You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/iot-advanced-threat-monitoring.md
+12-14Lines changed: 12 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,40 +85,38 @@ After you’ve [configured your Defender for IoT data to trigger new incidents i
85
85
86
86
1. Above the incident grid, select the **Product name** filter and clear the **Select all** option. Then, select **Microsoft Defender for IoT** to view only incidents triggered by Defender for IoT alerts. For example:
87
87
88
-
:::image type="content" source="media/iot-solution/filter-incidents-defender-for-iot.png" alt-text="Screenshot of filtering incidents by product name for Defender for IoT devices.":::
88
+
:::image type="content" source="media/iot-solution/filter-incidents-defender-for-iot.png" alt-text="Screenshot of filtering incidents by product name for Defender for IoT devices." lightbox="media/iot-solution/filter-incidents-defender-for-iot.png":::
89
89
90
90
1. Select a specific incident to begin your investigation.
91
91
92
-
In the incident details pane on the right, view details such as incident severity, a summary of the entities involved, any mapped MITRE ATT&CK tactics or techniques, and more.
92
+
In the incident details pane on the right, view details such as incident severity, a summary of the entities involved, any mapped MITRE ATT&CK tactics or techniques, and more. For example:
93
93
94
-
:::image type="content" source="media/iot-solution/investigate-iot-incidents.png" alt-text="Screenshot of a Microsoft Defender for IoT incident in Microsoft Sentinel.":::
94
+
:::image type="content" source="media/iot-solution/investigate-iot-incidents.png" alt-text="Screenshot of a Microsoft Defender for IoT incident in Microsoft Sentinel."lightbox="media/iot-solution/investigate-iot-incidents.png":::
95
95
96
-
1. Select the incident to open the incident details page, where you can find additional details. For example:
96
+
1. Select **View full details**to open the incident details page, where you can drill down even more. For example:
97
97
98
98
- Understand the incident's business impact and physical location using details, like an IoT device's site, zone, sensor name, and device importance.
99
99
100
100
- Learn about recommended remediation steps by selecting an alert in the incident timeline and viewing the **Remediation steps** area.
101
101
102
-
- Select an IoT device entity from the **Entities** list to open its [device entity page](/azure/sentinel/entity-pages). Identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
103
-
104
-
> [!TIP]
105
-
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane.
102
+
- Select an IoT device entity from the **Entities** list to open its [device entity page](/azure/sentinel/entity-pages). For more information, see [Investigate further with IoT device entities](#investigate-further-with-iot-device-entities).
106
103
107
104
For more information, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
108
105
109
-
### Investigate further with IoT device entities
106
+
> [!TIP]
107
+
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane on the **Incidents** page.
110
108
111
-
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to view more details in the entities pane on the right. You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
109
+
### Investigate further with IoT device entities
112
110
113
-
If you don't see your IoT device entity right away, select **View full details** under the entities listed to open the full incident page, and then check the **Entities**tab. Select an IoT device entity to view entity details on the right, including basic device details, owner contact information, and a timeline of events that occurred on the device.
111
+
When you are investigating an incident in Microsoft Sentinel and have the incident details pane open on the right, select an IoT device entity from the **Entities**list to view more details about the selected entity. Identify an *IoT device* by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
114
112
115
-
To drill down even further, select the IoT device entity link and open the device entity details page. For more information, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md).
113
+
If you don't see your IoT device entity right away, select **View full details** to open the full incident page, and then check the **Entities** tab. Select an IoT device entity to view more entity data, like basic device details, owner contact information, and a timeline of events that occurred on the device.
116
114
117
-
You can also hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
115
+
To drill down even further, select the IoT device entity link and open the device entity details page, or hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
118
116
119
117
:::image type="content" source="media/iot-solution/entity-behavior-iot-devices-alerts.png" alt-text="Screenshot of IoT devices by number of alerts on entity behavior page.":::
120
118
121
-
For more information on how to investigate incidents and use the investigation graph, see[Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
119
+
For more information, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md) and[Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+17-8Lines changed: 17 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,23 +15,32 @@ Features released earlier than nine months ago are described in the [What's new
15
15
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
16
16
>
17
17
18
-
## February 2023
18
+
## March 2023
19
19
20
20
|Service area |Updates |
21
21
|---------|---------|
22
-
|**OT networks**|**Cloud features**: <br>- [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot)<br>- [Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2](#microsoft-sentinel-microsoft-defender-for-iot-solution-version-202) <br>- [Download updates from the Sites and sensors page (Public preview)](#download-updates-from-the-sites-and-sensors-page-public-preview) <br>- [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) <br>- [Device inventory GA in the Azure portal](#device-inventory-ga-in-the-azure-portal) <br>- [Device inventory grouping enhancements (Public preview)](#device-inventory-grouping-enhancements-public-preview) <br><br> **Sensor version 22.2.3**: [Configure OT sensor settings from the Azure portal (Public preview)](#configure-ot-sensor-settings-from-the-azure-portal-public-preview)|
23
-
|**Enterprise IoT networks**|**Cloud features**: [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal)|
22
+
|**OT networks**|**Cloud features**: - [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot)|
24
23
25
24
### New Microsoft Sentinel incident experience for Defender for IoT
26
25
27
-
Microsoft Sentinel's new [incident experience](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/the-new-incident-experience-is-here/ba-p/3717042) includes specific features for Defender for IoT customers. SOC analysts can now use the following incident enhancements when investigating OT/IoT-related incidents:
26
+
Microsoft Sentinel's new [incident experience](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/the-new-incident-experience-is-here/ba-p/3717042) includes specific features for Defender for IoT customers. When investigating OT/IoT-related incidents, SOC analysts can now use the following enhancements on incident details pages:
27
+
28
+
-**View related sites, zones, sensors, and device importance** to better understand an incident's business impact and physical location.
28
29
29
-
-Better understand an incident's business impact and physical location by viewing the related sites, zones, sensors, and device importance on an incident details page
30
-
- Review a timeline of affected devices and related device details directly on the incident page, instead of investigating on entity details pages for the related devices
31
-
- Review OT alert remediation steps directly on the incident details page
30
+
-**Review an aggregated timeline of affected devices and related device details**, instead of investigating on separate entity details pages for the related devices
31
+
32
+
-**Review OT alert remediation steps** directly on the incident details page
32
33
33
34
For more information, see [Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md) and [Navigate and investigate incidents in Microsoft Sentinel](/azure/sentinel/investigate-incidents).
34
35
36
+
## February 2023
37
+
38
+
|Service area |Updates |
39
+
|---------|---------|
40
+
|**OT networks**|**Cloud features**: <br>- [Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2](#microsoft-sentinel-microsoft-defender-for-iot-solution-version-202) <br>- [Download updates from the Sites and sensors page (Public preview)](#download-updates-from-the-sites-and-sensors-page-public-preview) <br>- [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) <br>- [Device inventory GA in the Azure portal](#device-inventory-ga-in-the-azure-portal) <br>- [Device inventory grouping enhancements (Public preview)](#device-inventory-grouping-enhancements-public-preview) <br><br> **Sensor version 22.2.3**: [Configure OT sensor settings from the Azure portal (Public preview)](#configure-ot-sensor-settings-from-the-azure-portal-public-preview)|
41
+
|**Enterprise IoT networks**|**Cloud features**: [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal)|
42
+
43
+
35
44
### Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2
36
45
37
46
[Version 2.0.2](release-notes-sentinel.md#version-202) of the Microsoft Defender for IoT solution is now available in the [Microsoft Sentinel content hub](/azure/sentinel/sentinel-solutions-catalog), with improvements in analytics rules for incident creation, an enhanced incident details page, and performance improvements for analytics rule queries.
@@ -841,4 +850,4 @@ The following Defender for IoT options and configurations have been moved, remov
841
850
842
851
## Next steps
843
852
844
-
[Getting started with Defender for IoT](getting-started.md)
853
+
[Getting started with Defender for IoT](getting-started.md)
0 commit comments