You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/iot-advanced-threat-monitoring.md
+15-17Lines changed: 15 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,40 +85,38 @@ After you’ve [configured your Defender for IoT data to trigger new incidents i
85
85
86
86
1. Above the incident grid, select the **Product name** filter and clear the **Select all** option. Then, select **Microsoft Defender for IoT** to view only incidents triggered by Defender for IoT alerts. For example:
87
87
88
-
:::image type="content" source="media/iot-solution/filter-incidents-defender-for-iot.png" alt-text="Screenshot of filtering incidents by product name for Defender for IoT devices.":::
88
+
:::image type="content" source="media/iot-solution/filter-incidents-defender-for-iot.png" alt-text="Screenshot of filtering incidents by product name for Defender for IoT devices." lightbox="media/iot-solution/filter-incidents-defender-for-iot.png":::
89
89
90
90
1. Select a specific incident to begin your investigation.
91
91
92
-
In the incident details pane on the right, view details such as incident severity, a summary of the entities involved, any mapped MITRE ATT&CK tactics or techniques, and more.
92
+
In the incident details pane on the right, view details such as incident severity, a summary of the entities involved, any mapped MITRE ATT&CK tactics or techniques, and more. For example:
93
93
94
-
:::image type="content" source="media/iot-solution/investigate-iot-incidents.png" alt-text="Screenshot of a Microsoft Defender for IoT incident in Microsoft Sentinel.":::
94
+
:::image type="content" source="media/iot-solution/investigate-iot-incidents.png" alt-text="Screenshot of a Microsoft Defender for IoT incident in Microsoft Sentinel."lightbox="media/iot-solution/investigate-iot-incidents.png":::
95
95
96
-
> [!TIP]
97
-
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane.
96
+
1. Select **View full details** to open the incident details page, where you can drill down even more. For example:
98
97
99
-
For more information on how to investigate incidents and use the investigation graph, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
98
+
- Understand the incident's business impact and physical location using details, like an IoT device's site, zone, sensor name, and device importance.
100
99
101
-
### Investigate further with IoT device entities
102
-
103
-
When investigating an incident in Microsoft Sentinel, in an incident details pane, select an IoT device entity from the **Entities** list to open its [device entity page]](/azure/sentinel/entity-pages).
100
+
- Learn about recommended remediation steps by selecting an alert in the incident timeline and viewing the **Remediation steps** area.
104
101
105
-
You can identify an IoT device by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
102
+
- Select an IoT device entity from the **Entities** list to open its [device entity page](/azure/sentinel/entity-pages). For more information, see [Investigate further with IoT device entities](#investigate-further-with-iot-device-entities).
106
103
107
-
If you don't see your IoT device entity right away, select **View full details** under the entities listed to open the full incident page. In the **Entities** tab, select an IoT device to open its entity page. For example:
104
+
For more information, see [Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
108
105
109
-
:::image type="content" source="media/iot-solution/incident-full-details-iot-device.png" alt-text="Screenshot of a full detail incident page.":::
106
+
> [!TIP]
107
+
> To investigate the incident in Defender for IoT, select the **Investigate in Microsoft Defender for IoT** link at the top of the incident details pane on the **Incidents** page.
110
108
111
-
The IoT device entity page provides contextual device information, with basic device details and device owner contact information. The device entity page can help prioritize remediation based on device importance and business impact, as per each alert's site, zone, and sensor. For example:
109
+
### Investigate further with IoT device entities
112
110
113
-
:::image type="content" source="media/iot-solution/iot-device-entity-page.png" alt-text="Screenshot of the IoT device entity page.":::
111
+
When you are investigating an incident in Microsoft Sentinel and have the incident details pane open on the right, select an IoT device entity from the **Entities** list to view more details about the selected entity. Identify an *IoT device* by the IoT device icon: :::image type="icon" source="media/iot-solution/iot-device-icon.png" border="false":::
114
112
115
-
For more information on entity pages, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md).
113
+
If you don't see your IoT device entity right away, select **View full details** to open the full incident page, and then check the **Entities** tab. Select an IoT device entity to view more entity data, like basic device details, owner contact information, and a timeline of events that occurred on the device.
116
114
117
-
You can also hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
115
+
To drill down even further, select the IoT device entity link and open the device entity details page, or hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
118
116
119
117
:::image type="content" source="media/iot-solution/entity-behavior-iot-devices-alerts.png" alt-text="Screenshot of IoT devices by number of alerts on entity behavior page.":::
120
118
121
-
For more information on how to investigate incidents and use the investigation graph, see[Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
119
+
For more information, see [Investigate entities with entity pages in Microsoft Sentinel](../../sentinel/entity-pages.md) and[Investigate incidents with Microsoft Sentinel](../../sentinel/investigate-cases.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+21-4Lines changed: 21 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,13 +15,32 @@ Features released earlier than nine months ago are described in the [What's new
15
15
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
16
16
>
17
17
18
+
## March 2023
19
+
20
+
|Service area |Updates |
21
+
|---------|---------|
22
+
|**OT networks**|**Cloud features**: - [New Microsoft Sentinel incident experience for Defender for IoT](#new-microsoft-sentinel-incident-experience-for-defender-for-iot)|
23
+
24
+
### New Microsoft Sentinel incident experience for Defender for IoT
25
+
26
+
Microsoft Sentinel's new [incident experience](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/the-new-incident-experience-is-here/ba-p/3717042) includes specific features for Defender for IoT customers. When investigating OT/IoT-related incidents, SOC analysts can now use the following enhancements on incident details pages:
27
+
28
+
-**View related sites, zones, sensors, and device importance** to better understand an incident's business impact and physical location.
29
+
30
+
-**Review an aggregated timeline of affected devices and related device details**, instead of investigating on separate entity details pages for the related devices
31
+
32
+
-**Review OT alert remediation steps** directly on the incident details page
33
+
34
+
For more information, see [Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md) and [Navigate and investigate incidents in Microsoft Sentinel](/azure/sentinel/investigate-incidents).
35
+
18
36
## February 2023
19
37
20
38
|Service area |Updates |
21
39
|---------|---------|
22
40
|**OT networks**|**Cloud features**: <br>- [Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2](#microsoft-sentinel-microsoft-defender-for-iot-solution-version-202) <br>- [Download updates from the Sites and sensors page (Public preview)](#download-updates-from-the-sites-and-sensors-page-public-preview) <br>- [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal) <br>- [Device inventory GA in the Azure portal](#device-inventory-ga-in-the-azure-portal) <br>- [Device inventory grouping enhancements (Public preview)](#device-inventory-grouping-enhancements-public-preview) <br><br> **Sensor version 22.2.3**: [Configure OT sensor settings from the Azure portal (Public preview)](#configure-ot-sensor-settings-from-the-azure-portal-public-preview)|
23
41
|**Enterprise IoT networks**|**Cloud features**: [Alerts page GA in the Azure portal](#alerts-ga-in-the-azure-portal)|
24
42
43
+
25
44
### Microsoft Sentinel: Microsoft Defender for IoT solution version 2.0.2
26
45
27
46
[Version 2.0.2](release-notes-sentinel.md#version-202) of the Microsoft Defender for IoT solution is now available in the [Microsoft Sentinel content hub](/azure/sentinel/sentinel-solutions-catalog), with improvements in analytics rules for incident creation, an enhanced incident details page, and performance improvements for analytics rule queries.
@@ -85,7 +104,7 @@ For more information, see [Define and view OT sensor settings from the Azure por
85
104
86
105
### Alerts GA in the Azure portal
87
106
88
-
The **Alerts** page in the Azure portal is now out for General Availability. Microsoft Defender for IoT alerts enhance your network security and operations with real-time details about events detected in your network. Alerts are triggered when OT or Enterprise IoT network sensors, or the [Defender for IoT micro agent](../device-builders/index.yml), detect changes or suspicious activity in network traffic that need your attention.
107
+
The **Alerts** page in the Azure portal is now out for General Availability. Microsoft Defender for IoT alerts enhance your network security and operations with real-time details about events detected in your network. Alerts are triggered when OT or Enterprise IoT network sensors, or the [Defender for IoT micro agent](../device-builders/index.yml), detect changes or suspicious activity in network traffic that needs your attention.
89
108
90
109
Specific alerts triggered by the Enterprise IoT sensor currently remain in public preview.
91
110
@@ -101,8 +120,6 @@ For more information, see:
101
120
|---------|---------|
102
121
|**OT networks**|**Sensor version 22.3.4**: [Azure connectivity status shown on OT sensors](#azure-connectivity-status-shown-on-ot-sensors)<br><br>**Sensor version 22.2.3**: [Update sensor software from the Azure portal](#update-sensor-software-from-the-azure-portal-public-preview)|
103
122
104
-
105
-
106
123
### Update sensor software from the Azure portal (Public preview)
107
124
108
125
For cloud-connected sensor versions [22.2.3](release-notes.md#2223) and higher, now you can update your sensor software directly from the new **Sites and sensors** page on the Azure portal.
@@ -833,4 +850,4 @@ The following Defender for IoT options and configurations have been moved, remov
833
850
834
851
## Next steps
835
852
836
-
[Getting started with Defender for IoT](getting-started.md)
853
+
[Getting started with Defender for IoT](getting-started.md)
0 commit comments