You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Release notes for the Microsoft Defender for IoT solution in Microsoft Sentinel
3
+
description: Learn about the updates available in each version of the Microsoft Defender for IoT solution, available from the Microsoft Sentinel content hub.
4
+
ms.date: 09/22/2022
5
+
ms.topic: overview
6
+
---
7
+
8
+
# Release notes for the Microsoft Defender for IoT solution in Microsoft Sentinel
9
+
10
+
This article lists the updates to out-of-the-box security content available from each version of the **Microsoft Defender for IoT** solution. The **Microsoft Defender for IoT** solution is available from the Microsoft Sentinel content hub.
11
+
12
+
The **Microsoft Defender for IoT** solution enhances the integration between Defender for IoT and Microsoft Sentinel, helping to streamline SOC workflows to analyze, investigate, and respond efficiently to OT incidents.
13
+
14
+
For more information, see:
15
+
16
+
-[What's new in Microsoft Defender for IoT?](release-notes.md)
17
+
-[Tutorial: Integrate Microsoft Sentinel and Microsoft Defender for IoT](/azure/sentinel/iot-solution?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json)
18
+
-[Tutorial: Investigate and detect threats for IoT devices](/azure/sentinel/iot-advanced-threat-monitoring?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json).
19
+
## Version 2.1
20
+
21
+
**Released**: September 2022
22
+
23
+
New features in this version include:
24
+
25
+
- Solution name changed to **Microsoft Defender for IoT**
26
+
27
+
- Workbook improvements:
28
+
29
+
- A new overview dashboard
30
+
- A new vulnerability dashboard
31
+
- Inventory dashboard improvements
32
+
33
+
- New SOC playbooks for automation with CVEs, triaging incidents that involve sensitive devices, and email notifications to device owners for new incidents.
34
+
35
+
For more information, see [Updates to the Microsoft Defender for IoT solution](release-notes.md#updates-to-the-microsoft-defender-for-iot-solution-in-microsoft-sentinels-content-hub).
36
+
37
+
## Version 2.0
38
+
39
+
**Released**: September 2022
40
+
41
+
This version provides enhanced experiences for managing, installing, and updating the solution package in the Microsoft Sentinel content hub.
42
+
43
+
For more information, see [Centrally discover and deploy Microsoft Sentinel out-of-the-box content and solutions](/azure/sentinel/sentinel-solutions-deploy)
44
+
## Version 1.0.14
45
+
46
+
**Released**: July 2022
47
+
48
+
New features in this version include:
49
+
50
+
-[Microsoft Sentinel incident synch with Defender for IoT alerts](release-notes.md#microsoft-sentinel-incident-synch-with-defender-for-iot-alerts)
51
+
- IoT device entities displayed in related Microsoft Sentinel incidents.
52
+
53
+
54
+
## Version 1.0.13
55
+
56
+
**Released**: March 2022
57
+
58
+
New features in this version include:
59
+
60
+
- A bug fix to prevent new incidents from being created in Microsoft Sentinel each time an alert in Defender for IoT is updated or deleted.
61
+
- A new analytics rule for the **No traffic on sensor detected** Defender for IoT alert.
62
+
- Updates in the **Unauthorized PLC changes** analytics rule to support the **Illegal Beckhoff AMS Command** Defender for IoT alert.
63
+
- A new, deep link to Defender for IoT alerts directly from related Microsoft Sentinel incidents.
64
+
65
+
## Earlier versions
66
+
67
+
For more information about earlier versions of the **Microsoft Defender for IoT** solution, contact us via the [Defender for IoT community](https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot/bd-p/MicrosoftDefenderIoT).
68
+
69
+
## Next steps
70
+
71
+
Learn more in [What's new in Microsoft Defender for IoT?](release-notes.md) and the [Microsoft Sentinel documentation](/azure/sentinel/).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/release-notes.md
+47-3Lines changed: 47 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,6 @@ ms.date: 08/08/2022
7
7
8
8
# What's new in Microsoft Defender for IoT?
9
9
10
-
[!INCLUDE [Banner for top of topics](../includes/banner.md)]
11
-
12
10
This article lists Microsoft Defender for IoT's new features and enhancements for end-user organizations from the last nine months.
13
11
14
12
Features released earlier than nine months ago are listed in [What's new archive for Microsoft Defender for IoT for organizations](release-notes-archive.md).
@@ -65,7 +63,53 @@ For more information, see the [Microsoft Security Development Lifecycle practice
65
63
66
64
|Service area |Updates |
67
65
|---------|---------|
68
-
|**OT networks**|**Sensor software version 22.2.6**: <br> - Bug fixes and stability improvements <br>- Enhancements to the device type classification algorithm |
66
+
|**OT networks**|**Sensor software version 22.2.6**: <br> - Bug fixes and stability improvements <br>- Enhancements to the device type classification algorithm<br><br>- **Microsoft Sentinel integration**: <br>- [Investigation enhancements with IOT device entities](#investigation-enhancements-with-iot-device-entities-in-microsoft-sentinel)<br>- [Updates to the Microsoft Defender for IoT solution](#updates-to-the-microsoft-defender-for-iot-solution-in-microsoft-sentinels-content-hub)|
67
+
68
+
### Investigation enhancements with IOT device entities in Microsoft Sentinel
69
+
70
+
Defender for IoT's integration with Microsoft Sentinel now supports an IoT device entity page. When investigating incidents and monitoring IoT security in Microsoft Sentinel, you can now identify your most sensitive devices and jump directly to more details on each device entity page.
71
+
72
+
The IoT device entity page provides contextual device information about an IoT device, with basic device details and device owner contact information. Device owners are defined by site in the **Sites and sensors** page in Defender for IoT.
73
+
74
+
The IoT device entity page can help prioritize remediation based on device importance and business impact, as per each alert's site, zone, and sensor. For example:
75
+
76
+
:::image type="content" source="media/release-notes/iot-device-entity-page.png" alt-text="Screenshot of the IoT device entity page in Microsoft Sentinel.":::
77
+
78
+
You can also now hunt for vulnerable devices on the Microsoft Sentinel **Entity behavior** page. For example, view the top five IoT devices with the highest number of alerts, or search for a device by IP address or device name:
79
+
80
+
:::image type="content" source="media/release-notes/entity-behavior-iot-devices-alerts.png" alt-text="Screenshot of the Entity behavior page in Microsoft Sentinel.":::
81
+
82
+
For more information, see [Investigate further with IoT device entities](https://review.learn.microsoft.com/en-us/azure/sentinel/iot-advanced-threat-monitoring#investigate-further-with-iot-device-entities) and [Site management options from the Azure portal](how-to-manage-sensors-on-the-cloud.md#site-management-options-from-the-azure-portal).
83
+
84
+
### Updates to the Microsoft Defender for IoT solution in Microsoft Sentinel's content hub
85
+
86
+
This month, we've released version 2.0 of the **Microsoft Defender for IoT** solution in Microsoft Sentinel's content hub, previously known as the **IoT/OT Threat Monitoring with Defender for IoT** solution.
87
+
88
+
Updates in this version of the solution include:
89
+
90
+
-**A name change**. If you'd previously installed the **IoT/OT Threat Monitoring with Defender for IoT** solution in your Microsoft Sentinel workspace, the solution is automatically renamed to **Microsoft Defender for IoT**, even if you don't update the solution.
91
+
92
+
-**Workbook improvements**: The **Defender for IoT** workbook now includes:
93
+
94
+
- A new **Overview** dashboard with key metrics on the device inventory, threat detection, and security posture. For example:
95
+
96
+
:::image type="content" source="media/release-notes/sentinel-workbook-overview.png" alt-text="Screenshot of the new Overview tab in the IoT OT Threat Monitoring with Defender for IoT workbook." lightbox="media/release-notes/sentinel-workbook-overview.png":::
97
+
98
+
- A new **Vulnerabilities** dashboard with details about CVEs shown in your network and their related vulnerable devices. For example:
99
+
100
+
:::image type="content" source="media/release-notes/sentinel-workbook-vulnerabilities.png" alt-text="Screenshot of the new Vulnerability tab in the IoT OT Threat Monitoring with Defender for IoT workbook." lightbox="media/release-notes/sentinel-workbook-vulnerabilities.png":::
101
+
102
+
- Improvements on the **Device inventory** dashboard, including access to device recommendations, vulnerabilities, and direct links to the Defender for IoT device details pages. The **Device inventory** dashboard in the **IoT/OT Threat Monitoring with Defender for IoT** workbook is fully aligned with the Defender for IoT [device inventory data](how-to-manage-device-inventory-for-organizations.md).
103
+
104
+
-**Playbook updates**: The **Microsoft Defender for IoT** solution now supports the following SOC automation functionality with new playbooks:
105
+
106
+
-**Automation with CVE details**: Use the *AD4IoT-CVEAutoWorkflow* playbook to enrich incident comments with CVEs of related devices based on Defender for IoT data. The incidents are triaged, and if the CVE is critical, the asset owner is notified about the incident by email.
107
+
108
+
-**Automation for email notifications to device owners**. Use the *AD4IoT-SendEmailtoIoTOwner* playbook to have a notification email automatically sent to a device's owner about new incidents. Device owners can then reply to the email to update the incident as needed. Device owners are defined at the site level in Defender for IoT.
109
+
110
+
-**Automation for incidents with sensitive devices**: Use the *AD4IoT-AutoTriageIncident* playbook to automatically update an incident's severity based on the devices involved in the incident, and their sensitivity level or importance to your organization. For example, any incident involving a sensitive device can be automatically escalated to a higher severity level.
111
+
112
+
For more information, see [Investigate Microsoft Defender for IoT incidents with Microsoft Sentinel](/azure/sentinel/iot-advanced-threat-monitoring?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json).
0 commit comments