Skip to content

Commit ff3247c

Browse files
authored
Merge pull request #219893 from Shereen-Bhar/reorganize-OT-sensor-reports
Refresh reporting how-to articles
2 parents 90a212f + 6954d0d commit ff3247c

28 files changed

+195
-131
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -111,14 +111,14 @@
111111
href: workbooks.md
112112
- name: Create OT sensor reports
113113
items:
114-
- name: Create risk assessment reports
115-
href: how-to-create-risk-assessment-reports.md
116-
- name: Create attack vector reports
117-
href: how-to-create-attack-vector-reports.md
118114
- name: Create data mining reports
119115
href: how-to-create-data-mining-queries.md
116+
- name: Create risk assessment reports
117+
href: how-to-create-risk-assessment-reports.md
120118
- name: Create trends and statistics reports
121119
href: how-to-create-trends-and-statistics-reports.md
120+
- name: Create attack vector reports
121+
href: how-to-create-attack-vector-reports.md
122122
- name: View OT threats by location from an OT sensor
123123
href: how-to-gain-insight-into-global-regional-and-local-threats.md
124124
- name: Analyze OT programming details and changes

articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-sensor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ You can access console tools from the side menu. Tools help you:
242242
| Data mining | Generate comprehensive and granular information about your network's devices at various layers. For more information, see [Sensor data mining queries](how-to-create-data-mining-queries.md).|
243243
| Trends and Statistics | View trends and statistics about an extensive range of network traffic and activity. As a small example, display charts and graphs showing top traffic by port, connectivity drops by hours, S7 traffic by control function, number of devices per VLAN, SRTP errors by day, or Modbus traffic by function. For more information, see [Sensor trends and statistics reports](how-to-create-trends-and-statistics-reports.md).
244244
| Risk Assessment | Proactively address vulnerabilities, identify risks such as missing patches or unauthorized applications. Detect changes to device configurations, controller logic, and firmware. Prioritize fixes based on risk scoring and automated threat modeling. For more information, see [Risk assessment reporting](how-to-create-risk-assessment-reports.md#create-risk-assessment-reports).|
245-
| Attack Vector | Display a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target. For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md#attack-vector-reporting).|
245+
| Attack Vector | Display a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target. For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md#create-attack-vector-reports).|
246246

247247
### Manage
248248

articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md

Lines changed: 45 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -5,56 +5,71 @@ ms.date: 02/03/2022
55
ms.topic: how-to
66
---
77

8-
# Attack vector reporting
8+
# Create attack vector reports
99

10-
## About attack vector reports
10+
Attack vector reports show a chain of vulnerable devices in a specified attack path, for devices detected by a specific OT network sensor. Simulate an attack on a specific target in your network to discover vulnerable devices and analyze attack vectors in real time.
1111

12-
Attack vector reports provide a graphical representation of a vulnerability chain of exploitable devices. These vulnerabilities can give an attacker access to key network devices. The Attack Vector Simulator calculates attack vectors in real time and analyzes all attack vectors for a specific target.
12+
Attack vector reports can also help evaluate mitigation activities to ensure that you're taking all required steps to reduce the risk to your network. For example, use an attack vector report to understand whether a software update would disrupt the attacker's path, or if an alternate attack path still remains.
1313

14-
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can then determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities.
14+
## Prerequisites
1515

16-
> [!NOTE]
17-
> Administrators and security analysts can perform the procedures described in this section.
16+
To create attack vector reports, you must be able to access the OT network sensor you want to generate data for, as an **Admin** or **Security Analyst** user.
1817

19-
## Create an attack vector report
18+
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md)
2019

21-
This section describes how to create Attack Vector reports.
20+
## Generate an attack vector simulation
2221

23-
**To create an attack vector simulation:**
22+
Generate an attack vector simulation so that you can view the resulting report.
2423

25-
1. Select **Attack vector** from the sensor side menu.
26-
1. Select **Add simulation**.
24+
**To generate an attack vector simulation:**
2725

28-
2. Enter simulation properties:
26+
1. Sign into the sensor console and select **Attack vector** on the left.
27+
1. Select **Add simulation** and enter the following values:
2928

30-
- **Name**: Simulation name.
29+
| Property | Description |
30+
|---------|---------|
31+
| **Name** | Simulation name |
32+
| **Maximum Vectors** | The maximum number of attack vectors you want to include in the simulation. |
33+
| **Show in Device Map** | Select to show the attack vector as a group in the **Device map**. |
34+
| **Show All Source Devices** | Select to consider all devices as a possible attack source. |
35+
| **Attack Source** | Appears only, and required, if the **Show All Source Devices** option is toggled off. Select one or more devices to consider as the attack source.|
36+
| **Show All Target Devices** | Select to consider all devices as possible attack targets.|
37+
| **Attack Target** | Appears only, and required, if the **Show All Target Devices** option is toggled off. Select one or more devices to consider as the attack target.|
38+
| **Exclude Devices** | Select one or more devices to exclude from the attack vector simulation.|
39+
| **Exclude Subnets** | Select one or more subnets to exclude from the attack vector simulation.|
3140

32-
- **Maximum vectors**: The maximum number of vectors in a single simulation.
41+
1. Select **Save**. Your simulation is added to the list, with the number of attack paths indicated in parenthesis.
3342

34-
- **Show in Device map**: Show the attack vector as a group in the Device map.
43+
1. Expand your simulation to view the list of possible attack vectors, and select one to view more details on the right.
3544

36-
- **All Source devices**: The attack vector will consider all devices as an attack source.
45+
For example:
3746

38-
- **Attack Source**: The attack vector will consider only the specified devices as an attack source.
47+
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report." lightbox="media/how-to-generate-reports/sample-attack-vectors.png":::
3948

40-
- **All Target devices**: The attack vector will consider all devices as an attack target.
49+
## View an attack vector in the Device Map
4150

42-
- **Attack Target**: The attack vector will consider only the specified devices as an attack target.
51+
The Device map provides a graphical representation of vulnerable devices detected in attack vector reports. To view an attack vector in the Device map:
4352

44-
- **Exclude devices**: Specified devices will be excluded from the attack vector simulation.
53+
1. In the **Attack vector** page, make sure your simulation has **Show in Device map** toggled on.
54+
1. Select **Device map** from the side menu.
55+
1. Select your simulation and then select an attack vector to visualize the devices in your map.
4556

46-
- **Exclude Subnets**: Specified subnets will be excluded from the attack vector simulation.
57+
For example:
4758

48-
3. Select **Save**.
49-
1. Select the report that is saved from the Attack vector page and review:
50-
- network attack paths and insights
51-
- a risk score
52-
- source and target devices
53-
- a graphical representation of attack vectors
54-
55-
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report.":::
59+
:::image type="content" source="media/how-to-generate-reports/sample-device-map.png" alt-text="Screen shot of Device map." lightbox="media/how-to-generate-reports/sample-device-map.png":::
5660

61+
For more information, see [Investigate sensor detections in the Device map](how-to-work-with-the-sensor-device-map.md).
5762

5863
## Next steps
5964

60-
For more information, see [Attack vector reporting](how-to-create-attack-vector-reports.md).
65+
- Enhance security posture with Azure security [recommendations](recommendations.md).
66+
67+
- View additional reports based on cloud-connected sensors in the Azure portal. For more information, see [Visualize Microsoft Defender for IoT data with Azure Monitor workbooks](workbooks.md)
68+
69+
- Continue creating other reports for more security data from your OT sensor. For more information, see:
70+
71+
- [Risk assessment reporting](how-to-create-risk-assessment-reports.md)
72+
73+
- [Sensor data mining queries](how-to-create-data-mining-queries.md)
74+
75+
- [Create trends and statistics dashboards](how-to-create-trends-and-statistics-reports.md)

0 commit comments

Comments
 (0)