Skip to content

Commit b267a66

Browse files
Merge pull request #215558 from yelevin/yelevin/iot-entity-page
IoT entity page added
2 parents bb1a89d + b77c67a commit b267a66

File tree

2 files changed

+11
-0
lines changed

2 files changed

+11
-0
lines changed

articles/sentinel/entity-pages.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,7 @@ Microsoft Sentinel currently offers the following entity pages:
7676
> The **IP address entity page** (now in preview) contains **geolocation data** supplied by the **Microsoft Threat Intelligence service**. This service combines geolocation data from Microsoft solutions and third-party vendors and partners. The data is then available for analysis and investigation in the context of a security incident. For more information, see also [Enrich entities in Microsoft Sentinel with geolocation data via REST API (Public preview)](geolocation-data-api.md).
7777
7878
- Azure resource (**Preview**)
79+
- IoT device (**Preview**)
7980

8081
## Next steps
8182

articles/sentinel/whats-new.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ If you're looking for items older than six months, you'll find them in the [Arch
2929

3030
- [Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)](#microsoft-365-defender-now-integrates-azure-active-directory-identity-protection-aadip)
3131
- [Out of the box anomaly detection on the SAP audit log (Preview)](#out-of-the-box-anomaly-detection-on-the-sap-audit-log-preview)
32+
- [IoT device entity page (Preview)](#iot-device-entity-page-preview)
3233

3334
### Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)
3435

@@ -66,6 +67,15 @@ Learn more:
6667
- [Learn about the new feature (blog)](https://aka.ms/Sentinel4sapDynamicAnomalyAuditRuleBlog)
6768
- [Use the new rule for anomaly detection](sap/configure-audit-log-rules.md#anomaly-detection)
6869

70+
### IoT device entity page (Preview)
71+
72+
OT/IoT devices, including Programmable Logic Controllers (PLCs), Human-Machine Interfaces (HMIs), engineering workstations, network devices, and more, are becoming increasingly prevalent in organizations. Often, these devices are used as entry points for attacks, but they can also be used by attackers to move laterally.
73+
For SOCs, monitoring IoT/OT networks presents a number of challenges, including the lack of visibility for security teams into their OT networks, the lack of experience among SOC analysts in managing OT incidents, and the lack of communication between OT teams and SOC teams.
74+
75+
The new [IoT device entity page](entity-pages.md) is designed to help the SOC investigate incidents that involve IoT/OT devices in their environment, by providing the full OT/IoT context through Microsoft Defender for IoT to Sentinel. This enables SOC teams to detect and respond more quickly across all domains to the entire attack timeline.
76+
77+
Learn more about [investigating IoT device entities in Microsoft Sentinel](iot-advanced-threat-monitoring.md).
78+
6979
## September 2022
7080

7181
- [Create automation rule conditions based on custom details (Preview)](#create-automation-rule-conditions-based-on-custom-details-preview)

0 commit comments

Comments
 (0)