You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/concept-zero-trust.md
+1-7Lines changed: 1 addition & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,13 +9,7 @@ ms.collection:
9
9
10
10
# Zero Trust and your OT networks
11
11
12
-
[Zero Trust](/security/zero-trust/zero-trust-overview) is a security strategy for designing and implementing the following sets of security principles:
13
-
14
-
|Verify explicitly |Use least privilege access |Assume breach |
15
-
|---------|---------|---------|
16
-
|Always authenticate and authorize based on all available data points. | Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection. | Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
@@ -93,6 +95,28 @@ To understand whether a feature is supported in your sensor version, check the r
93
95
94
96
## Versions 22.3.x
95
97
98
+
### 22.3.6 / 22.3.7
99
+
100
+
<aname=22.3.7></a>
101
+
102
+
**Release date**: 03/2023
103
+
104
+
**Supported until**: 02/2024
105
+
106
+
Version 22.3.7 includes the same features as 22.3.6. If you have version 22.3.6 installed, we strongly recommend that you update to version 22.3.7, which also includes important bug fixes.
107
+
108
+
-[Support for transient devices](device-inventory.md#supported-devices)
-[Device data retention updated to 90 days](references-data-retention.md#device-data-retention-periods)
111
+
-[Merging](how-to-investigate-sensor-detections-in-a-device-inventory.md#merge-devices) and [deleting](how-to-investigate-sensor-detections-in-a-device-inventory.md#delete-devices) devices on OT sensors now include confirmation messages when the action has completed
112
+
- Support for [deleting multiple devices](how-to-investigate-sensor-detections-in-a-device-inventory.md#delete-devices) on OT sensors
113
+
- An enhanced [editing device details](how-to-investigate-sensor-detections-in-a-device-inventory.md#edit-device-details) process on the OT sensor, using an **Edit** button in the toolbar at the top of the page
114
+
-[Enhanced UI on the OT sensor for uploading an SSL/TLS certificate](how-to-deploy-certificates.md#deploy-ssltls-certificates-on-ot-appliances)
115
+
-[Activation files for locally-managed sensors no longer expire](how-to-manage-individual-sensors.md#upload-a-new-activation-file)
116
+
- Severity for all [**Suspicion of Malicious Activity**](alert-engine-messages.md#malware-engine-alerts) alerts is now **Critical**
117
+
-[Allow internet connections on an OT network in bulk](how-to-accelerate-alert-incident-response.md#allow-internet-connections-on-an-ot-network)
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+69-2Lines changed: 69 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: What's new in Microsoft Defender for IoT
3
3
description: This article describes features available in Microsoft Defender for IoT, across both OT and Enterprise IoT networks, and both on-premises and in the Azure portal.
4
4
ms.topic: whats-new
5
-
ms.date: 02/22/2023
5
+
ms.date: 03/14/2023
6
6
ms.custom: enterprise-iot
7
7
---
8
8
@@ -20,7 +20,73 @@ Features released earlier than nine months ago are described in the [What's new
20
20
21
21
|Service area |Updates |
22
22
|---------|---------|
23
-
|**OT networks**|**Cloud features**: - [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot)|
23
+
|**OT networks**|**Sensor version 22.3.6**: <br>- [Support for transient devices](#support-for-transient-devices)<br>- [Learn DNS traffic by configuring allowlists](#learn-dns-traffic-by-configuring-allowlists)<br>- [Device data retention updates](#device-data-retention-updates)<br>- [UI enhancements when uploading SSL/TLS certificates](#ui-enhancements-when-uploading-ssltls-certificates)<br>- [Activation files expiration updates](#activation-files-expiration-updates)<br>- [UI enhancements for managing the device inventory](#ui-enhancements-for-managing-the-device-inventory)<br>- [Updated severity for all Suspicion of Malicious Activity alerts](#updated-severity-for-all-suspicion-of-malicious-activity-alerts)<br>- [Automatically resolved device notifications](#automatically-resolved-device-notifications) <br><br> **Cloud features**: <br>- [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot)|
24
+
25
+
### Support for transient devices
26
+
27
+
Defender for IoT now identifies *transient* devices as a unique device type that represents devices that were detected for only a short time. We recommend investigating these devices carefully to understand their impact on your network.
28
+
29
+
For more information, see [Defender for IoT device inventory](device-inventory.md) and [Manage your device inventory from the Azure portal](how-to-manage-device-inventory-for-organizations.md).
30
+
31
+
### Learn DNS traffic by configuring allowlists
32
+
33
+
The *support* user can now decrease the number of unauthorized internet alerts by creating an allowlist of domain names on your OT sensor.
34
+
35
+
When a DNS allowlist is configured, the sensor checks each unauthorized internet connectivity attempt against the list before triggering an alert. If the domain's FQDN is included in the allowlist, the sensor doesn’t trigger the alert and allows the traffic automatically.
36
+
37
+
All OT sensor users can view the list of allowed DNS domains and their resolved IP addresses in data mining reports.
38
+
39
+
For example:
40
+
41
+
:::image type="content" source="media/release-notes/data-mining-allowlist.png" alt-text="Screenshot of how to create a data mining report for DNS allowlists.":::
42
+
43
+
For more information, see [Allow internet connections on an OT network](how-to-accelerate-alert-incident-response.md#allow-internet-connections-on-an-ot-network) and [Create data mining queries](how-to-create-data-mining-queries.md).
44
+
45
+
46
+
### Device data retention updates
47
+
48
+
The device data retention period on the OT sensor and on-premises management console has been updated to 90 days from the date of the **Last activity** value.
49
+
50
+
For more information, see [Device data retention periods](references-data-retention.md#device-data-retention-periods).
51
+
52
+
### UI enhancements when uploading SSL/TLS certificates
53
+
54
+
The OT sensor version 22.3.6 has an enhanced **SSL/TLS Certificates** configuration page for defining your SSL/TLS certificate settings and deploying a CA-signed certificate.
55
+
56
+
For more information, see [Deploy SSL/TLS certificates on OT appliances](how-to-deploy-certificates.md).
57
+
58
+
### Activation files expiration updates
59
+
60
+
Activation files on locally-managed OT sensors now remain activated for as long as your Defender for IoT plan is active on your Azure subscription, just like activation files on cloud-connected OT sensors.
61
+
62
+
You'll only need to update your activation file if you're [updating an OT sensor from a legacy version](update-ot-software.md#update-legacy-ot-sensor-software) or switching the sensor management mode, such as moving from locally-managed to cloud-connected.
63
+
64
+
For more information, see [Manage individual sensors](how-to-manage-individual-sensors.md).
65
+
66
+
### UI enhancements for managing the device inventory
67
+
68
+
The following enhancements were added to the OT sensor's device inventory in version 22.3.6:
69
+
70
+
- A smoother process for [editing device details](how-to-investigate-sensor-detections-in-a-device-inventory.md#edit-device-details) on the OT sensor. Edit device details directly from the device inventory page on the OT sensor console using the new **Edit** button in the toolbar at the top of the page.
71
+
- The OT sensor now supports [deleting multiple devices](how-to-investigate-sensor-detections-in-a-device-inventory.md#delete-devices) simultaneously.
72
+
- The procedures for [merging](how-to-investigate-sensor-detections-in-a-device-inventory.md#merge-devices) and [deleting](how-to-investigate-sensor-detections-in-a-device-inventory.md#delete-devices) devices now include confirmation messages that appear when the action has completed.
73
+
74
+
For more information, see [Manage your OT device inventory from a sensor console](how-to-investigate-sensor-detections-in-a-device-inventory.md).
75
+
76
+
### Updated severity for all Suspicion of Malicious Activity alerts
77
+
78
+
All alerts with the **Suspicion of Malicious Activity** category now have a severity of **Critical**.
79
+
80
+
For more information, see [Malware engine alerts](alert-engine-messages.md#malware-engine-alerts).
81
+
82
+
83
+
### Automatically resolved device notifications
84
+
85
+
Starting in version 22.3.6, selected notifications on the OT sensor's **Device map** page are now automatically resolved if they aren't dismissed or otherwise handled within 14 days.
86
+
87
+
After updating your sensor version, the **Inactive devices** and **New OT devices** notifications no longer appear. While any **Inactive devices** notifications that are left over from before the update are automatically dismissed, you may still have legacy **New OT devices** notifications to handle. Handle these notifications as needed to remove them from your sensor.
88
+
89
+
For more information, see [Manage device notifications](how-to-work-with-the-sensor-device-map.md#manage-device-notifications).
24
90
25
91
### New Microsoft Sentinel incident experience for Defender for IoT
26
92
@@ -42,6 +108,7 @@ For more information, see [Tutorial: Investigate and detect threats for IoT devi
42
108
|**Enterprise IoT networks**|**Cloud features**: [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal)|
43
109
44
110
111
+
45
112
### Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2
46
113
47
114
[Version 2.0.2](release-notes-sentinel.md#version-202) of the Microsoft Defender for IoT solution is now available in the [Microsoft Sentinel content hub](../../sentinel/sentinel-solutions-catalog.md), with improvements in analytics rules for incident creation, an enhanced incident details page, and performance improvements for analytics rule queries.
0 commit comments