensor machine's time.
@@ -59,7 +59,7 @@ The following table summarizes common use cases for dashboard widgets.
59
59
60
60
## Next steps
61
61
62
-
For more information, see:
62
+
Continue creating other reports for more security data from your OT sensor. For more information, see:
0 commit comments