Skip to content

Commit 7cc8d63

Browse files
authored
Merge pull request #220056 from batamig/alert-e2e
Alert-e2e approved waiting for GA
2 parents 25d96db + 9bc7acf commit 7cc8d63

21 files changed

+179
-12
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@
3434
href: iot-solution.md
3535
- name: Investigate Defender for IoT incidents with Microsoft Sentinel
3636
href: iot-advanced-threat-monitoring.md
37+
- name: Investigate an OT network alert
38+
href: respond-ot-alert.md
3739
- name: Concepts
3840
items:
3941
- name: Subscription billing

articles/defender-for-iot/organizations/concept-sentinel-integration.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,12 @@ The following table shows how both the OT team, on the Defender for IoT side, an
4040
|SOC teams respond with OT playbooks and notebooks | **OT incident response** | OT teams either suppress the alert or learn it for next time, as needed |
4141
|After the threat is mitigated, SOC teams close the incident | **OT incident closure** | After the threat is mitigated, OT teams close the alert |
4242

43+
### Alert status synchronizations
44+
45+
Alert status changes are synchronized from Microsoft Sentinel to Defender for IoT only, and not from Defender for IoT to Microsoft Sentinel.
46+
47+
If you integrate Defender for IoT with Microsoft Sentinel, we recommend that you manage your alert statuses together with the related incidents in Microsoft Sentinel.
48+
4349
## Microsoft Sentinel incidents for Defender for IoT
4450

4551
After you've configured the Defender for IoT data connector and have IoT/OT alert data streaming to Microsoft Sentinel, use one of the following methods to create incidents based on those alerts:

articles/defender-for-iot/organizations/iot-advanced-threat-monitoring.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The **Microsoft Defender for IoT** solution includes a more detailed set of out-
7777

7878
## Investigate Defender for IoT incidents
7979

80-
After you’ve [configured your Defender for IoT data to trigger new incidents in Microsoft Sentinel](#detect-threats-out-of-the-box-with-defender-for-iot-data), start investigating those incidents in Microsoft Sentinel as you would other incidents.
80+
After you’ve [configured your Defender for IoT data to trigger new incidents in Microsoft Sentinel](#detect-threats-out-of-the-box-with-defender-for-iot-data), start investigating those incidents in Microsoft Sentinel [as you would other incidents](/sentinel/investigate-cases).
8181

8282
**To investigate Microsoft Defender for IoT incidents**:
8383

@@ -100,7 +100,9 @@ For more information on how to investigate incidents and use the investigation g
100100

101101
### Investigate further with IoT device entities
102102

103-
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to open its device entity page. You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
103+
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to open its [device entity page]](/azure/sentinel/entity-pages).
104+
105+
You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
104106

105107
If you don't see your IoT device entity right away, select **View full details** under the entities listed to open the full incident page. In the **Entities** tab, select an IoT device to open its entity page. For example:
106108

@@ -118,6 +120,14 @@ You can also hunt for vulnerable devices on the Microsoft Sentinel **Entity beha
118120

119121
For more information on how to investigate incidents and use the investigation graph, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
120122

123+
### Investigate the alert in Defender for IoT
124+
125+
To open an alert in Defender for IoT for further investigation, go to your incident details page and select **Investigate in Microsoft Defender for IoT**. For example:
126+
127+
:::image type="content" source="media/iot-solution/investigate-in-iot.png" alt-text="Screenshot of the Investigate in Microsoft Defender for IoT option.":::
128+
129+
The Defender for IoT alert details page opens for the related alert. For more information, see [Investigate and respond to an OT network alert](respond-ot-alert.md).
130+
121131
## Visualize and monitor Defender for IoT data
122132

123133
To visualize and monitor your Defender for IoT data, use the workbooks deployed to your Microsoft Sentinel workspace as part of the [Microsoft Defender for IoT](#install-the-defender-for-iot-solution) solution.
@@ -139,7 +149,7 @@ The following table describes the workbooks included in the **Microsoft Defender
139149

140150
## Automate response to Defender for IoT alerts
141151

142-
Playbooks are collections of automated remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help automate and orchestrate your threat response; it can be run manually or set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an automation rule, respectively.
152+
[Playbooks](/azure/sentinel/tutorial-respond-threats-playbook) are collections of automated remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help automate and orchestrate your threat response; it can be run manually or set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an automation rule, respectively.
143153

144154
The [Microsoft Defender for IoT](#install-the-defender-for-iot-solution) solution includes out-of-the-box playbooks that provide the following functionality:
145155

articles/defender-for-iot/organizations/iot-solution.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Before you start, make sure you have the following requirements on your workspac
3636
3737
## Connect your data from Defender for IoT to Microsoft Sentinel
3838

39-
Start by enabling the **Defender for IoT** data connector to stream all your Defender for IoT events into Microsoft Sentinel.
39+
Start by enabling the [Defender for IoT data connector](/azure/sentinel/data-connectors-reference.md#microsoft-defender-for-iot) to stream all your Defender for IoT events into Microsoft Sentinel.
4040

4141
**To enable the Defender for IoT data connector**:
4242

@@ -156,15 +156,11 @@ The following types of updates generate new records in the **SecurityAlert** tab
156156
- A new device is added to an existing alert
157157
- The device properties for an alert are updated
158158

159-
## Next steps
160159

161-
[Install the **Microsoft Defender for IoT** solution](iot-advanced-threat-monitoring.md) to your Microsoft Sentinel workspace.
162160

163-
The **Microsoft Defender for IoT** solution is a set of bundled, out-of-the-box content that's configured specifically for Defender for IoT data, and includes analytics rules, workbooks, and playbooks.
161+
## Next steps
164162

165-
For more information, see:
163+
The [Microsoft Defender for IoT](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-unifiedmicrosoftsocforot?tab=Overview) solution is a set of bundled, out-of-the-box content that's configured specifically for Defender for IoT data, and includes analytics rules, workbooks, and playbooks.
166164

167-
- [Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md)
168-
- [Defending Critical Infrastructure with the Microsoft Sentinel: IT/OT Threat Monitoring Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/defending-critical-infrastructure-with-the-microsoft-sentinel-it/ba-p/3061184)
169-
- [Microsoft Defender for IoT solution](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-unifiedmicrosoftsocforot?tab=Overview)
170-
- [Microsoft Defender for IoT data connector](../../sentinel/data-connectors-reference.md#microsoft-defender-for-iot)
165+
> [!div class="nextstepaction"]
166+
> [Install the **Microsoft Defender for IoT** solution](iot-advanced-threat-monitoring.md)
53.6 KB
Loading
-8.01 KB
Loading
-11.3 KB
Loading
Loading
Binary file not shown.
507 KB
Loading

0 commit comments

Comments
 (0)