Skip to content

Commit 1b0c5eb

Browse files
committed
Small naming changes and editing table
1 parent 9353b46 commit 1b0c5eb

File tree

2 files changed

+10
-12
lines changed

2 files changed

+10
-12
lines changed

defender-for-iot/enterprise-iot-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To view enterprise IoT security data:
2727

2828
1. When you select a specific device, the device details page opens. Explore the following tabs to view data added by enterprise IoT security for your device:
2929

30-
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
30+
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
3131

3232
You can also set up advanced hunting queries to create custom alert rules. For more information, see [advanced hunting queries for enterprise IoT security](#advanced-hunting-queries-for-enterprise-iot).
3333

@@ -41,7 +41,7 @@ On the **Device inventory** page, select **Go hunt** to query devices using tabl
4141

4242
## Advanced hunting queries for enterprise IoT
4343

44-
This section lists sample advanced hunting queries that you can use in Microsoft 365 Defender to help you monitor and secure your IoT devices with enterprise IoT security.
44+
This section lists sample advanced hunting queries that you can use in Microsoft Defender to help you monitor and secure your IoT devices with enterprise IoT security.
4545

4646
### Find devices by specific type or subtype
4747

defender-xdr/protect-against-iot-ot-threats.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 01/20/2024
1313

1414
# Protect enterprise IoT assets
1515

16-
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. As the IoT/OT security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](../defender-for-iot/microsoft-defender-iot) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
16+
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. As the IoT/OT security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](/defender-for-iot/microsoft-defender-iot) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
1717

1818
In this article, you learn about IoT/OT security challenges, which protection is included with Defender XDR, how Defender XDR detects and monitors enterprise IoT devices, and how to extend this protection to OT devices and environments.
1919

@@ -32,27 +32,25 @@ Specifically, enterprise IoT security challenges include:
3232
- Limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates.
3333
- Unmanaged IoT devices, lack of visibility into IoT assets, and limited options for vulnerability management. These conditions increase the enterprise attack surfaces.
3434

35-
## Enterprise IoT device protection in Defender XDR
35+
## Enterprise IoT device protection in Defender for Endpoint and Defender XDR
3636

37-
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
37+
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender for Endpoint and Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
3838

3939
The existing Defender for Endpoint agent runs on enterprise IoT assets and identifies, assesses, and secures them like any other organizational endpoint.
4040

41-
## License and supported devices
42-
4341
Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. Each license supports five devices per ME5/ E5 Security license.
4442

45-
Defender XDR protects Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs).
43+
Enterprise IoT security protects IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs).
4644

47-
## Main capabilities
45+
### Main features
4846

4947
|Feature |Location |More details |
5048
|---------|---------|---------|
51-
|Discover enterprise IoT assets for a full enterprise IoT inventory. |**Assets > Devices > IoT devices** |[Device inventory overview](../defender-endpoint/machines-view-overview) |
52-
|Review alerts triggered by enterprise IoT assets |**Device details** page > **Alerts** tab |- Learn more about [Defender for Endpoint alerts](../defender-endpoint/review-alerts).<br>- Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials page](https://security.microsoft.com/tutorials/all). |
49+
|Discover enterprise IoT assets for a full enterprise IoT inventory |**Assets > Devices > IoT devices** |[Device inventory overview](/defender-endpoint/machines-view-overview) |
50+
|Review alerts triggered by enterprise IoT assets |**Device details** page > **Alerts** tab |- Learn more about [Defender for Endpoint alerts](/defender-endpoint/review-alerts).<br>- Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials page](https://security.microsoft.com/tutorials/all). |
5351
|Review security recommendations for enterprise IoT assets |**Device details** page > **Security recommendations** tab |[Security recommendations in Defender for Endpoint](/defender-endpoint/device-discovery#vulnerability-assessment-on-discovered-devices) |
5452
|Discover vulnerabilities associated with enterprise IoT assets |**Device details** page > **Discovered vulnerabilities** tab |[Vulnerabilities in your organization](/defender-vulnerability-management/tvm-weaknesses) |
55-
|Use advanced hunting queries to [create custom alert rules](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) or to [collect vulnerabilities](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) across all your devices. |
53+
|Use advanced hunting queries to [create custom alert rules](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) or to [collect vulnerabilities](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) across all your devices |**Advanced hunting** page in the Defender portal | |
5654

5755
## Extend protection to OT devices
5856

0 commit comments

Comments
 (0)