Skip to content

Commit 7adaee2

Browse files
authored
Update overview-eiot.md
1 parent 3dd2ce6 commit 7adaee2

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/defender-for-iot/organizations/overview-eiot.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,19 +7,19 @@ ms.date: 12/27/2021
77

88
# Enterprise IoT network protection
99

10-
The Microsoft Defender for IoT team is responsible for securing IoT and operational technology (OT) devices end-to-end whether they are connected to IT, OT, or dedicated IoT networks.
10+
The Microsoft Defender for IoT team is responsible for securing IoT and operational technology (OT) devices end-to-end, whether they're connected to IT, OT, or dedicated IoT networks.
1111

12-
Enterprise IoT network protection extends agentless capabilities to go beyond operational environments and advance into enterprise environments. This protection provides coverage for the entire breadth of IoT devices in these environments, including corporate printers, cameras, and purpose-built or proprietary devices.
12+
Enterprise IoT network protection extends agentless capabilities beyond operational environments and into enterprise environments. This protection provides coverage for the entire breadth of IoT devices in these environments, devices that include corporate printers, cameras, and purpose-built or proprietary devices.
1313

1414
The expansion of IoT into the enterprise network creates a unique opportunity to apply the asset-discovery capabilities of Microsoft 365 Defender.
1515

1616
:::image type="content" source="media/overview-eiot/defender-for-endpoint-architecture.png" alt-text="Diagram illustrating the integration of Microsoft Defender for Endpoint architecture with Microsoft Defender for IoT.":::
1717

18-
## Microsoft Defender for Endpoint integration
18+
## Integration with Microsoft Defender for Endpoint
1919

20-
You can now integrate Defender for IoT with Defender for Endpoint. By doing so, you combine Defender for Endpoint device-discovery and agentless monitoring capabilities to secure enterprise IoT devices that are connected to an IT network. Two examples of such devices are Voice over Internet Protocol (VoIP) printers and smart TVs. As a result of this integration, you have a single, integrated solution that helps secure their entire IoT and OT infrastructure.
20+
You can now integrate Defender for IoT with Defender for Endpoint. When you do so, you're combining Defender for Endpoint device-discovery and agentless monitoring capabilities to help secure enterprise IoT devices that are connected to an IT network. Two examples of such devices are Voice over Internet Protocol (VoIP) printers and smart TVs. The result of this integration is a single, integrated solution that helps secure your entire IoT and OT infrastructure.
2121

22-
With this integration, you can use Defender for IoT sensors as additional data sources, providing visibility into areas of your organizations network where Defender for Endpoint isn't deployed and employees need to access data remotely.
22+
With this integration, you can use Defender for IoT sensors as additional data sources, which provides visibility into areas of your network where Defender for Endpoint is not deployed and employees need to access data remotely.
2323

2424
Defender for IoT sensors also provide visibility into IoT-to-IoT and IoT-to-internet communications.
2525

@@ -29,21 +29,21 @@ To learn how to integrate Defender for Endpoint with your Defender for IoT solut
2929

3030
## Automatic discovery for IT, IoT, and OT
3131

32-
Use passive, agentless network monitoring to gain insight into the entire inventory of all your IT, IoT, and OT devices. The discovery process continuously identifies and classifies devices in your network, and resolves all device details. And it is performed with zero effect on the network.
32+
Use passive, agentless network monitoring to gain insight into your entire inventory of IT, IoT, and OT devices. The discovery process continuously identifies and classifies devices in your network, and it resolves all device details, with zero effect on the network.
3333

3434
## Single pane of glass
3535

36-
A centralized user experience lets your security team visualize and secure all their IT, IoT, and OT devices, no matter where they're located.
36+
A centralized user experience lets your security team visualize and secure all IT, IoT, and OT devices, no matter where they're located.
3737

3838
## The power of unified SIEM and XDR
3939

40-
Defender for IoT shares its high-resolution signal data with Microsoft Defender 365 and Microsoft Sentinel, which accelerates incident response and provides a bird's eye view across IT, OT, and IoT boundaries.
40+
Defender for IoT shares its high-resolution signal data with Microsoft Defender 365 and Microsoft Sentinel. This sharing accelerates incident response and provides a bird's eye view across IT, OT, and IoT boundaries.
4141

4242
Defender for IoT shares rich telemetry data seamlessly with security information and event management (SIEM) and extended detection and response (XDR) platforms, such as Microsoft Sentinel and Microsoft 365 Defender. It also interoperates with other Security Operations Center (SOC) tools, such as Splunk, IBM QRadar, and ServiceNow. Azure Sentinel customers no longer need to switch consoles to put the story together.
4343

4444
## Easy deployment for a scalable solution
4545

46-
Defender for IoT helps ensure a quick, frictionless deployment of network sensor appliances (physical or virtual).
46+
Defender for IoT helps ensure a quick, frictionless deployment of network sensor appliances, both physical and virtual.
4747

4848
If you experience any issues, we encourage you to contact our customer support team.
4949

0 commit comments

Comments
 (0)