You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-iot/enterprise-iot-manage.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ To view enterprise IoT security data:
27
27
28
28
1. When you select a specific device, the device details page opens. Explore the following tabs to view data added by enterprise IoT security for your device:
29
29
30
-
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
30
+
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
31
31
32
32
You can also set up advanced hunting queries to create custom alert rules. For more information, see [advanced hunting queries for enterprise IoT security](#advanced-hunting-queries-for-enterprise-iot).
33
33
@@ -41,7 +41,7 @@ On the **Device inventory** page, select **Go hunt** to query devices using tabl
41
41
42
42
## Advanced hunting queries for enterprise IoT
43
43
44
-
This section lists sample advanced hunting queries that you can use in Microsoft 365 Defender to help you monitor and secure your IoT devices with enterprise IoT security.
44
+
This section lists sample advanced hunting queries that you can use in Microsoft Defender to help you monitor and secure your IoT devices with enterprise IoT security.
Copy file name to clipboardExpand all lines: defender-xdr/protect-against-iot-ot-threats.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.date: 01/20/2024
13
13
14
14
# Protect enterprise IoT assets
15
15
16
-
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. As the IoT/OT security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](../defender-for-iot/microsoft-defender-iot) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
16
+
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. As the IoT/OT security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](/defender-for-iot/microsoft-defender-iot) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
17
17
18
18
In this article, you learn about IoT/OT security challenges, which protection is included with Defender XDR, how Defender XDR detects and monitors enterprise IoT devices, and how to extend this protection to OT devices and environments.
- Limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates.
33
33
- Unmanaged IoT devices, lack of visibility into IoT assets, and limited options for vulnerability management. These conditions increase the enterprise attack surfaces.
34
34
35
-
## Enterprise IoT device protection in Defender XDR
35
+
## Enterprise IoT device protection in Defender for Endpoint and Defender XDR
36
36
37
-
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
37
+
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender for Endpoint and Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
38
38
39
39
The existing Defender for Endpoint agent runs on enterprise IoT assets and identifies, assesses, and secures them like any other organizational endpoint.
40
40
41
-
## License and supported devices
42
-
43
41
Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. Each license supports five devices per ME5/ E5 Security license.
44
42
45
-
Defender XDR protects Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs).
43
+
Enterprise IoT security protects IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs).
46
44
47
-
## Main capabilities
45
+
###Main features
48
46
49
47
|Feature |Location |More details |
50
48
|---------|---------|---------|
51
-
|Discover enterprise IoT assets for a full enterprise IoT inventory.|**Assets > Devices > IoT devices**|[Device inventory overview](../defender-endpoint/machines-view-overview)|
52
-
|Review alerts triggered by enterprise IoT assets |**Device details** page > **Alerts** tab |- Learn more about [Defender for Endpoint alerts](../defender-endpoint/review-alerts).<br>- Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials page](https://security.microsoft.com/tutorials/all). |
49
+
|Discover enterprise IoT assets for a full enterprise IoT inventory |**Assets > Devices > IoT devices**|[Device inventory overview](/defender-endpoint/machines-view-overview)|
50
+
|Review alerts triggered by enterprise IoT assets |**Device details** page > **Alerts** tab |- Learn more about [Defender for Endpoint alerts](/defender-endpoint/review-alerts).<br>- Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials page](https://security.microsoft.com/tutorials/all). |
53
51
|Review security recommendations for enterprise IoT assets |**Device details** page > **Security recommendations** tab |[Security recommendations in Defender for Endpoint](/defender-endpoint/device-discovery#vulnerability-assessment-on-discovered-devices)|
54
52
|Discover vulnerabilities associated with enterprise IoT assets |**Device details** page > **Discovered vulnerabilities** tab |[Vulnerabilities in your organization](/defender-vulnerability-management/tvm-weaknesses)|
55
-
|Use advanced hunting queries to [create custom alert rules](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) or to [collect vulnerabilities](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) across all your devices.|
53
+
|Use advanced hunting queries to [create custom alert rules](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) or to [collect vulnerabilities](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) across all your devices|**Advanced hunting** page in the Defender portal ||
0 commit comments