Skip to content

Commit d236c5a

Browse files
committed
Merge branch 'sentinel-new-incident-exp' of https://github.com/batamig/azure-docs-pr into sentinel-new-incident-exp
2 parents 5c11322 + 2ec7958 commit d236c5a

File tree

2 files changed

+29
-22
lines changed

2 files changed

+29
-22
lines changed

articles/defender-for-iot/organizations/iot-advanced-threat-monitoring.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -85,40 +85,38 @@ After you’ve [configured your Defender for IoT data to trigger new incidents i
8585

8686
1. Above the incident grid, select the **Product name** filter and clear the **Select all** option. Then, select **Microsoft Defender for IoT** to view only incidents triggered by Defender for IoT alerts. For example:
8787

88-
:::image type="content" source="media/iot-solution/filter-incidents-defender-for-iot.png" alt-text="Screenshot of filtering incidents by product name for Defender for IoT devices.":::
88+
:::image type="content" source="media/iot-solution/filter-incidents-defender-for-iot.png" alt-text="Screenshot of filtering incidents by product name for Defender for IoT devices." lightbox="media/iot-solution/filter-incidents-defender-for-iot.png":::
8989

9090
1. Select a specific incident to begin your investigation.
9191

92-
In the incident details pane on the right, view details such as incident severity, a summary of the entities involved, any mapped MITRE ATT&CK tactics or techniques, and more.
92+
In the incident details pane on the right, view details such as incident severity, a summary of the entities involved, any mapped MITRE ATT&CK tactics or techniques, and more. For example:
9393

94-
:::image type="content" source="media/iot-solution/investigate-iot-incidents.png" alt-text="Screenshot of a Microsoft Defender for IoT incident in Microsoft Sentinel.":::
94+
:::image type="content" source="media/iot-solution/investigate-iot-incidents.png" alt-text="Screenshot of a Microsoft Defender for IoT incident in Microsoft Sentinel."lightbox="media/iot-solution/investigate-iot-incidents.png":::
9595

96-
1. Select the incident to open the incident details page, where you can find additional details. For example:
96+
1. Select **View full details** to open the incident details page, where you can drill down even more. For example:
9797

9898
- Understand the incident's business impact and physical location using details, like an IoT device's site, zone, sensor name, and device importance.
9999

100100
- Learn about recommended remediation steps by selecting an alert in the incident timeline and viewing the **Remediation steps** area.
101101

102-
- Select an IoT device entity from the **Entities** list to open its [device entity page](/azure/sentinel/entity-pages). Identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
103-
104-
> [!TIP]
105-
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane.
102+
- Select an IoT device entity from the **Entities** list to open its [device entity page](/azure/sentinel/entity-pages). For more information, see [Investigate further with IoT device entities](#investigate-further-with-iot-device-entities).
106103

107104
For more information, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
108105

109-
### Investigate further with IoT device entities
106+
> [!TIP]
107+
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane on the **Incidents** page.
110108
111-
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to view more details in the entities pane on the right. You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
109+
### Investigate further with IoT device entities
112110

113-
If you don't see your IoT device entity right away, select **View full details** under the entities listed to open the full incident page, and then check the **Entities** tab. Select an IoT device entity to view entity details on the right, including basic device details, owner contact information, and a timeline of events that occurred on the device.
111+
When you are investigating an incident in Microsoft Sentinel and have the incident details pane open on the right, select an IoT device entity from the **Entities** list to view more details about the selected entity. Identify an *IoT device* by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
114112

115-
To drill down even further, select the IoT device entity link and open the device entity details page. For more information, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md).
113+
If you don't see your IoT device entity right away, select **View full details** to open the full incident page, and then check the **Entities** tab. Select an IoT device entity to view more entity data, like basic device details, owner contact information, and a timeline of events that occurred on the device.
116114

117-
You can also hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
115+
To drill down even further, select the IoT device entity link and open the device entity details page, or hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
118116

119117
:::image type="content" source="media/iot-solution/entity-behavior-iot-devices-alerts.png" alt-text="Screenshot of IoT devices by number of alerts on entity behavior page.":::
120118

121-
For more information on how to investigate incidents and use the investigation graph, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
119+
For more information, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md) and [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
122120

123121
### Investigate the alert in Defender for IoT
124122

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,23 +15,32 @@ Features released earlier than nine months ago are described in the [What's new
1515
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1616
>
1717
18-
## February 2023
18+
## March 2023
1919

2020
|Service area |Updates |
2121
|---------|---------|
22-
| **OT networks** | **Cloud features**: <br>- [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot)<br>- [Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2](#microsoft-sentinel-microsoft-defender-for-iot-solution-version-202) <br>- [Download updates from the Sites and sensors page (Public preview)](#download-updates-from-the-sites-and-sensors-page-public-preview) <br>- [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) <br>- [Device inventory GA in the Azure portal](#device-inventory-ga-in-the-azure-portal) <br>- [Device inventory grouping enhancements (Public preview)](#device-inventory-grouping-enhancements-public-preview) <br><br> **Sensor version 22.2.3**: [Configure OT sensor settings from the Azure portal (Public preview)](#configure-ot-sensor-settings-from-the-azure-portal-public-preview) |
23-
| **Enterprise IoT networks** | **Cloud features**: [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) |
22+
| **OT networks** | **Cloud features**: - [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot) |
2423

2524
### New Microsoft Sentinel incident experience for Defender for IoT
2625

27-
Microsoft Sentinel's new [incident experience](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/the-new-incident-experience-is-here/ba-p/3717042) includes specific features for Defender for IoT customers. SOC analysts can now use the following incident enhancements when investigating OT/IoT-related incidents:
26+
Microsoft Sentinel's new [incident experience](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/the-new-incident-experience-is-here/ba-p/3717042) includes specific features for Defender for IoT customers. When investigating OT/IoT-related incidents, SOC analysts can now use the following enhancements on incident details pages:
27+
28+
- **View related sites, zones, sensors, and device importance** to better understand an incident's business impact and physical location.
2829

29-
- Better understand an incident's business impact and physical location by viewing the related sites, zones, sensors, and device importance on an incident details page
30-
- Review a timeline of affected devices and related device details directly on the incident page, instead of investigating on entity details pages for the related devices
31-
- Review OT alert remediation steps directly on the incident details page
30+
- **Review an aggregated timeline of affected devices and related device details**, instead of investigating on separate entity details pages for the related devices
31+
32+
- **Review OT alert remediation steps** directly on the incident details page
3233

3334
For more information, see [Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md) and [Navigate and investigate incidents in Microsoft Sentinel](/azure/sentinel/investigate-incidents).
3435

36+
## February 2023
37+
38+
|Service area |Updates |
39+
|---------|---------|
40+
| **OT networks** | **Cloud features**: <br>- [Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2](#microsoft-sentinel-microsoft-defender-for-iot-solution-version-202) <br>- [Download updates from the Sites and sensors page (Public preview)](#download-updates-from-the-sites-and-sensors-page-public-preview) <br>- [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) <br>- [Device inventory GA in the Azure portal](#device-inventory-ga-in-the-azure-portal) <br>- [Device inventory grouping enhancements (Public preview)](#device-inventory-grouping-enhancements-public-preview) <br><br> **Sensor version 22.2.3**: [Configure OT sensor settings from the Azure portal (Public preview)](#configure-ot-sensor-settings-from-the-azure-portal-public-preview) |
41+
| **Enterprise IoT networks** | **Cloud features**: [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) |
42+
43+
3544
### Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2
3645

3746
[Version 2.0.2](release-notes-sentinel.md#version-202) of the Microsoft Defender for IoT solution is now available in the [Microsoft Sentinel content hub](/azure/sentinel/sentinel-solutions-catalog), with improvements in analytics rules for incident creation, an enhanced incident details page, and performance improvements for analytics rule queries.
@@ -841,4 +850,4 @@ The following Defender for IoT options and configurations have been moved, remov
841850

842851
## Next steps
843852

844-
[Getting started with Defender for IoT](getting-started.md)
853+
[Getting started with Defender for IoT](getting-started.md)

0 commit comments

Comments
 (0)