Skip to content

Commit 3bda202

Browse files
Merge pull request #249483 from batamig/cvss-v3
D4IoT CVSS v3
2 parents 4489fd7 + e2c378b commit 3bda202

File tree

3 files changed

+23
-4
lines changed

3 files changed

+23
-4
lines changed

articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create data mining queries and reports in Defender for IoT
33
description: Learn how to create granular reports about network devices.
4-
ms.date: 12/05/2022
4+
ms.date: 08/28/2023
55
ms.topic: how-to
66
---
77

@@ -32,7 +32,7 @@ The following out-of-the-box reports are listed in the **Recommended** area, rea
3232
| **Excluded CVEs** | Lists all detected devices that have CVEs that were manually excluded from the **CVEs** report. |
3333
| **Active Devices (Last 24 Hours)** | Lists all detective devices that have had active traffic within the last 24 hours. |
3434
| **Remote Access** | Lists all detected devices that communicate through remote session protocols. |
35-
| **CVEs** | Lists all detected devices with known vulnerabilities, along with CVSSv2 risk scores. <br> <br> Select **Edit** to delete and exclude specific CVEs from the report. <br><br> **Tip**: Delete CVEs to exclude them from the list to have your attack vector reports to reflect your network more accurately. |
35+
| **CVEs** | Lists all detected devices with known vulnerabilities, along with CVSS risk scores. <br> <br> Select **Edit** to delete and exclude specific CVEs from the report. <br><br> **Tip**: Delete CVEs to exclude them from the list to have your attack vector reports to reflect your network more accurately. |
3636
| **Nonactive Devices (Last 7 Days)** | Lists all detected devices that haven't communicated for the past seven days. |
3737

3838
Select a report to view today’s data. Use the :::image type="icon" source="media/how-to-generate-reports/refresh-icon.png" border="false"::: **Refresh**, :::image type="icon" source="media/how-to-generate-reports/expand-all-icon.png" border="false"::: **Expand all**, and :::image type="icon" source="media/how-to-generate-reports/collapse-all-icon.png" border="false"::: **Collapse all** options to update and change your report views.

articles/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Maintain threat intelligence packages on OT network sensors - Microsoft Defender for IoT
33
description: Learn how to maintain threat intelligence packages on OT network sensors.
4-
ms.date: 02/09/2023
4+
ms.date: 08/28/2023
55
ms.topic: how-to
66
---
77

@@ -14,6 +14,8 @@ Microsoft Defender for IoT regularly delivers threat intelligence package update
1414

1515
Threat intelligence packages contain signatures, such as malware signatures, CVEs, and other security content.
1616

17+
CVE scores shown are aligned with the [National Vulnerability Database (NVD)](https://nvd.nist.gov/vuln-metrics/cvss), and CVSS v3 scores are shown if they're relevant. If there's no CVSS v3 score relevant, the CVSS v2 score is shown instead.
18+
1719
> [!TIP]
1820
> We recommend ensuring that your OT network sensors always have the latest threat intelligence package installed so that you always have the full context of a threat before an environment is affected, and increased relevancy, accuracy, and actionable recommendations.
1921
>

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What's new in Microsoft Defender for IoT
33
description: This article describes features available in Microsoft Defender for IoT, across both OT and Enterprise IoT networks, and both on-premises and in the Azure portal.
44
ms.topic: whats-new
5-
ms.date: 08/09/2023
5+
ms.date: 08/28/2023
66
ms.custom: enterprise-iot
77
---
88

@@ -16,6 +16,23 @@ Features released earlier than nine months ago are described in the [What's new
1616
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1717
>
1818
19+
## August 2023
20+
21+
|Service area |Updates |
22+
|---------|---------|
23+
| **OT networks** | [Defender for IoT's CVE's align to CVSS v3](#defender-for-iots-cves-align-to-cvss-v3) |
24+
25+
### Defender for IoT's CVE's align to CVSS v3
26+
27+
CVE scores shown in the OT sensor and on the Azure portal are aligned with the [National Vulnerability Database (NVD)](https://nvd.nist.gov/vuln-metrics/cvss), and starting with Defender for IoT's August threat intelligence update, CVSS v3 scores are shown if they're relevant. If there's no CVSS v3 score relevant, the CVSS v2 score is shown instead.
28+
29+
View CVE data from the Azure portal, either on a Defender for IoT's device detail's **Vulnerabilities** tab, with resources available with the Microsoft Sentinel solution, or in a data mining query on your OT sensor. For more information, see:
30+
31+
- [Maintain threat intelligence packages on OT network sensors](how-to-work-with-threat-intelligence-packages.md)
32+
- [View full device details](how-to-manage-device-inventory-for-organizations.md#view-full-device-details)
33+
- [Tutorial: Investigate and detect threats for IoT devices with Microsoft Sentinel](iot-advanced-threat-monitoring.md)
34+
- [Create data mining queries](how-to-create-data-mining-queries.md)
35+
1936
## July 2023
2037

2138
|Service area |Updates |

0 commit comments

Comments
 (0)