Skip to content

Commit 2c3da34

Browse files
committed
Merge branch 'main' into Mal-chrisda
2 parents 747826e + b676455 commit 2c3da34

23 files changed

+886
-18
lines changed
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
- name: 'Microsoft Defender'
2+
tocHref: /defender/
3+
topicHref: /defender/index
4+
items:
5+
- name: 'Microsoft Defender for Cloud'
6+
tocHref: /defender-for-cloud/
7+
topicHref: /defender-for-cloud/index

defender-for-iot/TOC.yml

Lines changed: 44 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,44 @@
1-
- name: Index
2-
href: index.md
1+
###- name: Index
2+
### href: index.md
3+
- name: Microsoft Defender for IoT
4+
href: index.yml
5+
expanded: true
6+
items:
7+
- name: Overview
8+
items:
9+
- name: What is Microsoft Defender for IoT in the Defender portal?
10+
href: microsoft-defender-iot.md
11+
- name: Site security
12+
href: site-security-overview.md
13+
- name: Get started
14+
items:
15+
- name: Prerequisites
16+
href: prerequisites.md
17+
- name: Get started
18+
href: get-started.md
19+
- name: Set up sites
20+
href: set-up-sites.md
21+
- name: Monitor site security
22+
items:
23+
- name: Monitor site security
24+
href: monitor-site-security.md
25+
- name: Discover devices
26+
items:
27+
- name: Overview
28+
href: device-discovery.md
29+
- name: Discover and manage devices
30+
href: manage-devices-inventory.md
31+
- name: Prioritize and remediate vulnerabilities
32+
items:
33+
- name: Overview
34+
href: discover-vulnerabilities-overview.md
35+
- name: Prioritize and remediate vulnerabilities
36+
href: prioritize-vulnerabilities.md
37+
- name: Investigate and remediate threats
38+
items:
39+
- name: Investigate incidents and alerts
40+
href: investigate-threats.md
41+
- name: Manage
42+
items:
43+
- name: Manage sites
44+
href: manage-sites.md
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
- name: 'Microsoft Defender'
2+
tocHref: /defender/
3+
topicHref: /defender/index
4+
items:
5+
- name: 'Microsoft Defender for IoT'
6+
tocHref: /defender-for-iot/
7+
topicHref: /defender-for-iot/index
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
---
2+
title: Device discovery for Microsoft Defender for IoT in the Defender portal
3+
description: This article describes device discovery for Microsoft Defender for IoT in the Defender portal.
4+
ms.service: defender-for-iot
5+
author: limwainstein
6+
ms.author: lwainstein
7+
ms.localizationpriority: medium
8+
ms.date: 06/19/2024
9+
ms.topic: conceptual
10+
---
11+
12+
# Overview of device discovery
13+
14+
To protect your environment, you need to take inventory of the devices in your network. However, mapping these devices can often be expensive, challenging, and time-consuming.
15+
16+
Microsoft Defender for IoT in the Microsoft Defender portal integrates with [Microsoft Defender for Endpoint device discovery](/defender-endpoint/machines-view-overview#device-inventory-overview), allowing you to discover devices connected to your operational technologies (OT) network without using extra appliances or complex process changes. Defender for IoT uses onboarded endpoints to collect, probe, or scan your network to discover devices.
17+
18+
This article describes the benefits and capabilities of device discovery in Defender for IoT.
19+
20+
Learn how to [discover and manage your IoT/OT devices](manage-devices-inventory.md) in the device inventory.
21+
22+
[!INCLUDE [defender-iot-preview](../includes/defender-for-iot-defender-public-preview.md)]
23+
24+
## Device inventory: initial view
25+
26+
If you don't yet have a Defender for IoT license, the **Device inventory** page detects your OT devices and lists them with regular device data, but without security data. For example, the device name, IP, and category are visible, while the risk level isn't visible. The device inventory also displays a note at the top of the page that indicates the number of unprotected OT devices.
27+
28+
In this case, [onboard Defender for IoT](get-started.md) to get security value for your OT devices.
29+
30+
If you're seeing the message that indicates the number of unprotected OT devices, and you've already set up Defender for IoT, [set up a site](set-up-sites.md) and associate the relevant devices with it.
31+
32+
## Device inventory page
33+
34+
The **Device inventory** page helps you identify details about specific devices, such as manufacturer, type, serial number, firmware, and more. Using these details, you can track your devices, dive into device information, and identify potential threats or incompatibilities.
35+
36+
Learn how to [discover and manage your IoT/OT devices](manage-devices-inventory.md) in the device inventory.
37+
38+
Learn more about the [device inventory in Microsoft Defender for Endpoint](/defender-endpoint/machines-view-overview#device-inventory-overview).
39+
40+
## Device discovery capabilities
41+
42+
The key device discovery capabilities are:
43+
44+
|Capability |Description |
45+
|---------|---------|
46+
|OT device management |[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.​<br>- Add organization-specific information to emphasize your organization preferences. |
47+
|Device protection with risk-based approach |Identify risks such as missing patches, vulnerabilities and prioritize fixes based on risk scoring and automated threat modeling. |
48+
|Device alignment with physical sites |Allows contextual security monitoring. Use the **Site** filter to manage each site separately. Learn more about [filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views). |
49+
|Device groups |Allows different teams in your organization to monitor and manage relevant assets only.​ Learn more about [creating a device group](/defender-endpoint/machine-groups.md#create-a-device-group). |
50+
|Device criticality |Reflects how critical a device is for your organization and allows you to identify a device as a business critical asset. Learn more about [device criticality](/defender-endpoint/machines-view-overview#device-inventory-overview). |
51+
52+
## Supported devices
53+
54+
Defender for IoT's device inventory supports the following device classes:
55+
56+
|Devices |Example |
57+
|---------|---------|
58+
|**Manufacturing**| Industrial and operational devices, such as pneumatic devices, packaging systems, industrial packaging systems, industrial robots |
59+
|**Building** | Access panels, surveillance devices, HVAC systems, elevators, smart lighting systems |
60+
|**Health care** | Glucose meters, monitors |
61+
|**Transportation / Utilities** | Turnstiles, people counters, motion sensors, fire and safety systems, intercoms |
62+
|**Energy and resources** | DCS controllers, PLCs, historian devices, HMIs |
63+
|**Endpoint devices** | Workstations, servers, or mobile devices |
64+
| **Enterprise** | Smart devices, printers, communication devices, or audio/video devices |
65+
| **Retail** | Barcode scanners, humidity sensor, punch clocks |
66+
67+
## Next steps
68+
69+
[Discover and manage devices](manage-devices-inventory.md)
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: Overview of vulnerability management with Microsoft Defender for IoT in the Defender portal
3+
description: This article describes the features and benefits of Microsoft Defender for IoT vulnerability management.
4+
ms.service: defender-for-iot
5+
author: limwainstein
6+
ms.author: lwainstein
7+
ms.localizationpriority: medium
8+
ms.date: 06/24/2024
9+
ms.topic: conceptual
10+
---
11+
12+
# Overview of vulnerability management
13+
14+
With vulnerability management, Microsoft Defender for IoT in the Defender portal provides extended coverage for OT networks, gathers OT device data into one place, and displays the data with the other devices on your network.
15+
16+
The OT security administrator proactively manages network risks based on the vulnerability details and recommended remediation actions.
17+
18+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
19+
20+
## Vulnerability management capabilities
21+
22+
The key vulnerability management capabilities are:
23+
24+
|Capability |Description |
25+
|----|----|
26+
|Extended vulnerability coverage| Defender for IoT uses detailed OT device firmware information and discovers the device vendor, model, and version to identify known vulnerabilities. |
27+
|[Security recommendations page](/defender-vulnerability-management/tvm-security-recommendation)|Offers actionable steps to update and mitigate vulnerable products. |
28+
|[Weaknesses page](/defender-vulnerability-management/tvm-weaknesses)|Includes a detailed list of vulnerabilities like zero-days and known exploits. |
29+
|[Management](/defender-vulnerability-management/tvm-weaknesses#view-common-vulnerabilities-and-exposures-cve-entries-in-other-places)|You can manage and control the vulnerabilities globally, per tenant or device group, per device from the device page, or per vulnerable product through the Inventory page. |
30+
|[Exception handling](/defender-vulnerability-management/tvm-security-recommendation#file-for-exception)| Create exceptions for recommendations that can't be patched.|
31+
|[Customizable Vulnerability Notifications](/defender-endpoint/configure-vulnerability-email-notifications)| Alert key stakeholders with customizable notifications.|
32+
|[Reporting Inaccuracies](/defender-vulnerability-management/tvm-weaknesses#report-inaccuracy)| Users can report inaccuracies on discovered CVEs or request support for new vulnerabilities.|
33+
34+
## Weaknesses page
35+
36+
The Microsoft Defender portal displays Microsoft Defender for IoT security vulnerabilities in the **Endpoints > Weaknesses** page.
37+
38+
Vulnerabilities are listed based on their publicly registered Common Vulnerability and Exposures(CVEs) ID.
39+
40+
The **Weaknesses** page lists the detected security vulnerabilities across all devices, endpoints, applications and other sources on your network. The data can be filtered according to device groups based on the created sites.
41+
42+
The OT security administrator uses the list of detected vulnerabilities in the **Weaknesses** page to send a remediation request for the relevant team to handle.
43+
44+
Learn more about the [Weaknesses page in the Microsoft Defender Vulnerability Management](/defender-vulnerability-management/tvm-weaknesses).
45+
46+
## Next steps
47+
48+
[Prioritize and investigate vulnerabilities](prioritize-vulnerabilities.md) in Microsoft Defender for IoT.

defender-for-iot/get-started.md

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: Get started with Microsoft Defender for IoT in the Defender portal
3+
description: This article describes how to set up Microsoft Defender for IoT in the Defender portal.
4+
ms.service: defender-for-iot
5+
author: lwainstein
6+
ms.author: lwainstein
7+
ms.localizationpriority: medium
8+
ms.date: 05/19/2024
9+
ms.topic: how-to
10+
---
11+
12+
# Get started with Microsoft Defender for IoT in the Defender portal
13+
14+
Microsoft Defender for IoT in the Microsoft Defender portal allows you to analyze OT data, generate alerts, and identify network risks. This article explains how to create a trial license for Defender for IoT in the Defender portal using your Microsoft tenant.
15+
16+
One trial license is available per tenant. The trial license is limited to a maximum of 1,000 OT devices and lasts for 90 days. After you set up the trial license, you can access the Defender for IoT security insights available for your network.
17+
18+
When you finish setting up the trial license, you can continue to [set up a site](set-up-sites.md) to monitor your OT devices at the production site level.
19+
20+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
21+
22+
## Add a trial license
23+
24+
To add a trial license for Microsoft Defender for IoT:
25+
26+
1. Open the [Microsoft Defender for IoT - OT Site License (1000 max devices per site) Trial wizard](https://signup.microsoft.com/get-started/signup?products=d2bdd05f-4856-4569-8474-2f9ec298923b).
27+
28+
:::image type="content" source="media/get-started/trial-license-get-started.png" alt-text="Screenshot of the set up page for the Microsoft Defender for IoT trial license.":::
29+
30+
1. In the **Email** field, type the email address you want to associate with the trial license, and select **Next**.
31+
32+
1. Confirm that the email address is correct by selecting **Set up account**.
33+
34+
1. In the **Tell us about yourself** page, type your details and select **Next**.
35+
36+
1. Select whether you want the confirmation message to be sent to you via SMS or a phone call. Verify your phone number, and then select **Send verification code**.
37+
38+
1. After receiving the code, type it in the **Enter your verification code** field.
39+
40+
1. In the **How you'll sign in** page, type a username and password and select **Next**.
41+
42+
1. In the **Confirmation details** page, note your order number and username, and select **Start using Microsoft Defender for IoT - OT Site License (1000 max devices per site) Trial** to continue.
43+
44+
Once you have a trial license, [set up a new site](set-up-sites.md) so that Microsoft Defender for IoT can begin sending data to the Defender portal.
45+
46+
## Public preview features
47+
48+
We recommend that you also turn on and benefit from the available [Defender portal preview features](/defender-xdr/preview#turn-on-preview-features).

defender-for-iot/index.md

Lines changed: 0 additions & 16 deletions
This file was deleted.

defender-for-iot/index.yml

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
### YamlMime:Landing
2+
3+
title: Microsoft Defender for IoT in the Defender portal (Preview) documentation # < 60 chars
4+
summary: Microsoft Defender for IoT in the Defender portal (Preview) provides visibility and threat protection for IoT/OT environments while reducing cyber risk through continuous vulnerability discovery, risk-based prioritization, and remediation. # < 160 chars
5+
6+
metadata:
7+
title: Microsoft Defender for IoT in the Defender portal (Preview) documentation # Required; page title displayed in search results. Include the brand. < 60 chars.
8+
description: Learn about Microsoft Defender for IoT in the Defender portal, and maximize the built-in security capabilities to protect devices, detect malicious activity, and remediate threats# Required; article description that is displayed in search results. < 160 chars.
9+
services: office-365-security-compliance
10+
ms.service: defender-for-iot
11+
ms.topic: landing-page # Required
12+
ms.custom: intro-hub-or-landing
13+
author: limwainstein #Required; your GitHub user alias, with correct capitalization.
14+
ms.author: lwainstein #Required; microsoft alias of author; optional team alias.
15+
ms.date: 06/23/2024
16+
ms.localizationpriority: high
17+
18+
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
19+
20+
landingContent:
21+
# Cards and links should be based on top customer tasks or top subjects
22+
# Start card title with a verb
23+
# Card (optional)
24+
- title: Defender for IoT
25+
linkLists:
26+
- linkListType: overview
27+
links:
28+
- text: What is Microsoft Defender for IoT in the Defender portal?
29+
url: microsoft-defender-iot.md
30+
- linkListType: concept
31+
links:
32+
- text: Site security
33+
url: site-security-overview.md
34+
- linkListType: how-to-guide
35+
links:
36+
- text: Manage sites
37+
url: manage-sites.md
38+
39+
# Card
40+
- title: Get started
41+
linkLists:
42+
- linkListType: get-started
43+
links:
44+
- text: Prerequisites
45+
url: prerequisites.md
46+
- linkListType: get-started
47+
links:
48+
- text: Get started
49+
url: get-started.md
50+
- linkListType: quickstart
51+
links:
52+
- text: Set up sites
53+
url: set-up-sites.md
54+
55+
# Card
56+
- title: How-to
57+
linkLists:
58+
- linkListType: how-to-guide
59+
links:
60+
- text: Monitor site security
61+
url: monitor-site-security.md
62+
- text: Prioritize and remediate vulnerabilities
63+
url: prioritize-vulnerabilities.md
64+
- text: Investigate incidents and alerts
65+
url: investigate-threats.md
66+
- text: Manage sites
67+
url: manage-sites.md
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal
3+
description: This article describes how to investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal.
4+
ms.service: defender-for-iot
5+
author: lwainstein
6+
ms.author: lwainstein
7+
ms.localizationpriority: medium
8+
ms.date: 06/26/2024
9+
ms.topic: how-to
10+
---
11+
12+
# Investigate incidents and alerts
13+
14+
Microsoft Defender for IoT in the Microsoft Defender portal displays incidents and alerts, which enhance your network security and operations with real-time details about events logged in your operational technology (OT) network.
15+
16+
Alerts are the basis of all incidents and indicate the occurrence of malicious or suspicious events in your environment. Within an incident, you analyze the alerts that affect your network, understand what they mean, and collate the evidence so that you can devise an effective remediation plan.
17+
18+
Learn more about [alerts](/defender-xdr/investigate-alerts) and [incidents](/defender-xdr/investigate-incidents) in the Defender portal.
19+
20+
In this article, you learn how to investigate a Microsoft Defender for IoT incident and its associated alerts, and how to remediate the security issues raised by the alert.
21+
22+
Alerts in the **Incidents** page uniquely combine IT and OT environment signals to detect potential threats and data leaks. The **Incidents** page displays:
23+
24+
- A history of the alerts connected to the incident and an incident graph. The graph shows other devices connected to the affected OT device that might also be compromised.
25+
- Alert descriptions, which explain the type of detected security issue.
26+
- Remediation options to solve the security problem.
27+
28+
> [!NOTE]
29+
> Incident and alert data for Defender for IoT only appear once you have a site set up and your devices are sending data to the Defender portal. Learn how to [set up a site](set-up-sites.md).
30+
31+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
32+
33+
## Investigate alerts
34+
35+
To investigate an alert:
36+
37+
1. In the [Microsoft Defender portal](https://security.microsoft.com/machines) menu, select **Incidents & alerts > Incidents**.
38+
39+
1. To display OT related incidents:
40+
41+
1. Select **Add filter**.
42+
1. Select **Product name** and select **Add**.
43+
1. Select the **Product names** tab that appears and type: *Defender for IoT*.
44+
1. Select **Apply**.
45+
46+
1. Locate and select an incident.
47+
48+
The specific incident page shows the attack story made up of the alert timeline, an incident graph and the incident details. The incident graph displays the OT device and the other IT or IoT devices connected to this alert, to show possible compromised connections.
49+
50+
1. Select an alert from the alerts list.
51+
52+
The incident graph and incident details display specific data for this alert.
53+
54+
1. In the **Incident** panel, review the information, read the **Alert description** and follow the **Alert recommended actions** to remediate the issue.
55+
56+
## Defender for IoT alert
57+
58+
Defender for IoT generates its own unique alert.
59+
60+
| Name | Description |
61+
|----|----|
62+
|**Possible operational impact due to a compromised device** |A compromised device communicated with an operational technology (OT) asset. An attacker might be attempting to control or disrupt physical operations. |

0 commit comments

Comments
 (0)