You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**content**| String | Not nullable | Recommended mitigation steps for detected vulnerabilities |
561
561
|**scoreImprovement**| Integer | Nullable | Expected percentage of security improvement after mitigation steps are taken. |
562
-
|**details**| Table | Nullable | A table listing mitigation recommendations, such as would be generated in the **Risk assessment** report. Each recommendation includes details about possible security impact if the action is performed and more. For more information, see [Risk mitigation](../how-to-create-risk-assessment-reports.md#risk-mitigation). |
562
+
|**details**| Table | Nullable | A table listing mitigation recommendations, such as would be generated in the **Risk assessment** report. Each recommendation includes details about possible security impact if the action is performed and more. For more information, see [Risk mitigation](../how-to-create-risk-assessment-reports.md#risk-assessment-reporting). |
563
563
564
564
> [!NOTE]
565
565
> You might have multiple mitigation steps, with some returned in the `notifications` field, and others returned in the `mitigation` field. Items with `scoreImprovement` and `details` data is returned only in the `mitigation` field. Items without `scoreImprovement` and `details` data is returned only in the `notifications` field.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-risk-assessment-reports.md
+30-16Lines changed: 30 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,23 +9,39 @@ ms.topic: how-to
9
9
10
10
Risk assessment reports, generated by Defender for IoT OT network sensors and on-premises management consoles, provide details about security scores, vulnerabilities, and operational issues on detected devices as well as risks coming from imported firewall rules.
11
11
12
-
Take action based on the recommendations provided in the risk assesment reports to improve your overall network security score. For example, you might install the latest security or firmware updates, or investigate any PLCs that are currently in unsecure states.
12
+
Take action based on the recommendations provided in the risk assessment reports to improve your overall network security score. For example, you might install the latest security or firmware updates, or investigate any PLCs that are currently in unsecure states.
13
13
14
14
Each sensor has access to reports generated for that sensor, while the on-premises management console allows you view reports from all connected sensors from the same page. The on-premises management console also supports customizations for the logo that appears in your report.
15
15
16
16
## Prerequisites
17
17
18
18
- You must be an **Admin** user to import firewall rules to an OT sensor or add backup and anti-virus server addresses. <!--need to check this-->.
19
19
20
-
- You must be an **Admin** or **Security Analyst** user to create or view risk assesment reports on the OT sensor or on-premises management console.
20
+
- You must be an **Admin** or **Security Analyst** user to create or view risk assessment reports on the OT sensor or on-premises management console.
21
21
22
22
## Import firewall rules to a OT sensor
23
23
24
-
<!--put the firewall rules procedure here-->
24
+
Import firewall rules to your OT sensor for analysis in **Risk assessment** reports. Importing firewall rules is supported for Checkpoint, Fortinet, and Juniper firewalls.
25
+
26
+
- Checkpoint
27
+
- Fortinet
28
+
- Juniper
29
+
30
+
**To import firewall rules**:
31
+
32
+
1. Sign in to your sensor as an **Admin** user and elect **System Settings** > **Import settings** > **Firewall rules**.
33
+
1. In the **Firewall rules** pane:
34
+
35
+
- Select a firewall type from the dropdown menu
36
+
- Select **+ Import file** to browse to and select the file you want to import.
37
+
38
+
For example:
39
+
40
+
:::image type="content" source="media/how-to-create-risk-assessment-reports/import-firewall-rules.png" alt-text="Screenshot of how to import firewall rules." lightbox="media/how-to-create-risk-assessment-reports/import-firewall-rules.png":::
25
41
26
42
## Add backup and anti-virus server addresses to your sensor
27
43
28
-
Backup and anti-virus servers are not defined on your sensor by default. We recommend defining these addresses on your sensor to keep your network risk assesment low.
44
+
Backup and anti-virus servers are not defined on your sensor by default. We recommend defining these addresses on your sensor to keep your network risk assessment low.
29
45
30
46
**To add backup and anti-virus server addresses**:
31
47
@@ -37,31 +53,31 @@ Backup and anti-virus servers are not defined on your sensor by default. We reco
37
53
38
54
Use an individual OT sensor to view reports generated for that sensor only.
39
55
40
-
**To generate a report**:
56
+
**To generate a report**:
41
57
42
-
1. Sign in to the sensor console and select **Risk assesment** > **Generate report**. The report is generated and appears in the **Reports list**, along with the timestamp and report size.
58
+
1. Sign in to the sensor console and select **Risk assessment** > **Generate report**. The report is generated and appears in the **Reports list**, along with the timestamp and report size.
43
59
44
-
Reports are automatically named `risk-assesment-report-<integer>`, where the `<integer>` is incremented automatically.
60
+
Reports are automatically named `risk-assessment-report-<integer>`, where the `<integer>` is incremented automatically.
45
61
46
62
1. Select the report name to download it and open it in your browser.
47
63
48
-
## Create and view risk assesment reports for multiple sensors
64
+
## Create and view risk assessment reports for multiple sensors
49
65
50
-
Use an on-premises management console to create and view risk assesment reports for all connected sensors, or to customize your report logo.
66
+
Use an on-premises management console to create and view risk assessment reports for all connected sensors, or to customize your report logo.
51
67
52
68
**To generate a report**:
53
69
54
-
1. Sign in to your on-premises management console and select **Risk assesment**.
70
+
1. Sign in to your on-premises management console and select **Risk assessment**.
55
71
56
72
1. To customize the logo that appears on your report, select **Import logo**. Browse to and select the logo file you want to use.
57
73
58
74
1. From the **Select Sensor** drop-down menu, select the sensor for which you want to generate the report, and then select **Generate Report**.
59
75
60
76
A new report is listed in the **Archived Reports** area, listed by the time and date it was created, and showing the security score and report size.
61
-
77
+
62
78
1. Select **Download** to download a report and open it in your browser.
63
79
64
-
## Risk assesment report contents
80
+
## Risk assessment report contents
65
81
66
82
Risk assessment reports include the following details:
67
83
@@ -75,12 +91,12 @@ Risk assessment reports include the following details:
75
91
76
92
-**Vulnerable Devices** are devices with a security score below 70%.
77
93
78
-
- Insight into any of the following security and operational issues:<!--im not really even sure how much this list is helpful. it doesn't really tell me much.-->
94
+
- Insight into any of the following security and operational issues:
79
95
80
96
:::row:::
81
97
:::column span="":::
82
98
- Configuration issues
83
-
- Device vulnerability, prioritzed by security level
99
+
- Device vulnerability, prioritized by security level
84
100
- Network security issues
85
101
- Network operational issues
86
102
:::column-end:::
@@ -95,8 +111,6 @@ Risk assessment reports include the following details:
95
111
96
112
If you've imported firewall data to your sensor, the risk assessment reports also include data about firewall rule risk, based on the imported rules. The Risk Assessment report highlights if a rule is not secure, or if there's a mismatch between the rule and the monitored network.
97
113
98
-
<!--i don't really think that this screenshot is helpful out of context. we don't show screenshots for any other part of the report.-->
99
-
100
114
## Next steps
101
115
102
116
For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-set-up-your-network.md
-21Lines changed: 0 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,27 +173,6 @@ Open these ports to allow extra services for Defender for IoT.
173
173
| LDAPS | TCP | In/Out | 636 | Active Directory | Allows Active Directory management of users that have access, to sign in to the system | On-premises management console and Sensor | LDAPS server |
174
174
| Tunneling | TCP | In | 9000 </br></br> In addition to port 443 </br></br> Allows access from the sensor, or end user, to the on-premises management console </br></br> Port 22 from the sensor to the on-premises management console | Monitoring | Tunneling | Endpoint, Sensor | On-premises management console |
175
175
176
-
## Import firewall rules
177
-
178
-
Import firewall rules to your OT sensor for analysis in **Risk assessment** reports. Importing firewall rules is supported for Checkpoint, Fortinet, and Juniper firewalls.
179
-
180
-
- Checkpoint
181
-
- Fortinet
182
-
- Juniper
183
-
184
-
**To import firewall rules**:
185
-
186
-
1. Sign in to your sensor as an **Admin** user and elect **System Settings** > **Import settings** > **Firewall rules**.
187
-
1. In the **Firewall rules** pane:
188
-
189
-
- Select a firewall type from the dropdown menu
190
-
- Select **+ Import file** to browse to and select the file you want to import.
191
-
For example:
192
-
193
-
:::image type="content" source="media/how-to-set-up-your-network/import-firewall-rules.png" alt-text="Screenshot of how to import firewall rules." lightbox="media/how-to-set-up-your-network/import-firewall-rules.png":::
194
-
195
-
Firewall rules are analyzed in the [Risk Assessment report](how-to-create-risk-assessment-reports.md).
196
-
197
176
## Choose a cloud connection method
198
177
199
178
If you're setting up OT sensors and connecting them to the cloud, understand supported cloud connection methods, and make sure to connect your sensors as needed.
0 commit comments