Skip to content

Commit 8fd6333

Browse files
Merge pull request #229083 from batamig/zt-feedback
zt feedback
2 parents 017a597 + 94709e9 commit 8fd6333

File tree

5 files changed

+35
-11
lines changed

5 files changed

+35
-11
lines changed

articles/defender-for-iot/organizations/manage-users-portal.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ title: Manage Azure users for Microsoft Defender for IoT
33
description: Learn how to manage user permissions in the Azure portal for Microsoft Defender for IoT services.
44
ms.date: 09/04/2022
55
ms.topic: how-to
6+
ms.collection:
7+
- zerotrust-services
68
---
79

810
# Manage users on the Azure portal

articles/defender-for-iot/organizations/monitor-zero-trust.md

Lines changed: 27 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,7 @@ ms.collection:
99

1010
# Tutorial: Monitor your OT networks with Zero Trust principles
1111

12-
[Zero Trust](/security/zero-trust/zero-trust-overview) is a security strategy for designing and implementing the following sets of security principles:
13-
14-
|Verify explicitly |Use least privilege access |Assume breach |
15-
|---------|---------|---------|
16-
|Always authenticate and authorize based on all available data points. | Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection. | Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
17-
18-
<!--replace with include file-->
12+
[!INCLUDE [zero-trust-principles](../../../includes/security/zero-trust-principles.md)]
1913

2014
Defender for IoT uses site and zone definitions across your OT network to ensure that you're maintaining network hygiene and keeping each subsystem separate and secure.
2115

@@ -27,7 +21,10 @@ In this tutorial, you learn how to:
2721
> * [Look for alerts on unknown devices](#look-for-alerts-on-unknown-devices)
2822
> * [Look for vulnerable systems](#look-for-vulnerable-systems)
2923
> * [Look for alerts on cross-subnet traffic](#look-for-alerts-on-cross-subnet-traffic)
30-
> * [Simulate traffic to test your network](#simulate-traffic-to-test-your-network)
24+
> * [Simulate malicious traffic to test your network](#simulate-malicious-traffic-to-test-your-network)
25+
26+
> [!IMPORTANT]
27+
> The **Recommendations** page in the Azure portal is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
3128
3229
## Prerequisites
3330

@@ -67,7 +64,7 @@ You've separated your network in to sites and zones to keep each subsystem separ
6764

6865
## Look for alerts on unknown devices
6966

70-
Do you know what devices are on your network, and who they're communicating with? Defender for IoT triggers alerts for any new, unknown device detected on your network so that you can identify it and ensure both the device security and your network security.
67+
Do you know what devices are on your network, and who they're communicating with? Defender for IoT triggers alerts for any new, unknown device detected in OT subnets so that you can identify it and ensure both the device security and your network security.
7168

7269
Unknown devices might include *transient* devices, which move between networks. For example, transient devices might include a technician's laptop, which they connect to the network when maintaining servers, or a visitor's smartphone, which connects to a guest network at your office.
7370

@@ -104,6 +101,25 @@ Specific sites or zones that generate many alerts for unknown devices are at ris
104101
- Learn the alert if the device is legitimate so that the alert isn't triggered again for the same device. On the alert details page, select **Learn**.
105102
- Block the device if it's not legitimate.
106103

104+
## Look for unauthorized devices
105+
106+
We recommend that you proactively watch for new, unauthorized devices detected on your network. Regularly checking for unauthorized devices can help prevent threats of rogue or potentially malicious devices that might infiltrate your network.
107+
108+
For example, use the **Review unauthorized devices** recommendation to identify all unauthorized devices.
109+
110+
**To review unauthorized devices**:
111+
112+
1. In Defender for IoT on the Azure portal, select **Recommendations (Preview)** and search for the **Review unauthorized devices** recommendation.
113+
1. View the devices listed in the **Unhealthy devices** tab. Each of these devices in unauthorized and might be a risk to your network.
114+
115+
Follow the remediation steps, such as to mark the device as authorized if the device is known to you, or disconnect the device from your network if the device remains unknown after investigation.
116+
117+
For more information, see [Enhance security posture with security recommendations](recommendations.md).
118+
119+
> [!TIP]
120+
> You can also review unauthorized devices by [filtering the device inventory](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory) by the **Authorization** field, showing only devices marked as **Unauthorized**.
121+
122+
107123
## Look for vulnerable systems
108124

109125
If you have devices on your network with outdated software or firmware, they might be vulnerable to attack. Devices that are end-of-life, and have no more security updates are especially vulnerable.
@@ -120,7 +136,7 @@ If you have devices on your network with outdated software or firmware, they mig
120136

121137
1. In the **SiteName** select at the top of the page, select one or more sites to filter the data by site. Filtering data by site can help you identify concerns at specific sites, which may require site-wide updates or device replacements.
122138

123-
## Simulate traffic to test your network
139+
## Simulate malicious traffic to test your network
124140

125141
To verify the security posture of a specific device, run an **Attack vector** report to simulate traffic to that device. Use the simulated traffic to locate and mitigate vulnerabilities before they're exploited.
126142

@@ -189,7 +205,7 @@ When monitoring for Zero Trust, the following list is an example of important De
189205

190206
:::row:::
191207
:::column:::
192-
- Unauthorized device connected to the network
208+
- Unauthorized device connected to the network, especially any malicious IP/Domain name requests
193209
- Known malware detected
194210
- Unauthorized connection to the internet
195211
- Unauthorized remote access

articles/defender-for-iot/organizations/onboard-sensors.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ title: Onboard sensors to Defender for IoT in the Azure portal
33
description: Learn how to onboard sensors to Defender for IoT in the Azure portal.
44
ms.date: 06/02/2022
55
ms.topic: install-set-up-deploy
6+
ms.collection:
7+
- zerotrust-services
68
---
79

810
# Onboard OT sensors to Defender for IoT

articles/defender-for-iot/organizations/ot-deploy/sites-and-zones-on-premises.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ title: Create OT sites and zones on an on-premises management console - Microsof
33
description: Learn how to create OT networking sites and zones on an on-premises management console to support Zero Trust principles while monitoring OT networks.
44
ms.date: 02/15/2023
55
ms.topic: how-to
6+
ms.collection:
7+
- zerotrust-services
68
---
79

810
# Create OT sites and zones on an on-premises management console

articles/defender-for-iot/organizations/roles-azure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ title: Azure user roles and permissions for Microsoft Defender for IoT
33
description: Learn about the Azure user roles and permissions available for OT and Enterprise IoT monitoring with Microsoft Defender for IoT on the Azure portal.
44
ms.date: 09/19/2022
55
ms.topic: concept-article
6+
ms.collection:
7+
- zerotrust-services
68
---
79

810
# Azure user roles and permissions for Defender for IoT

0 commit comments

Comments
 (0)