Skip to content

Commit 0c6b444

Browse files
committed
Feedback
1 parent 1f54a86 commit 0c6b444

File tree

2 files changed

+26
-19
lines changed

2 files changed

+26
-19
lines changed

defender-xdr/prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Any of the these licenses gives you access to Microsoft Defender XDR features vi
4242
- Enterprise Mobility + Security (EMS) E5 or A5
4343
- Office 365 E5 or A5
4444
- Microsoft Defender for Endpoint
45-
- Includes protection for enterprise IoT devices with the Microsoft 365 E5 (ME5) or E5 Security license. For more information, see [enterprise IoT licenses](/defender-for-iot/enterprise-iot-licenses#enterprise-iot-licenses).
45+
- [Microsoft Defender for IoT - Enterprise IoT protection](/defender-for-iot/enterprise-iot-licenses#enterprise-iot-licenses) (includes protection for enterprise IoT devices with the Microsoft 365 E5 (ME5) or E5 Security license)
4646
- Microsoft Defender for Identity
4747
- Microsoft Defender for Cloud Apps or [Cloud App Discovery](/defender-cloud-apps/editions-cloud-app-security-aad)
4848
- Microsoft Defender for Office 365 (Plan 2)

defender-xdr/protect-against-iot-ot-threats.md

Lines changed: 25 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -8,37 +8,44 @@ ms.localizationpriority: medium
88
manager: raynew
99
audience: ITPro
1010
ms.topic: conceptual
11-
ms.date: 12/25/2024
11+
ms.date: 01/20/2024
1212
---
1313

14-
# Protect against IoT/OT threats with Microsoft Defender XDR
14+
# Protect enterprise IoT assets
1515

16-
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. IoT/OT devices and networks are often built using specialized protocols, and might prioritize operational challenges over security.
16+
As the Internet of Things (IoT) and Operational Technology (OT) security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](../defender-for-iot/microsoft-defender-iot.md) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
1717

18-
When IoT/OT devices can't be protected by traditional security monitoring systems, each new wave of innovation increases the risk and possible attack surfaces across those IoT devices and OT networks.
18+
In this article, you learn about IoT/OT security challenges, which protection is included with Defender XDR, how Defender XDR detects and monitors enterprise IoT devices, and how to extend this protection to OT devices and environments.
1919

20-
In this article, you learn how Defender XDR detects and monitors enterprise IoT devices, and how to extend this protection to OT devices and environments.
20+
> [!NOTE]
21+
> Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. For more information, see [how it works](#how-defender-xdr-detects-and-monitors-enterprise-iot-devices).
2122
22-
## How Defender XDR detects and monitors enterprise IoT devices
23+
## Enterprise IoT security challenges
2324

24-
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
25+
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. IoT/OT devices and networks are often built using specialized protocols, and might prioritize operational challenges over security.
2526

26-
:::image type="content" source="/defender-for-iot/media/enterprise-iot/eiot-architecture.png" alt-text="The architecture showing the use of enterprise IoT":::
27+
When IoT/OT devices can't be protected by traditional security monitoring systems, each new wave of innovation increases the risk and possible attack surfaces across those IoT devices and OT networks.
2728

28-
Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license.
29+
Specific challenges for enterprise IoT assets include:
2930

30-
## Protect OT devices and networks with Defender for IoT
31+
- Complex device authentication and identity management, and traditional security models like password-based authentication are often insufficient.
32+
- IoT devices commonly collect large amounts of sensitive data, but they don’t encrypt data properly.
33+
- IoT device creators do not always follow development security best practices, including the use of reputable and updated libraries.
34+
- Many IoT devices have limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates.
35+
- Unmanaged IoT devices increase enterprise attack surfaces. There is often a lack of visibility into IoT assets and limited options for vulnerability management.
36+
37+
## How Defender XDR protects enterprise IoT devices
38+
39+
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
3140

32-
Microsoft Defender XDR and Defender for IoT form a unified pre- and post-breach enterprise defense suite. This suite natively integrates across endpoint, IoT/OT, identity, email, and applications.
41+
The existing Defender for Endpoint agent runs on enterprise IoT assets and identifies, assesses, and secures them like any other organizational endpoint.
3342

34-
Defender for IoT supports the following use cases for OT environment protection:
43+
|How to enable |Supported devices |Main capabilities |
44+
|---------|---------|---------|
45+
|Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. |[Supported devices](../defender-for-iot/organizations/billing#defender-for-iot-devices) include an extensive range of hardware models and vendors, spanning corporate IoT devices such as printers, cameras, and VoIP phones, among others. |- **Discover assets** for a full enterprise IoT inventory.<br>- Get a **unified site view** to group enterprise IoT assets. You can monitor, manage, and investigate security insights at site level.<br>- Run a **vulnerability assessment** to identify and fix asset vulnerabilities, assess asset configuration, and get actionable security recommendations.<br>- Use Microsoft Security Exposure Management to **review security initiatives**.<br>- **Detect, investigate, and respond to security threats** against IoT assets across the enterprise. |
3546

36-
- Detect OT devices
37-
- Monitor production sites
38-
- Prioritize and remediate vulnerabilities
39-
- Review security initiatives
40-
- Analyze incidents and respond to threats
47+
## Extend protection to OT devices
4148

42-
Learn more about [Defender for IoT features and use cases](/defender-for-iot/microsoft-defender-iot).
49+
To go beyond the protection that the Defender for Endpoint agent provides for OT/IoT assets, Defender for IoT provides full visibility and security protection with OT sensors that monitor traffic in relevant internal networks. Learn more about [Defender for IoT features and use cases](/defender-for-iot/microsoft-defender-iot).
4350

4451
To enable OT protection, you need to enable the Defender for IoT license. Learn how to [onboard Defender for IoT](/defender-for-iot/get-started).

0 commit comments

Comments
 (0)