You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md
+5-10Lines changed: 5 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,26 +7,21 @@ ms.topic: how-to
7
7
8
8
# Attack vector reporting
9
9
10
-
## About attack vector reports
10
+
Attack vector reports, generated by Defender for IoT OT network sensors, provide a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target.
11
11
12
-
Attack vector reports provide a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target.
12
+
## Prerequisites
13
13
14
-
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can then determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities.
15
-
16
-
> [!NOTE]
17
-
> Administrators and security analysts can perform the procedures described in this section.
14
+
You must be an **Admin** or **Security Analyst** user to create an attack vector report.
18
15
19
16
## Create an attack vector report
20
17
21
-
This section describes how to create Attack Vector reports.
22
-
23
18
**To create an attack vector simulation:**
24
19
25
20
1. Select **Attack vector** from the sensor side menu.
26
21
1. Select **Add simulation**.
27
22
1. Enter simulation properties:
28
23
29
-
|Parameter| Description |
24
+
|Property| Description |
30
25
|---------|---------|
31
26
|**Name**| Simulation name |
32
27
|**Maximum vectors**| The maximum number of vectors in a single simulation. |
@@ -49,4 +44,4 @@ This section describes how to create Attack Vector reports.
49
44
50
45
## Next steps
51
46
52
-
For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md).
47
+
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can now determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities. For more information, see [fill this in](not-sure-yet.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md
+31-25Lines changed: 31 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,39 +5,40 @@ ms.date: 02/02/2022
5
5
ms.topic: how-to
6
6
---
7
7
8
-
# Run data mining queries
8
+
# Data mining queries
9
9
10
-
Using data mining queries to get dynamic, granular information about your network devices, including for specific time periods, internet connectivity, ports and protocols, firmware versions, programming commands, and device state. You can use data mining queries for:
10
+
Running data mining queries provides dynamic, detailed information about your network devices. This includes information for specific time periods, internet connectivity, ports and protocols, firmware versions, programming commands, and device state.
11
11
12
-
| Information | Description |
13
-
|---------|---------|
14
-
|**SOC incident response**| Generate a report in real time to help deal with immediate incident response. For example, Data Mining can generate a report for a list of devices that might require patching. |
15
-
|**Forensics**| Generate a report based on historical data for investigative reports. |
16
-
|**Network security**| Generate a report that helps improve overall network security. For example, generate a report can be generated that lists devices with weak authentication credentials. |
17
-
|**Visibility**| Generate a report that covers all query items to view all baseline parameters of your network. |
18
-
|**PLC security**| Improve security by detecting PLCs in unsecure states, for example, Program and Remote states. |
12
+
Reports can be viewed in the **Data Mining** page. You can refresh a report, edit report parameters, and export to a CSV file or PDF. You can also take a snapshot of a report.
19
13
20
14
Data mining information is saved and stored continuously, except for when a device is deleted. Data mining results can be exported and stored externally to a secure server. In addition, the sensor performs automatic daily backups to ensure system continuity and preservation of data.
21
15
16
+
## Prerequisites
17
+
18
+
You must be an **Admin** or **Security Analyst** user to access predefined data mining reports.
19
+
22
20
## Predefined data mining reports
23
21
24
-
The following predefined reports are available. These queries are generated in real time.
22
+
The following predefined reports are available in **Analyze** > **Data Mining**. These queries are generated in real time.
25
23
26
24
| Report | Description |
27
25
|---------|---------|
28
26
|**Programming commands**| Devices that send industrial programming. |
29
27
|**Remote access**| Devices that communicate through remote session protocols. |
30
28
|**Internet activity**| Devices that are connected to the internet. |
31
29
|**CVEs**| A list of devices detected with known vulnerabilities, along with CVSSv2 risk scores. |
32
-
|**Excluded CVEs**| A list of all the CVEs that were manually excluded. It is possible to customize the CVE list manually so that the VA reports and attack vectors more accurately reflect your network by excluding or including particular CVEs and updating the CVSSv2 score accordingly. |
30
+
|**Excluded CVEs**| A list of all the CVEs that were manually excluded. It's possible to customize the CVE list manually so that the VA reports and attack vectors more accurately reflect your network by excluding or including particular CVEs and updating the CVSSv2 score accordingly. |
33
31
|**Nonactive devices**| Devices that haven't communicated for the past seven days. |
34
32
|**Active devices**| Active network devices within the last 24 hours. |
35
33
36
-
Find these reports in **Analyze** > **Data Mining**. Reports are available for users with Administrator and Security Analyst permissions. Read only users can't access these reports.
37
-
38
34
## Create a report
39
35
40
-
To create a data-mining report:
36
+
Reports are dynamically updated each time you open them. For example:
37
+
38
+
- If you create a report for firmware versions on devices on June 1 and open the report again on June 10, this report will be updated with information that's accurate for June 10.
39
+
- If you create a report to detect new devices discovered over the last 30 days on June 1 and open the report on June 30, the results will be displayed for the last 30 days.
40
+
41
+
**To generate a report**:
41
42
42
43
1. Select **Data Mining** from the side menu. Predefined suggested reports appear automatically.
43
44
@@ -53,27 +54,32 @@ To create a data-mining report:
53
54
54
55
1. Select **Save** to save your report and display results on the **Data Mining** page.
55
56
56
-
Reports are dynamically updated each time you open them. For example:
57
+
## Data mining report contents
57
58
58
-
- If you create a report for firmware versions on devices on June 1 and open the report again on June 10, this report will be updated with information that's accurate for June 10.
59
-
- If you create a report to detect new devices discovered over the last 30 days on June 1 and open the report on June 30, the results will be displayed for the last 30 days.
59
+
You can use data mining queries for:
60
60
61
-
## Managing reports
62
-
63
-
Reports can be viewed in the **Data Mining** page, You can refresh a report, edit report parameters, and export to a CSV file or PDF. You can also take a snapshot of a report.
61
+
| Information | Description |
62
+
|---------|---------|
63
+
|**SOC incident response**| Generate a report in real time to help deal with immediate incident response. For example, Data Mining can generate a report for a list of devices that might require patching. |
64
+
|**Forensics**| Generate a report based on historical data for investigative reports. |
65
+
|**Network security**| Generate a report that helps improve overall network security. For example, generate a report can be generated that lists devices with weak authentication credentials. |
66
+
|**Visibility**| Generate a report that covers all query items to view all baseline parameters of your network. |
67
+
|**PLC security**| Improve security by detecting PLCs in unsecure states, for example, Program and Remote states. |
64
68
65
69
## View reports in on-premises management console
66
70
67
71
The on-premises management console lets you generate reports for each sensor that's connected to it. Reports are based on sensor data-mining queries that are performed, and include:
68
72
69
-
-**Active Devices (Last 24 Hours)**: Presents a list of devices that show network activity within a period of 24 hours.
70
-
-**Non-Active Devices (Last 7 Days)**: Presents a list of devices that show no network activity in the last seven days.
71
-
-**Programming Commands**: Presents a list of devices that sent programming commands within the last 24 hours.
72
-
-**Remote Access**: Presents a list of devices that remote sources accessed within the last 24 hours.
73
+
| Information | Description |
74
+
|---------|---------|
75
+
|**Active Devices (Last 24 Hours)**| Presents a list of devices that show network activity within a period of 24 hours. |
76
+
|**Non-Active Devices (Last 7 Days)**| Presents a list of devices that show no network activity in the last seven days. |
77
+
|**Programming Commands**| Presents a list of devices that sent programming commands within the last 24 hours. |
78
+
|**Remote Access**| Presents a list of devices that remote sources accessed within the last 24 hours. |
73
79
74
80
When you choose the sensor from the on-premises management console, all the custom reports configured on that sensor appear in the list of reports. For each sensor, you can generate a default report or a custom report configured on that sensor.
75
81
76
-
To generate a report:
82
+
**To generate a report**:
77
83
78
84
1. On the left pane, select **Reports**. The **Reports** window appears.
0 commit comments