You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-sensor.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -242,7 +242,7 @@ You can access console tools from the side menu. Tools help you:
242
242
| Data mining | Generate comprehensive and granular information about your network's devices at various layers. For more information, see [Sensor data mining queries](how-to-create-data-mining-queries.md).|
243
243
| Trends and Statistics | View trends and statistics about an extensive range of network traffic and activity. As a small example, display charts and graphs showing top traffic by port, connectivity drops by hours, S7 traffic by control function, number of devices per VLAN, SRTP errors by day, or Modbus traffic by function. For more information, see [Sensor trends and statistics reports](how-to-create-trends-and-statistics-reports.md).
244
244
| Risk Assessment | Proactively address vulnerabilities, identify risks such as missing patches or unauthorized applications. Detect changes to device configurations, controller logic, and firmware. Prioritize fixes based on risk scoring and automated threat modeling. For more information, see [Risk assessment reporting](how-to-create-risk-assessment-reports.md#create-risk-assessment-reports).|
245
-
| Attack Vector | Display a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target. For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md#attack-vector-reporting).|
245
+
| Attack Vector | Display a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target. For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md#create-attack-vector-reports).|
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md
+45-30Lines changed: 45 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,56 +5,71 @@ ms.date: 02/03/2022
5
5
ms.topic: how-to
6
6
---
7
7
8
-
# Attack vector reporting
8
+
# Create attack vector reports
9
9
10
-
## About attack vector reports
10
+
Attack vector reports show a chain of vulnerable devices in a specified attack path, for devices detected by a specific OT network sensor. Simulate an attack on a specific target in your network to discover vulnerable devices and analyze attack vectors in real time.
11
11
12
-
Attack vector reports provide a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target.
12
+
Attack vector reports can also help evaluate mitigation activities to ensure that you're taking all required steps to reduce the risk to your network. For example, use an attack vector report to understand whether a software update would disrupt the attacker's path, or if an alternate attack path still remains.
13
13
14
-
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can then determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities.
14
+
## Prerequisites
15
15
16
-
> [!NOTE]
17
-
> Administrators and security analysts can perform the procedures described in this section.
16
+
To create attack vector reports, you must be able to access the OT network sensor you want to generate data for, as an **Admin** or **Security Analyst** user.
18
17
19
-
## Create an attack vector report
18
+
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md)
20
19
21
-
This section describes how to create Attack Vector reports.
20
+
## Generate an attack vector simulation
22
21
23
-
**To create an attack vector simulation:**
22
+
Generate an attack vector simulation so that you can view the resulting report.
24
23
25
-
1. Select **Attack vector** from the sensor side menu.
26
-
1. Select **Add simulation**.
24
+
**To generate an attack vector simulation:**
27
25
28
-
2. Enter simulation properties:
26
+
1. Sign into the sensor console and select **Attack vector** on the left.
27
+
1. Select **Add simulation** and enter the following values:
29
28
30
-
-**Name**: Simulation name.
29
+
| Property | Description |
30
+
|---------|---------|
31
+
|**Name**| Simulation name |
32
+
|**Maximum Vectors**| The maximum number of attack vectors you want to include in the simulation. |
33
+
|**Show in Device Map**| Select to show the attack vector as a group in the **Device map**. |
34
+
|**Show All Source Devices**| Select to consider all devices as a possible attack source. |
35
+
|**Attack Source**| Appears only, and required, if the **Show All Source Devices** option is toggled off. Select one or more devices to consider as the attack source.|
36
+
|**Show All Target Devices**| Select to consider all devices as possible attack targets.|
37
+
|**Attack Target**| Appears only, and required, if the **Show All Target Devices** option is toggled off. Select one or more devices to consider as the attack target.|
38
+
|**Exclude Devices**| Select one or more devices to exclude from the attack vector simulation.|
39
+
|**Exclude Subnets**| Select one or more subnets to exclude from the attack vector simulation.|
31
40
32
-
-**Maximum vectors**: The maximum number of vectors in a single simulation.
41
+
1. Select **Save**. Your simulation is added to the list, with the number of attack paths indicated in parenthesis.
33
42
34
-
-**Show in Device map**: Show the attack vector as a group in the Device map.
43
+
1. Expand your simulation to view the list of possible attack vectors, and select one to view more details on the right.
35
44
36
-
-**All Source devices**: The attack vector will consider all devices as an attack source.
45
+
For example:
37
46
38
-
-**Attack Source**: The attack vector will consider only the specified devices as an attack source.
47
+
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report." lightbox="media/how-to-generate-reports/sample-attack-vectors.png":::
39
48
40
-
-**All Target devices**: The attack vector will consider all devices as an attack target.
49
+
## View an attack vector in the Device Map
41
50
42
-
-**Attack Target**: The attack vector will consider only the specified devices as an attack target.
51
+
The Device map provides a graphical representation of vulnerable devices detected in attack vector reports. To view an attack vector in the Device map:
43
52
44
-
-**Exclude devices**: Specified devices will be excluded from the attack vector simulation.
53
+
1. In the **Attack vector** page, make sure your simulation has **Show in Device map** toggled on.
54
+
1. Select **Device map** from the side menu.
55
+
1. Select your simulation and then select an attack vector to visualize the devices in your map.
45
56
46
-
-**Exclude Subnets**: Specified subnets will be excluded from the attack vector simulation.
57
+
For example:
47
58
48
-
3. Select **Save**.
49
-
1. Select the report that is saved from the Attack vector page and review:
50
-
- network attack paths and insights
51
-
- a risk score
52
-
- source and target devices
53
-
- a graphical representation of attack vectors
54
-
55
-
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report.":::
59
+
:::image type="content" source="media/how-to-generate-reports/sample-device-map.png" alt-text="Screen shot of Device map." lightbox="media/how-to-generate-reports/sample-device-map.png":::
56
60
61
+
For more information, see [Investigate sensor detections in the Device map](how-to-work-with-the-sensor-device-map.md).
57
62
58
63
## Next steps
59
64
60
-
For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md).
65
+
- Enhance security posture with Azure security [recommendations](recommendations.md).
66
+
67
+
- View additional reports based on cloud-connected sensors in the Azure portal. For more information, see [Visualize Microsoft Defender for IoT data with Azure Monitor workbooks](workbooks.md)
68
+
69
+
- Continue creating other reports for more security data from your OT sensor. For more information, see:
0 commit comments