You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md
+25-10Lines changed: 25 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,15 @@ ms.topic: how-to
7
7
8
8
# Create attack vector reports
9
9
10
-
Attack vector reports show a chain of vulnerable devices in a specified attack path. Simulate an attack on a specific target in your network to discover vulnerable devices and analyze attack vectors in real time.
10
+
Attack vector reports show a chain of vulnerable devices in a specified attack path, for devices detected by a specific OT network sensor. Simulate an attack on a specific target in your network to discover vulnerable devices and analyze attack vectors in real time.
11
11
12
-
Attack vector reports can also help evaluate mitigation activities to ensure that you're taking all required steps to reduce the risk to your network. For example, use an attack vector report to understand whether a system upgrade would disrupt the attacker's path, or if an alternate attack path still remains.
12
+
Attack vector reports can also help evaluate mitigation activities to ensure that you're taking all required steps to reduce the risk to your network. For example, use an attack vector report to understand whether a software update would disrupt the attacker's path, or if an alternate attack path still remains.
13
13
14
14
## Prerequisites
15
15
16
-
You must be an **Admin** or **Security Analyst**[user](roles-on-premises.md) to create an attack vector report.
16
+
To create attack vector reports, you must be able to access the OT network sensor you want to generate data for, as an **Admin** or **Security Analyst** user.
17
+
18
+
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md)
17
19
18
20
## Generate an attack vector simulation
19
21
@@ -37,24 +39,37 @@ Generate an attack vector simulation so that you can view the resulting report.
37
39
|**Exclude Subnets**| Select one or more subnets to exclude from the attack vector simulation.|
38
40
39
41
1. Select **Save**. Your simulation is added to the list, with the number of attack paths indicated in parenthesis.
40
-
1. Expand your simulation to view the list of possible attack vector, and select one to view more details on the right. For example:
42
+
43
+
1. Expand your simulation to view the list of possible attack vectors, and select one to view more details on the right.
44
+
45
+
For example:
46
+
41
47
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report." lightbox="media/how-to-generate-reports/sample-attack-vectors.png":::
42
48
43
49
## View an attack vector in the Device Map
44
50
45
-
The Device map provides, among [other things](how-to-work-with-the-sensor-device-map.md), a graphical representation of vulnerable devices detected in attack vector reports. To view an attack vector in the Device map:
51
+
The Device map provides a graphical representation of vulnerable devices detected in attack vector reports. To view an attack vector in the Device map:
46
52
47
53
1. In the **Attack vector** page, make sure your simulation has **Show in Device map** toggled on.
48
54
1. Select **Device map** from the side menu.
49
-
1. Select your simulation and then select an attack vector to visualize the devices in your map. For example:
55
+
1. Select your simulation and then select an attack vector to visualize the devices in your map.
56
+
57
+
For example:
58
+
50
59
:::image type="content" source="media/how-to-generate-reports/sample-device-map.png" alt-text="Screen shot of Device map." lightbox="media/how-to-generate-reports/sample-device-map.png":::
51
60
61
+
For more information, see [Investigate sensor detections in the Device map](how-to-work-with-the-sensor-device-map.md)
62
+
52
63
## Next steps
53
64
54
-
Continue creating other reports for more security data from your OT sensor. For more information, see:
65
+
- Enhance security posture with Azure security [recommendations](recommendations.md).
-View additional reports based on cloud-connected sensors in the Azure portal. For more information, see [Visualize Microsoft Defender for IoT data with Azure Monitor workbooks](workbooks.md)
57
68
58
-
-[Sensor data mining queries](how-to-create-data-mining-queries.md)
69
+
-Continue creating other reports for more security data from your OT sensor. For more information, see:
59
70
60
-
-[Create trends and statistics dashboards](how-to-create-trends-and-statistics-reports.md)
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md
+62-53Lines changed: 62 additions & 53 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,91 +7,100 @@ ms.topic: how-to
7
7
8
8
# Create data mining queries
9
9
10
-
Running data mining queries provides dynamic and detailed information about your network devices. This includes information for specific time periods, internet connectivity, ports and protocols, firmware versions, programming commands, and device state.
10
+
Run data mining queries to view details about the network devices detected by your OT sensor, like internet connectivity, ports and protocols, firmware versions, programming commands, and device state.
11
11
12
-
Data mining information is saved and stored continuously, except for when a device is deleted. Data mining results can be exported and stored externally to a secure server. In addition, the sensor performs automatic daily backups to ensure system continuity and preservation of data.
12
+
Defender for IoT OT network sensors provide a series of out-of-the-box reports for you to use. Both out-of-the-box and custom data mining reports always show information that’s correct for the day you’re viewing the report, rather than the day the report or query was created.
13
+
14
+
Data mining query data continuously is saved until a device is deleted, and is automatically backed on a daily basis to ensure system continuity.
13
15
14
16
## Prerequisites
15
17
16
-
You must be an **Admin** or **Security Analyst**[user](roles-on-premises.md) to access predefined data mining reports.
18
+
To create data mining reports, you must be able to access the OT network sensor you want to generate data for as an **Admin** or **Security Analyst** user.
19
+
20
+
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md)
21
+
22
+
## View an OT sensor predefined data mining report
23
+
24
+
To view current data on a predefined, out-of-the-box data mining report, sign into the OT sensor and select **Data Mining** on the left.
25
+
26
+
The following out-of-the-box reports are listed in the **Recommended** area, ready for you to use:
27
+
28
+
| Report | Description |
29
+
|---------|---------|
30
+
|**Programming Commands**| Lists all detected devices that send industrial programming commands. |
31
+
|**Internet Activity**| Lists all detected devices that are connected to the internet. |
32
+
|**Excluded CVEs**| Lists all detected devices that have CVEs that were manually excluded from the **CVEs** report. |
33
+
|**Active Devices (Last 24 Hours)**| Lists all detective devices that have had active traffic within the last 24 hours. |
34
+
|**Remote Access**| Lists all detected devices that communicate through remote session protocols. |
35
+
| **CVEs** | Lists all detected devices with known vulnerabilities, along with CVSSv2 risk scores.
36
+
Select **Edit** to delete and exclude specific CVEs from the report. <br><br> **Tip**: Delete CVEs to exclude them from the list to have your attack vector reports to reflect your network more accurately. |
37
+
|**Nonactive Devices (Last 7 Days)**| Lists all detected devices that haven't communicated for the past seven days. |
17
38
18
-
## Create a report
39
+
Select a report to view today’s data. Use the :::image type="icon" source="media/how-to-generate-reports/refresh-icon.png" border="false"::: **Refresh**, :::image type="icon" source="media/how-to-generate-reports/expand-all-icon.png" border="false"::: **Expand all**, and :::image type="icon" source="media/how-to-generate-reports/collapse-all-icon.png" border="false"::: **Collapse all** options to update and change your report views.
19
40
20
-
Reports are dynamically updated each time you open them. The report shows information that's accurate for the date of viewing the report, rather than the date of creating the report.
41
+
## Create an OT sensor custom data mining report
21
42
22
-
**To generate a report**:
43
+
Create your own custom data mining report if you have reporting needs not covered by the out-of-the-box reports. Once created, custom data mining reports are visible to all users.
23
44
24
-
1. Select **Data Mining** from the side menu. Predefined suggested reports appear automatically.
45
+
**To create a custom data mining report**:
25
46
26
-
1.Select **Create report**and then enter the following values:
47
+
1.Sign into the OT sensor and select **Data Mining** > **Create report**.
27
48
28
-
| Parameter | Description |
49
+
1. In the **Create new report** pane on the right, enter the following values:
50
+
51
+
| Name | Description |
29
52
|---------|---------|
30
53
|**Name** / **Description**| Enter a meaningful name for your report and an optional description. |
31
-
|**Send to CM**|Toggle this option on to send your report to your on-premises management console. |
54
+
|**Send to CM**|Select to send your report to the on-premises management console. |
32
55
|**Choose category**| Select the categories to include in your report. |
33
56
|**Order by**| Select to sort your data by category or by activity. |
34
-
|**Filter by**| Define a filter for your report, using dates, IP address, MAC address, port, or device group. |
35
-
36
-
1. Select **Save** to save your report and display results on the **Data Mining** page.
57
+
|**Filter by**| Define a filter for your report using any of the following parameters: <br><br> - **Results within the last**: Enter a number and then select **Minutes**, **Hours**, or **Days** <br> - **IP address / MAC address / Port**: Enter one or more IP addresses, MAC addresses, and ports to filter into your report. Enter a value and then select + to add it to the list.<br> - **Device group**: Select one or mode device groups to filter into your report. |
58
+
|**Add filter type**| Select to add any of the following filter types into your report. <br><br> - Transport (GENERIC) <br> - Protocol (GENERIC) <br> - TAG (GENERIC) <br> - Maximum value (GENERIC) <br> - State (GENERIC) <br> - Minimum value (GENERIC) <br><br> Enter a value in the relevant field and then select + to add it to the list. |
37
59
38
-
## Custom data mining reports
60
+
1. Select **Save**. Your data mining report is shown in the **My reports** area. For example:
39
61
40
-
Customize your data mining queries, using the different parameters in the **Create new report** pane, to:
41
-
42
-
| Purpose | Description |
43
-
|---------|---------|
44
-
|**SOC incident response**| Generate a report in real time to help deal with immediate incident response. For example, Data Mining can generate a report for a list of devices that might require patching. |
45
-
|**Forensics**| Generate a report based on historical data for investigative reports. |
46
-
|**Network security**| Generate a report that helps improve overall network security. For example, generate a report that lists devices with weak authentication credentials. |
47
-
|**Visibility**| Generate a report that covers all query items to view all baseline parameters of your network. |
48
-
|**PLC security**| Improve security by detecting PLCs in unsecure states, such as Program and Remote states. |
62
+
:::image type="content" source="media/how-to-generate-reports/custom-data-mining-reports.png" alt-text="Screenshot of a list of customized data mining reports." lightbox="media/how-to-generate-reports/custom-data-mining-reports.png":::
49
63
50
-
## Predefined data mining reports
64
+
## Manage OT sensor data mining report data
51
65
52
-
The following predefined reports are available in the **Data Mining** page. These queries are generated in real time.
66
+
Each data mining report on an OT sensor has the following options for managing your data:
53
67
54
-
|Report| Description |
68
+
|Option| Description |
55
69
|---------|---------|
56
-
|**Programming commands**| Devices that send industrial programming. |
57
-
|**Remote access**| Devices that communicate through remote session protocols. |
58
-
|**Internet activity**| Devices that are connected to the internet. |
59
-
|**CVEs**| A list of devices detected with known vulnerabilities, along with CVSSv2 risk scores. |
60
-
|**Excluded CVEs**| A list of all the CVEs that were manually excluded. Customize the CVE list manually if you want the VA reports and attack vectors to reflect your network more accurately. Customization includes excluding or including particular CVEs and updating the CVSSv2 score accordingly. |
61
-
|**Nonactive devices**| Devices that haven't communicated for the past seven days. |
62
-
|**Active devices**| Active network devices within the last 24 hours. |
70
+
| :::image type="icon" source="media/how-to-generate-reports/export-icon.png" border="false"::: **Export to CSV**| Export the current report data to a CSV file. |
71
+
| :::image type="icon" source="media/how-to-generate-reports/export-icon.png" border="false"::: **Export to PDF**| Export the current report data to a PDF file. |
72
+
| :::image type="icon" source="media/how-to-generate-reports/snapshot-icon.png" border="false"::: **Snapshots**| Save the current report data as a snapshot you can return to later. |
73
+
| :::image type="icon" source="media/how-to-generate-reports/manage-icon.png" border="false"::: **Manage report**| Update the values of an existing custom data mining report. |
74
+
| :::image type="icon" source="media/how-to-generate-reports/edit-icon.png" border="false"::: **Edit mode**| Select to remove specific results from the saved report. |
63
75
64
-
## Generate reports in on-premises management console
76
+
For example:
65
77
66
-
The on-premises management console lets you generatereports for each sensor that's connected to it. For each sensor, you can generate a default report or a custom report configured on that sensor. When you choose a sensor from the on-premises management console, all the custom reports configured on that sensor appear in the list of reports.
78
+
:::image type="content" source="media/how-to-generate-reports/manage-report-pane.png" alt-text="Screenshot of the manage report pane." lightbox="media/how-to-generate-reports/manage-report-pane.png":::
67
79
68
-
**To generate a report**:
80
+
## View data mining reports for multiple sensors
69
81
70
-
1. Select **Reports** from the side menu.
82
+
Sign into an on-premises management console to view [out-of-the-box data mining reports](#view-an-ot-sensor-predefined-data-mining-report) and custom reports for any connected sensor.
71
83
72
-
2. From the **Sensors** drop-down list, select the sensor for which you want to generate the report.
84
+
**To view a data mining report from an on-premises management console**:
73
85
74
-
3. From the **Select Report** drop-down list, select the report that you want to generate.
86
+
Sign into your on-premises management console and select
75
87
76
-
4. To create a PDF of the report results, select :::image type="icon" source="media/how-to-generate-reports/pdf-report-icon.png" border="false":::.
88
+
1.**Reports** on the left.
77
89
78
-
## Default reports in on-premises management console
90
+
1. From the **Sensors** drop-down list, select the sensor for which you want to generate the report.
79
91
80
-
Reports are based on sensor data-mining queries that are performed, and include:
92
+
1. From the **Select Report** drop-down list, select the report that you want to generate.
81
93
82
-
| Information | Description |
83
-
|---------|---------|
84
-
|**Active Devices (Last 24 Hours)**| Presents a list of devices that show network activity within a period of 24 hours. |
85
-
|**Non-Active Devices (Last 7 Days)**| Presents a list of devices that show no network activity in the last seven days. |
86
-
|**Programming Commands**| Presents a list of devices that sent programming commands within the last 24 hours. |
87
-
|**Remote Access**| Presents a list of devices that remote sources accessed within the last 24 hours. |
94
+
The page lists the current report data. Select :::image type="icon" source="media/how-to-generate-reports/pdf-report-icon.png" border="false"::: to export the data to a PDF file.
88
95
89
96
## Next steps
90
97
91
-
Continue creating other reports for more security data from your OT sensor. For more information, see:
- View additional reports based on cloud-connected sensors in the Azure portal. For more information, see [Visualize Microsoft Defender for IoT data with Azure Monitor workbooks](workbooks.md)
0 commit comments