You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,15 +16,15 @@ Microsoft Defender for IoT provides lightweight security agents so that you can
16
16
17
17
-**Security posture management**: You can proactively monitor the security posture of your IoT devices. Defender for IoT provides security posture recommendations based on the CIS benchmark, along with device-specific recommendations. Get visibility into operating system security, including OS configuration, firewall settings, and permissions.
18
18
-**Endpoint threat detection**: Detect threats like botnets, brute force attempts, crypto miners, and suspicious network activity. Create custom alerts to target the most important threats in your organization.
19
-
-**IoT Hub integration**: Defender for IoT is enabled by default in every new IoT Hub that is created. Defender for IoT provides real-time monitoring, recommendations, and alerts, without requiring agent installation on any devices, and uses advanced analytics on logged IoT Hub meta data to analyze and protect your field devices and IoT hubs
19
+
-**IoT Hub integration**: Defender for IoT is enabled by default in every new IoT Hub that is created. Defender for IoT provides real-time monitoring, recommendations, and alerts, without requiring agent installation on any devices. Defender for IoT uses advanced analytics on logged IoT Hub meta data to analyze and protect your field devices and IoT hubs.
20
20
21
21
22
22
## Security posture management
23
23
24
24
25
25
The Defender for IoT micro agent enables you to quickly improve your organization's device security and defense capabilities by offering CIS best practice configurations, along with constant identification of any existing weak links in your OS security posture. CIS benchmark-based OS baseline recommendations help identify issues with device security hygiene, and prioritize changes for security hardening.
26
26
27
-
- CIS benchmarks are the best practices for securely configuring a target system. CIS benchmarks are developed through a unique consensus-based process comprised of cybersecurity professionals and subject matter experts around the world.
27
+
- CIS benchmarks are the best practices for securely configuring a target system. CIS benchmarks are developed through a unique, consensus-based process, comprised of cybersecurity professionals and subject matter experts around the world.
28
28
- CIS benchmarks are the only consensus-based, best-practice security configuration guides that are both developed, and accepted by government, business, industry, and academia.
29
29
30
30
@@ -35,7 +35,7 @@ The Defender for IoT micro agent provides deep security protection, and visibili
35
35
36
36
- The micro agent collects, aggregates, and analyzes raw security events from your devices. Events can include IP connections, process creation, user logons, and other security-relevant information.
37
37
- Defender for IoT device agents handles event aggregation, to help avoid high network throughput.
38
-
- The micro agent has flexible deployment options. The micro agent includes source code, so you can incorporate it into firmware, or customize it to include only what you need. It's also available as a binary package, or integrated directly into other Azure IoT solutions. The micro agent is available for standard IoT operating systems like Linux and Azure RTOS.
38
+
- The micro agent has flexible deployment options. The micro agent includes source code, so you can incorporate it into firmware, or customize it to include only what you need. It's also available as a binary package, or integrated directly into other Azure IoT solutions. The micro agent is available for standard IoT operating systems, such as Linux and Azure RTOS.
39
39
- The agents are highly customizable, allowing you to use them for specific tasks, such as sending only important information at the fastest SLA, or for aggregating extensive security information and context into larger segments, avoiding higher service costs.
40
40
41
41
@@ -48,7 +48,7 @@ The Defender for IoT micro agent provides deep security protection, and visibili
48
48
49
49
The Defender for IoT analytics pipeline also receives other threat intelligence streams from various sources within Microsoft and Microsoft partners. The entire analytics pipeline works with every customer configuration made on the service, such as custom alerts and use of the send security message SDK.
50
50
51
-
Using the analytics pipeline, Defender for IoT combines all streams of information to generate actionable recommendations and alerts. The pipeline contains both custom rules created by security researchers and experts,as well as machine learning models searching for deviation from standard device behavior, and risk analysis.
51
+
Using the analytics pipeline, Defender for IoT combines all streams of information to generate actionable recommendations and alerts. The pipeline contains both custom rules created by security researchers and experts,as well as machine learning models searching for deviation from standard device behavior, and risk analysis.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/quickstart-onboard-iot-hub.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,13 +59,13 @@ The **Secure your IoT solution** button will only appear if the IoT Hub has not
59
59
60
60
1. Navigate to **IoT Hub** > **`Your hub`** > **Defender for IoT** > **Overview**.
61
61
62
-
1.The Threat prevention, and Threat detection screen will appear.
62
+
The Threat prevention and Threat detection screen will appear.
63
63
64
64
:::image type="content" source="media/quickstart-onboard-iot-hub/threat-prevention.png" alt-text="Screenshot showing that Defender for IoT is enabled." lightbox="media/quickstart-onboard-iot-hub/threat-prevention-expanded.png":::
65
65
66
66
## Next steps
67
67
68
-
Advance to the next article to add a resource group to your solution...
68
+
Advance to the next article to add a resource group to your solution.
69
69
70
70
> [!div class="nextstepaction"]
71
71
> [Add a resource group to your IoT solution](tutorial-configure-your-solution.md)
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/architecture.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Defender for IoT connects to both cloud and on-premises components, and is built
17
17
18
18
Defender for IoT systems include the following components:
19
19
20
-
- The Azure portal, for cloud management and integration to other Microsoft services, such as Microsoft Sentinel
20
+
- The Azure portal, for cloud management and integration to other Microsoft services, such as Microsoft Sentinel.
21
21
- Network sensors, deployed on either a virtual machine or a physical appliance. You can configure your OT sensors as cloud-connected sensors, or fully on-premises sensors.
22
22
- An on-premises management console for cloud-connected or local, air-gapped site management.
23
23
- An embedded security agent (optional).
@@ -30,9 +30,9 @@ Defender for IoT network sensors discover and continuously monitor network traff
30
30
31
31
- Sensors use IoT and OT-aware analytics engines and Layer-6 Deep Packet Inspection (DPI) to detect IoT and OT threats, such as fileless malware, based on anomalous or unauthorized activity.
32
32
33
-
Data collection, processing, analysis, and alerting takes place directly on the sensor, which can be ideal for locations with low bandwidth or highlatency connectivity because only metadata is transferred on, either to the Azure portal for cloud management, or an on-premises management console.
33
+
Data collection, processing, analysis, and alerting takes place directly on the sensor. Running processes directly on the sensor can be ideal for locations with low bandwidth or high-latency connectivity because only the metadata is transferred on for management, either to the Azure portal or an on-premises management console.
34
34
35
-
### Cloud-connected vs local sensors
35
+
### Cloud-connected vs. local sensors
36
36
37
37
Cloud-connected sensors are sensors that are connected to Defender for IoT in Azure, and differ from locally managed sensors as follows:
38
38
@@ -58,11 +58,11 @@ Defender for IoT sensors apply analytics engines on ingested data, triggering al
58
58
59
59
Analytics engines provide machine learning and profile analytics, risk analysis, a device database and set of insights, threat intelligence, and behavioral analytics.
60
60
61
-
For example, for OT networks, the **policy violation detection** engine alerts users of any deviation from baseline behavior, such as unauthorized use of specific function codes, access to specific objects, or changes to device configuration. The policy violation engine models industry control system (ICS) networks as deterministic sequences of states and transitions—using a patented technique called Industrial Finite State Modeling (IFSM). The policy violation detection engine establishes a baseline of the ICS networks, so that the platform requires a shorter learning period to build a baseline of the network than generic mathematical approaches or analytics, which were originally developed for IT rather than OT networks.
61
+
For example, for OT networks, the **policy violation detection** engine alerts users of any deviation from baseline behavior, such as unauthorized use of specific function codes, access to specific objects, or changes to device configuration. The policy violation engine models industry control system (ICS) networks as deterministic sequences of states and transitions - using a patented technique called Industrial Finite State Modeling (IFSM). The policy violation detection engine creates a baseline for industrial control system (ICS) networks. Since many detection algorithms were build for IT, rather than OT, networks, an extra baseline for ICS networks helps to shorten the systems learning curve for new detections.
62
62
63
63
Specifically for OT networks, OT network sensors also provide the following analytics engines:
64
64
65
-
-**Protocol violation detection engine**. Identifies the use of packet structures and field values that violate ICS protocol specifications, for example: Modbus exception, and Initiation of an obsolete function code alerts.
65
+
-**Protocol violation detection engine**. Identifies the use of packet structures and field values that violate ICS protocol specifications, for example: Modbus exception, and initiation of an obsolete function code alerts.
66
66
67
67
-**Industrial malware detection engine**. Identifies behaviors that indicate the presence of known malware, such as Conficker, Black Energy, Havex, WannaCry, NotPetya, and Triton.
68
68
@@ -74,7 +74,7 @@ Specifically for OT networks, OT network sensors also provide the following anal
74
74
75
75
Defender for IoT provides hybrid network support using the following management options:
76
76
77
-
-**The Azure portal**. Use the Azure portal as a single pane of glass view all data ingested from your devices via network sensors. The Azure portal provides extra value, such as [workbooks](workbooks.md), [connections to Microsoft Sentinel](../../sentinel/iot-solution.md?bc=%2fazure%2fdefender-for-iot%2fbreadcrumb%2ftoc.json&tabs=use-out-of-the-box-analytics-rules-recommended&toc=%2fazure%2fdefender-for-iot%2forganizations%2ftoc.json), and more.
77
+
-**The Azure portal**. Use the Azure portal as a single pane of glass to view all data ingested from your devices via network sensors. The Azure portal provides extra value, such as [workbooks](workbooks.md), [connections to Microsoft Sentinel](../../sentinel/iot-solution.md?bc=%2fazure%2fdefender-for-iot%2fbreadcrumb%2ftoc.json&tabs=use-out-of-the-box-analytics-rules-recommended&toc=%2fazure%2fdefender-for-iot%2forganizations%2ftoc.json), and more.
78
78
79
79
Also use the Azure portal to obtain new appliances and software updates, onboard and maintain your sensors in Defender for IoT, and update threat intelligence packages.
0 commit comments