|
1 | 1 | ---
|
2 |
| -title: Create risk assessment reports |
3 |
| -description: Gain insight into network risks detected by individual sensors or an aggregate view of risks detected by all sensors. |
| 2 | +title: Create risk assessment reports on an OT sensor - Microsoft Defender for IoT |
| 3 | +description: Gain insight into network risks detected by individual Defender for IoT OT sensors or an aggregate view of risks detected by all OT sensors. |
4 | 4 | ms.date: 02/03/2022
|
5 | 5 | ms.topic: how-to
|
6 | 6 | ---
|
7 | 7 |
|
8 | 8 | # Risk assessment reporting
|
9 | 9 |
|
10 |
| -## About risk assessment reports |
| 10 | +Risk assessment reports, generated by Defender for IoT OT network sensors and on-premises management consoles, provide details about security scores, vulnerabilities, and operational issues on detected devices as well as risks coming from imported firewall rules. |
11 | 11 |
|
12 |
| -Risk assessment reports provide: |
| 12 | +Take action based on the recommendations provided in the risk assesment reports to improve your overall network security score. For example, you might install the latest security or firmware updates, or investigate any PLCs that are currently in unsecure states. |
13 | 13 |
|
14 |
| -- An overall security score for the devices detected by organizational sensors. |
| 14 | +Each sensor has access to reports generated for that sensor, while the on-premises management console allows you view reports from all connected sensors from the same page. The on-premises management console also supports customizations for the logo that appears in your report. |
15 | 15 |
|
16 |
| -- A security score for each network device detected by an individual sensor. |
| 16 | +## Prerequisites |
17 | 17 |
|
18 |
| -- A breakdown of the number of vulnerable devices, devices that need improvement and secure devices. |
| 18 | +- You must be an **Admin** user to import firewall rules to an OT sensor or add backup and anti-virus server addresses. <!--need to check this-->. |
19 | 19 |
|
20 |
| -- Data about firewall rule risk. Defender for IoT [imports firewall rules](how-to-set-up-your-network.md#import-firewall-rules) from supported vendors and analyzes them. The Risk Assessment report highlights if a rule is not secure, or if there's a mismatch between the rule and the monitored network. For example: |
| 20 | +- You must be an **Admin** or **Security Analyst** user to create or view risk assesment reports on the OT sensor or on-premises management console. |
21 | 21 |
|
22 |
| - :::image type="content" source="media/how-to-create-risk-assessment-reports/weak-firewall-rule.png" alt-text="Screenshot of a weak firewall rule that appears in a risk assessment report." lightbox="media/how-to-create-risk-assessment-reports/weak-firewall-rule.png"::: |
| 22 | +## Import firewall rules to a OT sensor |
23 | 23 |
|
24 |
| -- Insight into security and operational issues: |
| 24 | +<!--put the firewall rules procedure here--> |
25 | 25 |
|
26 |
| - - Configuration issues |
| 26 | +## Add backup and anti-virus server addresses to your sensor |
27 | 27 |
|
28 |
| - - Device vulnerability prioritized by security level |
| 28 | +Backup and anti-virus servers are not defined on your sensor by default. We recommend defining these addresses on your sensor to keep your network risk assesment low. |
29 | 29 |
|
30 |
| - - Network security issues |
| 30 | +**To add backup and anti-virus server addresses**: |
31 | 31 |
|
32 |
| - - Network operational issues |
| 32 | +1. Sign into your OT sensor and select **System Settings** > **System Properties** > **Vulnerability Assessment**. |
| 33 | +1. Add your backup and anti-virus server addresses to the **backup_servers** and **AV_addresses** fields, respectively. Use commas to separate multiple addresses. |
| 34 | +1. Select **Save** to save your changes. |
33 | 35 |
|
34 |
| - - Connections to ICS networks |
| 36 | +## Create and view risk assessment reports for a specific sensor |
35 | 37 |
|
36 |
| - - Internet connections |
| 38 | +Use an individual OT sensor to view reports generated for that sensor only. |
37 | 39 |
|
38 |
| - - Industrial malware indicators |
| 40 | +**To generate a report**: |
39 | 41 |
|
40 |
| - - Protocol issues |
| 42 | +1. Sign in to the sensor console and select **Risk assesment** > **Generate report**. The report is generated and appears in the **Reports list**, along with the timestamp and report size. |
41 | 43 |
|
42 |
| - - Attack vectors |
| 44 | + Reports are automatically named `risk-assesment-report-<integer>`, where the `<integer>` is incremented automatically. |
43 | 45 |
|
44 |
| -### Risk mitigation |
| 46 | +1. Select the report name to download it and open it in your browser. |
45 | 47 |
|
46 |
| -Reports provide recommendations to help you improve your security score. For example: |
47 |
| -- Install the latest security updates. |
48 |
| -- Upgrade firmware to the latest version. |
49 |
| -- Investigate PLCs in unsecure states. |
| 48 | +## Create and view risk assesment reports for multiple sensors |
50 | 49 |
|
51 |
| -## About security scores |
| 50 | +Use an on-premises management console to create and view risk assesment reports for all connected sensors, or to customize your report logo. |
52 | 51 |
|
53 |
| -Overall network security score is generated in each report. The score represents the percentage of 100 percent security. For example, a score of 30% would indicate that your network 30% secure. |
| 52 | +**To generate a report**: |
54 | 53 |
|
55 |
| -Risk Assessment scores are based on information learned from packet inspection, behavioral modeling engines, and a SCADA-specific state machine design. |
| 54 | +1. Sign in to your on-premises management console and select **Risk assesment**. |
56 | 55 |
|
57 |
| -**Secure Devices** are devices with a security score above 90%. |
| 56 | +1. To customize the logo that appears on your report, select **Import logo**. Browse to and select the logo file you want to use. |
58 | 57 |
|
59 |
| -**Devices Needing Improvement**: Devices with a security score between 70 percent and 89%. |
| 58 | +1. From the **Select Sensor** drop-down menu, select the sensor for which you want to generate the report, and then select **Generate Report**. |
60 | 59 |
|
61 |
| -**Vulnerable Devices** are devices with a security score below 70%. |
| 60 | + A new report is listed in the **Archived Reports** area, listed by the time and date it was created, and showing the security score and report size. |
| 61 | + |
| 62 | +1. Select **Download** to download a report and open it in your browser. |
62 | 63 |
|
63 |
| -### About backup and anti-virus servers |
| 64 | +## Risk assesment report contents |
64 | 65 |
|
65 |
| -The risk assessment score may be negatively impacted if you don't define backup and anti-virus server addresses in your sensor. Adding these addresses improves your score. By default these addresses aren't defined. |
66 |
| -The Risk Assessment report cover page will indicate if backup servers and anti-virus servers are not defined. |
| 66 | +Risk assessment reports include the following details: |
67 | 67 |
|
68 |
| -**To add servers:** |
| 68 | +- An overall security score for all detected devices, and a security score for each individual device. |
69 | 69 |
|
70 |
| -1. Select **System Settings** and then select **System Properties**. |
71 |
| -1. Select **Vulnerability Assessment** and add the addresses to **backup_servers** and **AV_addresses** fields. Use commas to separate multiple addresses. separated by commas. |
72 |
| -1. Select **Save**. |
| 70 | + Security scores are based on data learned from packet inspection, behavioral modeling engines, and a SCADA-specific state machine design, and are categorized as follows: |
73 | 71 |
|
74 |
| -## Create risk assessment reports |
| 72 | + - **Secure Devices** are devices with a security score above 90%. |
75 | 73 |
|
76 |
| -Create a risk assessment report based on detections made by the sensor you are logged into. The report name is automatically generated as risk-assessment-report-1.pdf. The number is updated for each new report you create. The time and day of creation are displayed. |
| 74 | + - **Devices Needing Improvement**: Devices with a security score between 70 percent and 89%. |
77 | 75 |
|
78 |
| -**To create a report:** |
| 76 | + - **Vulnerable Devices** are devices with a security score below 70%. |
79 | 77 |
|
80 |
| -1. Sign in to the sensor console. |
81 |
| -1. Select **Risk assessment** on the side menu. |
82 |
| -1. Select **Generate report**. The report appears in the Saved Reports section. |
83 |
| -1. Select the report from the Saved Reports section to download it. |
| 78 | +- Insight into any of the following security and operational issues: <!--im not really even sure how much this list is helpful. it doesn't really tell me much.--> |
84 | 79 |
|
85 |
| -**To import a company logo:** |
| 80 | + :::row::: |
| 81 | + :::column span=""::: |
| 82 | + - Configuration issues |
| 83 | + - Device vulnerability, prioritzed by security level |
| 84 | + - Network security issues |
| 85 | + - Network operational issues |
| 86 | + :::column-end::: |
| 87 | + :::column span=""::: |
| 88 | + - Connections to ICS networks |
| 89 | + - Internet connections |
| 90 | + - Industrial malware indicators |
| 91 | + - Protocol issues |
| 92 | + - Attack vectors |
| 93 | + :::column-end::: |
| 94 | + :::row-end::: |
86 | 95 |
|
87 |
| -1. Select **Import logo**. |
88 |
| -1. Choose a logo to add to the header of your Risk assessment reports. |
| 96 | +If you've imported firewall data to your sensor, the risk assessment reports also include data about firewall rule risk, based on the imported rules. The Risk Assessment report highlights if a rule is not secure, or if there's a mismatch between the rule and the monitored network. |
89 | 97 |
|
90 |
| -### Create an on-premises management console risk assessment report |
91 |
| - |
92 |
| -Create a risk assessment report based on detections made by sensors that are managed by your on-premises management console. |
93 |
| - |
94 |
| -**To create a report:** |
95 |
| - |
96 |
| -1. Select **Risk Assessment** on the side menu. |
97 |
| -2. Select a sensor from the **Select sensor** drop-down list. |
98 |
| -3. Select **Generate Report**. |
99 |
| -4. Select **Download** from the **Archived Reports** section. |
100 |
| - |
101 |
| -**To import a company logo:** |
102 |
| - |
103 |
| -1. Select **Import logo**. |
104 |
| -1. Choose a logo to add to the header of your Risk assessment reports. |
| 98 | +<!--i don't really think that this screenshot is helpful out of context. we don't show screenshots for any other part of the report.--> |
105 | 99 |
|
106 | 100 | ## Next steps
|
107 | 101 |
|
|
0 commit comments