Skip to content

Commit dfde10b

Browse files
committed
adding icons, screenshots, and Batami's feedback
1 parent 2ba7809 commit dfde10b

24 files changed

+151
-96
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -111,14 +111,14 @@
111111
href: workbooks.md
112112
- name: Create OT sensor reports
113113
items:
114-
- name: Create risk assessment reports
115-
href: how-to-create-risk-assessment-reports.md
116-
- name: Create attack vector reports
117-
href: how-to-create-attack-vector-reports.md
118114
- name: Create data mining reports
119115
href: how-to-create-data-mining-queries.md
116+
- name: Create risk assessment reports
117+
href: how-to-create-risk-assessment-reports.md
120118
- name: Create trends and statistics reports
121119
href: how-to-create-trends-and-statistics-reports.md
120+
- name: Create attack vector reports
121+
href: how-to-create-attack-vector-reports.md
122122
- name: View OT threats by location from an OT sensor
123123
href: how-to-gain-insight-into-global-regional-and-local-threats.md
124124
- name: Analyze OT programming details and changes

articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md

Lines changed: 25 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,15 @@ ms.topic: how-to
77

88
# Create attack vector reports
99

10-
Attack vector reports show a chain of vulnerable devices in a specified attack path. Simulate an attack on a specific target in your network to discover vulnerable devices and analyze attack vectors in real time.
10+
Attack vector reports show a chain of vulnerable devices in a specified attack path, for devices detected by a specific OT network sensor. Simulate an attack on a specific target in your network to discover vulnerable devices and analyze attack vectors in real time.
1111

12-
Attack vector reports can also help evaluate mitigation activities to ensure that you're taking all required steps to reduce the risk to your network. For example, use an attack vector report to understand whether a system upgrade would disrupt the attacker's path, or if an alternate attack path still remains.
12+
Attack vector reports can also help evaluate mitigation activities to ensure that you're taking all required steps to reduce the risk to your network. For example, use an attack vector report to understand whether a software update would disrupt the attacker's path, or if an alternate attack path still remains.
1313

1414
## Prerequisites
1515

16-
You must be an **Admin** or **Security Analyst** [user](roles-on-premises.md) to create an attack vector report.
16+
To create attack vector reports, you must be able to access the OT network sensor you want to generate data for, as an **Admin** or **Security Analyst** user.
17+
18+
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md)
1719

1820
## Generate an attack vector simulation
1921

@@ -37,24 +39,37 @@ Generate an attack vector simulation so that you can view the resulting report.
3739
| **Exclude Subnets** | Select one or more subnets to exclude from the attack vector simulation.|
3840

3941
1. Select **Save**. Your simulation is added to the list, with the number of attack paths indicated in parenthesis.
40-
1. Expand your simulation to view the list of possible attack vector, and select one to view more details on the right. For example:
42+
43+
1. Expand your simulation to view the list of possible attack vectors, and select one to view more details on the right.
44+
45+
For example:
46+
4147
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report." lightbox="media/how-to-generate-reports/sample-attack-vectors.png":::
4248

4349
## View an attack vector in the Device Map
4450

45-
The Device map provides, among [other things](how-to-work-with-the-sensor-device-map.md), a graphical representation of vulnerable devices detected in attack vector reports. To view an attack vector in the Device map:
51+
The Device map provides a graphical representation of vulnerable devices detected in attack vector reports. To view an attack vector in the Device map:
4652

4753
1. In the **Attack vector** page, make sure your simulation has **Show in Device map** toggled on.
4854
1. Select **Device map** from the side menu.
49-
1. Select your simulation and then select an attack vector to visualize the devices in your map. For example:
55+
1. Select your simulation and then select an attack vector to visualize the devices in your map.
56+
57+
For example:
58+
5059
:::image type="content" source="media/how-to-generate-reports/sample-device-map.png" alt-text="Screen shot of Device map." lightbox="media/how-to-generate-reports/sample-device-map.png":::
5160

61+
For more information, see [Investigate sensor detections in the Device map](how-to-work-with-the-sensor-device-map.md)
62+
5263
## Next steps
5364

54-
Continue creating other reports for more security data from your OT sensor. For more information, see:
65+
- Enhance security posture with Azure security [recommendations](recommendations.md).
5566

56-
- [Risk assessment reporting](how-to-create-risk-assessment-reports.md)
67+
- View additional reports based on cloud-connected sensors in the Azure portal. For more information, see [Visualize Microsoft Defender for IoT data with Azure Monitor workbooks](workbooks.md)
5768

58-
- [Sensor data mining queries](how-to-create-data-mining-queries.md)
69+
- Continue creating other reports for more security data from your OT sensor. For more information, see:
5970

60-
- [Create trends and statistics dashboards](how-to-create-trends-and-statistics-reports.md)
71+
- [Risk assessment reporting](how-to-create-risk-assessment-reports.md)
72+
73+
- [Sensor data mining queries](how-to-create-data-mining-queries.md)
74+
75+
- [Create trends and statistics dashboards](how-to-create-trends-and-statistics-reports.md)

articles/defender-for-iot/organizations/how-to-create-data-mining-queries.md

Lines changed: 62 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -7,91 +7,100 @@ ms.topic: how-to
77

88
# Create data mining queries
99

10-
Running data mining queries provides dynamic and detailed information about your network devices. This includes information for specific time periods, internet connectivity, ports and protocols, firmware versions, programming commands, and device state.
10+
Run data mining queries to view details about the network devices detected by your OT sensor, like internet connectivity, ports and protocols, firmware versions, programming commands, and device state.
1111

12-
Data mining information is saved and stored continuously, except for when a device is deleted. Data mining results can be exported and stored externally to a secure server. In addition, the sensor performs automatic daily backups to ensure system continuity and preservation of data.
12+
Defender for IoT OT network sensors provide a series of out-of-the-box reports for you to use. Both out-of-the-box and custom data mining reports always show information that’s correct for the day you’re viewing the report, rather than the day the report or query was created.
13+
14+
Data mining query data continuously is saved until a device is deleted, and is automatically backed on a daily basis to ensure system continuity.
1315

1416
## Prerequisites
1517

16-
You must be an **Admin** or **Security Analyst** [user](roles-on-premises.md) to access predefined data mining reports.
18+
To create data mining reports, you must be able to access the OT network sensor you want to generate data for as an **Admin** or **Security Analyst** user.
19+
20+
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md)
21+
22+
## View an OT sensor predefined data mining report
23+
24+
To view current data on a predefined, out-of-the-box data mining report, sign into the OT sensor and select **Data Mining** on the left.
25+
26+
The following out-of-the-box reports are listed in the **Recommended** area, ready for you to use:
27+
28+
| Report | Description |
29+
|---------|---------|
30+
| **Programming Commands** | Lists all detected devices that send industrial programming commands. |
31+
| **Internet Activity** | Lists all detected devices that are connected to the internet. |
32+
| **Excluded CVEs** | Lists all detected devices that have CVEs that were manually excluded from the **CVEs** report. |
33+
| **Active Devices (Last 24 Hours)** | Lists all detective devices that have had active traffic within the last 24 hours. |
34+
| **Remote Access** | Lists all detected devices that communicate through remote session protocols. |
35+
| **CVEs** | Lists all detected devices with known vulnerabilities, along with CVSSv2 risk scores.
36+
Select **Edit** to delete and exclude specific CVEs from the report. <br><br> **Tip**: Delete CVEs to exclude them from the list to have your attack vector reports to reflect your network more accurately. |
37+
| **Nonactive Devices (Last 7 Days)** | Lists all detected devices that haven't communicated for the past seven days. |
1738

18-
## Create a report
39+
Select a report to view today’s data. Use the :::image type="icon" source="media/how-to-generate-reports/refresh-icon.png" border="false"::: **Refresh**, :::image type="icon" source="media/how-to-generate-reports/expand-all-icon.png" border="false"::: **Expand all**, and :::image type="icon" source="media/how-to-generate-reports/collapse-all-icon.png" border="false"::: **Collapse all** options to update and change your report views.
1940

20-
Reports are dynamically updated each time you open them. The report shows information that's accurate for the date of viewing the report, rather than the date of creating the report.
41+
## Create an OT sensor custom data mining report
2142

22-
**To generate a report**:
43+
Create your own custom data mining report if you have reporting needs not covered by the out-of-the-box reports. Once created, custom data mining reports are visible to all users.
2344

24-
1. Select **Data Mining** from the side menu. Predefined suggested reports appear automatically.
45+
**To create a custom data mining report**:
2546

26-
1. Select **Create report** and then enter the following values:
47+
1. Sign into the OT sensor and select **Data Mining** > **Create report**.
2748

28-
| Parameter | Description |
49+
1. In the **Create new report** pane on the right, enter the following values:
50+
51+
| Name | Description |
2952
|---------|---------|
3053
| **Name** / **Description** | Enter a meaningful name for your report and an optional description. |
31-
| **Send to CM** | Toggle this option on to send your report to your on-premises management console. |
54+
| **Send to CM** | Select to send your report to the on-premises management console. |
3255
| **Choose category** | Select the categories to include in your report. |
3356
| **Order by** | Select to sort your data by category or by activity. |
34-
| **Filter by** | Define a filter for your report, using dates, IP address, MAC address, port, or device group. |
35-
36-
1. Select **Save** to save your report and display results on the **Data Mining** page.
57+
| **Filter by** | Define a filter for your report using any of the following parameters: <br><br> - **Results within the last**: Enter a number and then select **Minutes**, **Hours**, or **Days** <br> - **IP address / MAC address / Port**: Enter one or more IP addresses, MAC addresses, and ports to filter into your report. Enter a value and then select + to add it to the list.<br> - **Device group**: Select one or mode device groups to filter into your report. |
58+
| **Add filter type** | Select to add any of the following filter types into your report. <br><br> - Transport (GENERIC) <br> - Protocol (GENERIC) <br> - TAG (GENERIC) <br> - Maximum value (GENERIC) <br> - State (GENERIC) <br> - Minimum value (GENERIC) <br><br> Enter a value in the relevant field and then select + to add it to the list. |
3759

38-
## Custom data mining reports
60+
1. Select **Save**. Your data mining report is shown in the **My reports** area. For example:
3961

40-
Customize your data mining queries, using the different parameters in the **Create new report** pane, to:
41-
42-
| Purpose | Description |
43-
|---------|---------|
44-
| **SOC incident response** | Generate a report in real time to help deal with immediate incident response. For example, Data Mining can generate a report for a list of devices that might require patching. |
45-
| **Forensics** | Generate a report based on historical data for investigative reports. |
46-
| **Network security** | Generate a report that helps improve overall network security. For example, generate a report that lists devices with weak authentication credentials. |
47-
| **Visibility** | Generate a report that covers all query items to view all baseline parameters of your network. |
48-
| **PLC security** | Improve security by detecting PLCs in unsecure states, such as Program and Remote states. |
62+
:::image type="content" source="media/how-to-generate-reports/custom-data-mining-reports.png" alt-text="Screenshot of a list of customized data mining reports." lightbox="media/how-to-generate-reports/custom-data-mining-reports.png":::
4963

50-
## Predefined data mining reports
64+
## Manage OT sensor data mining report data
5165

52-
The following predefined reports are available in the **Data Mining** page. These queries are generated in real time.
66+
Each data mining report on an OT sensor has the following options for managing your data:
5367

54-
| Report | Description |
68+
| Option | Description |
5569
|---------|---------|
56-
| **Programming commands** | Devices that send industrial programming. |
57-
| **Remote access** | Devices that communicate through remote session protocols. |
58-
| **Internet activity** | Devices that are connected to the internet. |
59-
| **CVEs** | A list of devices detected with known vulnerabilities, along with CVSSv2 risk scores. |
60-
| **Excluded CVEs** | A list of all the CVEs that were manually excluded. Customize the CVE list manually if you want the VA reports and attack vectors to reflect your network more accurately. Customization includes excluding or including particular CVEs and updating the CVSSv2 score accordingly. |
61-
| **Nonactive devices** | Devices that haven't communicated for the past seven days. |
62-
| **Active devices** | Active network devices within the last 24 hours. |
70+
| :::image type="icon" source="media/how-to-generate-reports/export-icon.png" border="false"::: **Export to CSV** | Export the current report data to a CSV file. |
71+
| :::image type="icon" source="media/how-to-generate-reports/export-icon.png" border="false"::: **Export to PDF** | Export the current report data to a PDF file. |
72+
| :::image type="icon" source="media/how-to-generate-reports/snapshot-icon.png" border="false"::: **Snapshots** | Save the current report data as a snapshot you can return to later. |
73+
| :::image type="icon" source="media/how-to-generate-reports/manage-icon.png" border="false"::: **Manage report** | Update the values of an existing custom data mining report. |
74+
| :::image type="icon" source="media/how-to-generate-reports/edit-icon.png" border="false"::: **Edit mode** | Select to remove specific results from the saved report. |
6375

64-
## Generate reports in on-premises management console
76+
For example:
6577

66-
The on-premises management console lets you generate reports for each sensor that's connected to it. For each sensor, you can generate a default report or a custom report configured on that sensor. When you choose a sensor from the on-premises management console, all the custom reports configured on that sensor appear in the list of reports.
78+
:::image type="content" source="media/how-to-generate-reports/manage-report-pane.png" alt-text="Screenshot of the manage report pane." lightbox="media/how-to-generate-reports/manage-report-pane.png":::
6779

68-
**To generate a report**:
80+
## View data mining reports for multiple sensors
6981

70-
1. Select **Reports** from the side menu.
82+
Sign into an on-premises management console to view [out-of-the-box data mining reports](#view-an-ot-sensor-predefined-data-mining-report) and custom reports for any connected sensor.
7183

72-
2. From the **Sensors** drop-down list, select the sensor for which you want to generate the report.
84+
**To view a data mining report from an on-premises management console**:
7385

74-
3. From the **Select Report** drop-down list, select the report that you want to generate.
86+
Sign into your on-premises management console and select
7587

76-
4. To create a PDF of the report results, select :::image type="icon" source="media/how-to-generate-reports/pdf-report-icon.png" border="false":::.
88+
1. **Reports** on the left.
7789

78-
## Default reports in on-premises management console
90+
1. From the **Sensors** drop-down list, select the sensor for which you want to generate the report.
7991

80-
Reports are based on sensor data-mining queries that are performed, and include:
92+
1. From the **Select Report** drop-down list, select the report that you want to generate.
8193

82-
| Information | Description |
83-
|---------|---------|
84-
| **Active Devices (Last 24 Hours)** | Presents a list of devices that show network activity within a period of 24 hours. |
85-
| **Non-Active Devices (Last 7 Days)** | Presents a list of devices that show no network activity in the last seven days. |
86-
| **Programming Commands** | Presents a list of devices that sent programming commands within the last 24 hours. |
87-
| **Remote Access** | Presents a list of devices that remote sources accessed within the last 24 hours. |
94+
The page lists the current report data. Select :::image type="icon" source="media/how-to-generate-reports/pdf-report-icon.png" border="false"::: to export the data to a PDF file.
8895

8996
## Next steps
9097

91-
Continue creating other reports for more security data from your OT sensor. For more information, see:
92-
93-
- [Risk assessment reporting](how-to-create-risk-assessment-reports.md)
98+
- View additional reports based on cloud-connected sensors in the Azure portal. For more information, see [Visualize Microsoft Defender for IoT data with Azure Monitor workbooks](workbooks.md)
9499

95-
- [Attack vector reporting](how-to-create-attack-vector-reports.md)
100+
- Continue creating other reports for more security data from your OT sensor. For more information, see:
96101

97-
- [Create trends and statistics dashboards](how-to-create-trends-and-statistics-reports.md)
102+
- [Risk assessment reporting](how-to-create-risk-assessment-reports.md)
103+
104+
- [Attack vector reporting](how-to-create-attack-vector-reports.md)
105+
106+
- [Create trends and statistics dashboards](how-to-create-trends-and-statistics-reports.md)

0 commit comments

Comments
 (0)