You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/monitor-zero-trust.md
+27-11Lines changed: 27 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,13 +9,7 @@ ms.collection:
9
9
10
10
# Tutorial: Monitor your OT networks with Zero Trust principles
11
11
12
-
[Zero Trust](/security/zero-trust/zero-trust-overview) is a security strategy for designing and implementing the following sets of security principles:
13
-
14
-
|Verify explicitly |Use least privilege access |Assume breach |
15
-
|---------|---------|---------|
16
-
|Always authenticate and authorize based on all available data points. | Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection. | Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
Defender for IoT uses site and zone definitions across your OT network to ensure that you're maintaining network hygiene and keeping each subsystem separate and secure.
21
15
@@ -27,7 +21,10 @@ In this tutorial, you learn how to:
27
21
> *[Look for alerts on unknown devices](#look-for-alerts-on-unknown-devices)
28
22
> *[Look for vulnerable systems](#look-for-vulnerable-systems)
29
23
> *[Look for alerts on cross-subnet traffic](#look-for-alerts-on-cross-subnet-traffic)
30
-
> *[Simulate traffic to test your network](#simulate-traffic-to-test-your-network)
24
+
> *[Simulate malicious traffic to test your network](#simulate-malicious-traffic-to-test-your-network)
25
+
26
+
> [!IMPORTANT]
27
+
> The **Recommendations** page in the Azure portal is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
31
28
32
29
## Prerequisites
33
30
@@ -67,7 +64,7 @@ You've separated your network in to sites and zones to keep each subsystem separ
67
64
68
65
## Look for alerts on unknown devices
69
66
70
-
Do you know what devices are on your network, and who they're communicating with? Defender for IoT triggers alerts for any new, unknown device detected on your network so that you can identify it and ensure both the device security and your network security.
67
+
Do you know what devices are on your network, and who they're communicating with? Defender for IoT triggers alerts for any new, unknown device detected in OT subnets so that you can identify it and ensure both the device security and your network security.
71
68
72
69
Unknown devices might include *transient* devices, which move between networks. For example, transient devices might include a technician's laptop, which they connect to the network when maintaining servers, or a visitor's smartphone, which connects to a guest network at your office.
73
70
@@ -104,6 +101,25 @@ Specific sites or zones that generate many alerts for unknown devices are at ris
104
101
- Learn the alert if the device is legitimate so that the alert isn't triggered again for the same device. On the alert details page, select **Learn**.
105
102
- Block the device if it's not legitimate.
106
103
104
+
## Look for unauthorized devices
105
+
106
+
We recommend that you proactively watch for new, unauthorized devices detected on your network. Regularly checking for unauthorized devices can help prevent threats of rogue or potentially malicious devices that might infiltrate your network.
107
+
108
+
For example, use the **Review unauthorized devices** recommendation to identify all unauthorized devices.
109
+
110
+
**To review unauthorized devices**:
111
+
112
+
1. In Defender for IoT on the Azure portal, select **Recommendations (Preview)** and search for the **Review unauthorized devices** recommendation.
113
+
1. View the devices listed in the **Unhealthy devices** tab. Each of these devices in unauthorized and might be a risk to your network.
114
+
115
+
Follow the remediation steps, such as to mark the device as authorized if the device is known to you, or disconnect the device from your network if the device remains unknown after investigation.
116
+
117
+
For more information, see [Enhance security posture with security recommendations](recommendations.md).
118
+
119
+
> [!TIP]
120
+
> You can also review unauthorized devices by [filtering the device inventory](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory) by the **Authorization** field, showing only devices marked as **Unauthorized**.
121
+
122
+
107
123
## Look for vulnerable systems
108
124
109
125
If you have devices on your network with outdated software or firmware, they might be vulnerable to attack. Devices that are end-of-life, and have no more security updates are especially vulnerable.
@@ -120,7 +136,7 @@ If you have devices on your network with outdated software or firmware, they mig
120
136
121
137
1. In the **SiteName** select at the top of the page, select one or more sites to filter the data by site. Filtering data by site can help you identify concerns at specific sites, which may require site-wide updates or device replacements.
122
138
123
-
## Simulate traffic to test your network
139
+
## Simulate malicious traffic to test your network
124
140
125
141
To verify the security posture of a specific device, run an **Attack vector** report to simulate traffic to that device. Use the simulated traffic to locate and mitigate vulnerabilities before they're exploited.
126
142
@@ -189,7 +205,7 @@ When monitoring for Zero Trust, the following list is an example of important De
189
205
190
206
:::row:::
191
207
:::column:::
192
-
- Unauthorized device connected to the network
208
+
- Unauthorized device connected to the network, especially any malicious IP/Domain name requests
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/ot-deploy/sites-and-zones-on-premises.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@ title: Create OT sites and zones on an on-premises management console - Microsof
3
3
description: Learn how to create OT networking sites and zones on an on-premises management console to support Zero Trust principles while monitoring OT networks.
4
4
ms.date: 02/15/2023
5
5
ms.topic: how-to
6
+
ms.collection:
7
+
- zerotrust-services
6
8
---
7
9
8
10
# Create OT sites and zones on an on-premises management console
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/roles-azure.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@ title: Azure user roles and permissions for Microsoft Defender for IoT
3
3
description: Learn about the Azure user roles and permissions available for OT and Enterprise IoT monitoring with Microsoft Defender for IoT on the Azure portal.
4
4
ms.date: 09/19/2022
5
5
ms.topic: concept-article
6
+
ms.collection:
7
+
- zerotrust-services
6
8
---
7
9
8
10
# Azure user roles and permissions for Defender for IoT
0 commit comments