You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/respond-ot-alert.md
+24-25Lines changed: 24 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,14 +19,14 @@ Before you start, make sure that you have:
19
19
20
20
- An Azure subscription. If you need to, [sign up for a free account](https://azure.microsoft.com/free/).
21
21
22
-
-An [OT network sensor](onboard-sensors.md) onboarded to Defender for IoT.
22
+
-A cloud-connected [OT network sensor](onboard-sensors.md) onboarded to Defender for IoT, with alerts streaming into the Azure portal.
23
23
24
24
- To investigate an alert from a Microsoft Sentinel incident, make sure that you've completed the following tutorials:
25
25
26
26
-[Tutorial: Connect Microsoft Defender for IoT with Microsoft Sentinel](iot-solution.md)
27
27
-[Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md)
28
28
29
-
- An alert details page open, either from the Defender for IoT **Alerts** page, a Defender for IoT [device details page](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory), or Microsoft Sentinel.
29
+
- An alert details page open, accessed either from the Defender for IoT **Alerts** page in the [Azure portal](how-to-manage-cloud-alerts.md), a Defender for IoT [device details page](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory), or a Microsoft Sentinel[incident](/azure/sentinel/investigate-incidents).
30
30
31
31
## Investigate an alert from the Azure portal
32
32
@@ -40,11 +40,11 @@ Then, check the alert details page for the following details to aid in your inve
40
40
41
41
-**Source and destination device details**. Source and destination devices are listed in **Alert details** tab, and also in the **Entities** area below, as Microsoft Sentinel *entities*, with their own [entity pages](iot-advanced-threat-monitoring.md#investigate-further-with-iot-device-entities). In the **Entities** area, you'll use the links in the **Name** column to open the relevant device details pages for [further investigation](#investigate-related-alerts-on-the-azure-portal).
42
42
43
-
-**Site and zone**. These values help you understand the geographic and network location of the alert and if there are areas of the network that are now more vulnerable to attack.
43
+
-**Site and/or zone**. These values help you understand the geographic and network location of the alert and if there are areas of the network that are now more vulnerable to attack.
44
44
45
45
-**MITRE ATT&CK** tactics and techniques. Scroll down in the left pane to view all MITRE ATT&CK details. In addition to descriptions of the tactics and techniques, select the links to the MITRE ATT&CK site to learn more about each one.
46
46
47
-
-**Download PCAP**. At the top of the page, select **Download PCAP** to download the raw traffic files for the selected alert. For more information, see [Access alert PCAP data](how-to-manage-cloud-alerts.md#access-alert-pcap-data).
47
+
-**Download PCAP**. At the top of the page, select **Download PCAP** to [download the raw traffic files](how-to-manage-cloud-alerts.md#access-alert-pcap-data) for the selected alert.
48
48
49
49
## Investigate related alerts on the Azure portal
50
50
@@ -56,48 +56,49 @@ For example, a device that attempted to connect to a malicious IP, together with
56
56
57
57
1. On the **Alerts** page, select an alert to view details on the right.
58
58
59
-
1. Locate the device links in the **Entities** area, either in alert details pane on the right or in the alert details page. Select an entity link to open the related device details page, for both a source and destination device.
59
+
1. Locate the device links in the **Entities** area, either in alert details pane on the right or by drilling down to the alert details page. Select an entity link to open the related device details page, for both a source and destination device.<!--no entity links from alert-->
60
60
61
-
I would just add:
62
-
including device links in the Entities area in the Alert full details page.
63
-
64
-
1. On the device details page, select the **Alerts** tab to view all alerts for that device.
61
+
1. Select the **Device inventory** page and locate each device that was listed as a device entity for the alert. Select **View full details** to view the alert details page, and then select the **Alerts** tab to view all alerts for that device.
65
62
66
63
For example:
67
64
68
65
:::image type="content" source="media/iot-solution/device-details-alerts.png" alt-text="Screenshot of the Alerts tab on a device details page.":::
69
66
70
-
## Investigate alert details on the sensor
67
+
## Investigate alert details on the OT sensor
68
+
69
+
The OT sensor that triggered the alert will have more details to help your investigation.
70
+
71
+
**To continue your investigation on the OT sensor**:
71
72
72
-
Continue your investigation on the OT network sensor that generated the alert. Find the sensor name on the alert details page, and sign in to that sensor's console.
73
+
1. Sign into your OT sensor as a **Viewer** or **Security Analyst** user.
73
74
74
-
On the sensor's **Alerts** page, find and select the alert you're investigating, and then select **View more details** to open the sensor's alert details page.
75
+
1. Select the **Alerts** pageand find then alert you're investigating. Select **View more details to open the OT sensor's alert details page. For example:
75
76
76
-
:::image type="content" source="media/iot-solution/alert-on-sensor.png" alt-text="Screenshot of the alert on the sensor console.":::
77
+
:::image type="content" source="media/iot-solution/alert-on-sensor.png" alt-text="Screenshot of the alert on the sensor console.":::
77
78
78
79
On the sensor's alert details page:
79
80
80
-
- Select the **Map view** tab to view the alert inside the sensor's device map. For more information, see [Investigate sensor detections in the Device map](how-to-work-with-the-sensor-device-map.md).
81
+
- Select the **Map view** tab to view the alert inside the OT sensor's [device map](how-to-work-with-the-sensor-device-map.md), including any connected devices.
81
82
82
-
- Select the **Event timeline** tab to view the alert's full event timeline, including other related activity also detected by the sensor. For more information, see [Track sensor activity](how-to-track-sensor-activity.md).
83
+
- Select the **Event timeline** tab to view the alert's [full event timeline](how-to-track-sensor-activity.md), including other related activity also detected by the OT sensor.
83
84
84
85
- Select **Export PDF** to download a PDF summary of the alert details.
85
86
86
87
## Take remediation action
87
88
88
89
The timing for when you take remediation actions may depend on the severity of the alert. For example, for high severity alerts, you might want to take action even before investigating, such as if you need to immediately quarantine an area of your network.
89
90
90
-
For lower severity alerts, or for operational alerts, you might want to investigate before taking action.
91
+
For lower severity alerts, or for operational alerts, you might want to fully investigate before taking action.
91
92
92
93
**To remediate an alert**, use the following Defender for IoT resources:
93
94
94
-
-**On the alert details page**, select the **Take action** tab to view details about recommended steps to mitigate the risk.
95
+
-**On an alert details page** on either the Azure portal or the OT sensor, select the **Take action** tab to view details about recommended steps to mitigate the risk.
95
96
96
-
-**On the device details page** for both the [source and destination devices](#investigate-an-alert-from-the-azure-portal):
97
+
-**On a device details page** in the Azure portal, for both the [source and destination devices](#investigate-an-alert-from-the-azure-portal):
97
98
98
99
- Select the **Vulnerabilities** tab and check for detected vulnerabilities on each device.
99
100
100
-
- Select the **Recommendations** tab and check for current security recommendations for each device.
101
+
- Select the **Recommendations** tab and check for current security [recommendations](recommendations.md) for each device.
101
102
102
103
Defender for IoT vulnerability data and security recommendations can provide simple actions you can take to mitigate the risks, such as updating firmware or applying a patch. Other actions may take more planning.
103
104
@@ -112,20 +113,18 @@ Triage alerts on a regular basis to prevent alert fatigue in your network and en
112
113
113
114
**To triage alerts**:
114
115
115
-
1. In Defender for IoT in the Azure portal, go to the **Alerts** page.
116
-
117
-
By default, alerts are sorted by the **Last detection** column, from most recent to oldest alert, so that you can first see the latest alerts in your network.
116
+
1. In Defender for IoT in the Azure portal, go to the **Alerts** page. By default, alerts are sorted by the **Last detection** column, from most recent to oldest alert, so that you can first see the latest alerts in your network.
118
117
119
118
1. Use other filters, such as **Sensor** or **Severity** to find specific alerts.
120
119
121
-
1. Check the alert details and investigate as needed before you take any alert action.
122
-
123
-
1. When you're ready, take action on an alert details page for a specific alert, or on the **Alerts** page for bulk actions.
120
+
1. Check the alert details and investigate as needed before you take any alert action. When you're ready, take action on an alert details page for a specific alert, or on the **Alerts** page for bulk actions.
124
121
125
122
For example, update alert status or severity, or [learn](how-to-manage-the-alert-event.md#learn-and-unlearn-alert-traffic) an alert to authorize the detected traffic. *Learned* alerts are not triggered again if the same exact traffic is detected again.
126
123
127
124
:::image type="content" source="media/iot-solution/learn-alert.png" alt-text="Screenshot of a Learn button on the alert details page.":::
128
125
126
+
For high severity alerts, you may want to take action immediately.
0 commit comments