You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/concept-sentinel-integration.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,6 +40,12 @@ The following table shows how both the OT team, on the Defender for IoT side, an
40
40
|SOC teams respond with OT playbooks and notebooks |**OT incident response**| OT teams either suppress the alert or learn it for next time, as needed |
41
41
|After the threat is mitigated, SOC teams close the incident |**OT incident closure**| After the threat is mitigated, OT teams close the alert |
42
42
43
+
### Alert status synchronizations
44
+
45
+
Alert status changes are synchronized from Microsoft Sentinel to Defender for IoT only, and not from Defender for IoT to Microsoft Sentinel.
46
+
47
+
If you integrate Defender for IoT with Microsoft Sentinel, we recommend that you manage your alert statuses together with the related incidents in Microsoft Sentinel.
48
+
43
49
## Microsoft Sentinel incidents for Defender for IoT
44
50
45
51
After you've configured the Defender for IoT data connector and have IoT/OT alert data streaming to Microsoft Sentinel, use one of the following methods to create incidents based on those alerts:
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/iot-advanced-threat-monitoring.md
+13-3Lines changed: 13 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ The **Microsoft Defender for IoT** solution includes a more detailed set of out-
77
77
78
78
## Investigate Defender for IoT incidents
79
79
80
-
After you’ve [configured your Defender for IoT data to trigger new incidents in Microsoft Sentinel](#detect-threats-out-of-the-box-with-defender-for-iot-data), start investigating those incidents in Microsoft Sentinel as you would other incidents.
80
+
After you’ve [configured your Defender for IoT data to trigger new incidents in Microsoft Sentinel](#detect-threats-out-of-the-box-with-defender-for-iot-data), start investigating those incidents in Microsoft Sentinel [as you would other incidents](/sentinel/investigate-cases).
81
81
82
82
**To investigate Microsoft Defender for IoT incidents**:
83
83
@@ -100,7 +100,9 @@ For more information on how to investigate incidents and use the investigation g
100
100
101
101
### Investigate further with IoT device entities
102
102
103
-
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to open its device entity page. You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
103
+
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to open its [device entity page]](/azure/sentinel/entity-pages).
104
+
105
+
You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
104
106
105
107
If you don't see your IoT device entity right away, select **View full details** under the entities listed to open the full incident page. In the **Entities** tab, select an IoT device to open its entity page. For example:
106
108
@@ -118,6 +120,14 @@ You can also hunt for vulnerable devices on the Microsoft Sentinel **Entity beha
118
120
119
121
For more information on how to investigate incidents and use the investigation graph, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
120
122
123
+
### Investigate the alert in Defender for IoT
124
+
125
+
To open an alert in Defender for IoT for further investigation, go to your incident details page and select **Investigate in Microsoft Defender for IoT**. For example:
126
+
127
+
:::image type="content" source="media/iot-solution/investigate-in-iot.png" alt-text="Screenshot of the Investigate in Microsoft Defender for IoT option.":::
128
+
129
+
The Defender for IoT alert details page opens for the related alert. For more information, see [Investigate and respond to an OT network alert](respond-ot-alert.md).
130
+
121
131
## Visualize and monitor Defender for IoT data
122
132
123
133
To visualize and monitor your Defender for IoT data, use the workbooks deployed to your Microsoft Sentinel workspace as part of the [Microsoft Defender for IoT](#install-the-defender-for-iot-solution) solution.
@@ -139,7 +149,7 @@ The following table describes the workbooks included in the **Microsoft Defender
139
149
140
150
## Automate response to Defender for IoT alerts
141
151
142
-
Playbooks are collections of automated remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help automate and orchestrate your threat response; it can be run manually or set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an automation rule, respectively.
152
+
[Playbooks](/azure/sentinel/tutorial-respond-threats-playbook) are collections of automated remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help automate and orchestrate your threat response; it can be run manually or set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an automation rule, respectively.
143
153
144
154
The [Microsoft Defender for IoT](#install-the-defender-for-iot-solution) solution includes out-of-the-box playbooks that provide the following functionality:
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/iot-solution.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Before you start, make sure you have the following requirements on your workspac
36
36
37
37
## Connect your data from Defender for IoT to Microsoft Sentinel
38
38
39
-
Start by enabling the **Defender for IoT** data connector to stream all your Defender for IoT events into Microsoft Sentinel.
39
+
Start by enabling the [Defender for IoT data connector](/azure/sentinel/data-connectors-reference.md#microsoft-defender-for-iot) to stream all your Defender for IoT events into Microsoft Sentinel.
40
40
41
41
**To enable the Defender for IoT data connector**:
42
42
@@ -156,15 +156,11 @@ The following types of updates generate new records in the **SecurityAlert** tab
156
156
- A new device is added to an existing alert
157
157
- The device properties for an alert are updated
158
158
159
-
## Next steps
160
159
161
-
[Install the **Microsoft Defender for IoT** solution](iot-advanced-threat-monitoring.md) to your Microsoft Sentinel workspace.
162
160
163
-
The **Microsoft Defender for IoT** solution is a set of bundled, out-of-the-box content that's configured specifically for Defender for IoT data, and includes analytics rules, workbooks, and playbooks.
161
+
## Next steps
164
162
165
-
For more information, see:
163
+
The [Microsoft Defender for IoT](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-unifiedmicrosoftsocforot?tab=Overview) solution is a set of bundled, out-of-the-box content that's configured specifically for Defender for IoT data, and includes analytics rules, workbooks, and playbooks.
166
164
167
-
-[Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md)
168
-
-[Defending Critical Infrastructure with the Microsoft Sentinel: IT/OT Threat Monitoring Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/defending-critical-infrastructure-with-the-microsoft-sentinel-it/ba-p/3061184)
169
-
-[Microsoft Defender for IoT solution](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-unifiedmicrosoftsocforot?tab=Overview)
170
-
-[Microsoft Defender for IoT data connector](../../sentinel/data-connectors-reference.md#microsoft-defender-for-iot)
165
+
> [!div class="nextstepaction"]
166
+
> [Install the **Microsoft Defender for IoT** solution](iot-advanced-threat-monitoring.md)
0 commit comments