You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/overview-eiot.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,19 +7,19 @@ ms.date: 12/27/2021
7
7
8
8
# Enterprise IoT network protection
9
9
10
-
The Microsoft Defender for IoT team is responsible for securing IoT and operational technology (OT) devices end-to-end whether they are connected to IT, OT, or dedicated IoT networks.
10
+
The Microsoft Defender for IoT team is responsible for securing IoT and operational technology (OT) devices end-to-end, whether they're connected to IT, OT, or dedicated IoT networks.
11
11
12
-
Enterprise IoT network protection extends agentless capabilities to go beyond operational environments and advance into enterprise environments. This protection provides coverage for the entire breadth of IoT devices in these environments, including corporate printers, cameras, and purpose-built or proprietary devices.
12
+
Enterprise IoT network protection extends agentless capabilities beyond operational environments and into enterprise environments. This protection provides coverage for the entire breadth of IoT devices in these environments, devices that include corporate printers, cameras, and purpose-built or proprietary devices.
13
13
14
14
The expansion of IoT into the enterprise network creates a unique opportunity to apply the asset-discovery capabilities of Microsoft 365 Defender.
15
15
16
16
:::image type="content" source="media/overview-eiot/defender-for-endpoint-architecture.png" alt-text="Diagram illustrating the integration of Microsoft Defender for Endpoint architecture with Microsoft Defender for IoT.":::
17
17
18
-
## Microsoft Defender for Endpoint integration
18
+
## Integration with Microsoft Defender for Endpoint
19
19
20
-
You can now integrate Defender for IoT with Defender for Endpoint. By doing so, you combine Defender for Endpoint device-discovery and agentless monitoring capabilities to secure enterprise IoT devices that are connected to an IT network. Two examples of such devices are Voice over Internet Protocol (VoIP) printers and smart TVs. As a result of this integration, you have a single, integrated solution that helps secure their entire IoT and OT infrastructure.
20
+
You can now integrate Defender for IoT with Defender for Endpoint. When you do so, you're combining Defender for Endpoint device-discovery and agentless monitoring capabilities to help secure enterprise IoT devices that are connected to an IT network. Two examples of such devices are Voice over Internet Protocol (VoIP) printers and smart TVs. The result of this integration is a single, integrated solution that helps secure your entire IoT and OT infrastructure.
21
21
22
-
With this integration, you can use Defender for IoT sensors as additional data sources, providing visibility into areas of your organizations network where Defender for Endpoint isn't deployed and employees need to access data remotely.
22
+
With this integration, you can use Defender for IoT sensors as additional data sources, which provides visibility into areas of your network where Defender for Endpoint is not deployed and employees need to access data remotely.
23
23
24
24
Defender for IoT sensors also provide visibility into IoT-to-IoT and IoT-to-internet communications.
25
25
@@ -29,21 +29,21 @@ To learn how to integrate Defender for Endpoint with your Defender for IoT solut
29
29
30
30
## Automatic discovery for IT, IoT, and OT
31
31
32
-
Use passive, agentless network monitoring to gain insight into the entire inventory of all your IT, IoT, and OT devices. The discovery process continuously identifies and classifies devices in your network, and resolves all device details. And it is performed with zero effect on the network.
32
+
Use passive, agentless network monitoring to gain insight into your entire inventory of IT, IoT, and OT devices. The discovery process continuously identifies and classifies devices in your network, and it resolves all device details, with zero effect on the network.
33
33
34
34
## Single pane of glass
35
35
36
-
A centralized user experience lets your security team visualize and secure all their IT, IoT, and OT devices, no matter where they're located.
36
+
A centralized user experience lets your security team visualize and secure all IT, IoT, and OT devices, no matter where they're located.
37
37
38
38
## The power of unified SIEM and XDR
39
39
40
-
Defender for IoT shares its high-resolution signal data with Microsoft Defender 365 and Microsoft Sentinel, which accelerates incident response and provides a bird's eye view across IT, OT, and IoT boundaries.
40
+
Defender for IoT shares its high-resolution signal data with Microsoft Defender 365 and Microsoft Sentinel. This sharing accelerates incident response and provides a bird's eye view across IT, OT, and IoT boundaries.
41
41
42
42
Defender for IoT shares rich telemetry data seamlessly with security information and event management (SIEM) and extended detection and response (XDR) platforms, such as Microsoft Sentinel and Microsoft 365 Defender. It also interoperates with other Security Operations Center (SOC) tools, such as Splunk, IBM QRadar, and ServiceNow. Azure Sentinel customers no longer need to switch consoles to put the story together.
43
43
44
44
## Easy deployment for a scalable solution
45
45
46
-
Defender for IoT helps ensure a quick, frictionless deployment of network sensor appliances (physical or virtual).
46
+
Defender for IoT helps ensure a quick, frictionless deployment of network sensor appliances, both physical and virtual.
47
47
48
48
If you experience any issues, we encourage you to contact our customer support team.
0 commit comments