Skip to content

Commit 6f362a0

Browse files
authored
Merge pull request #2266 from limwainstein/protect-ot-article-in-xdr
Protect IoT/OT
2 parents 8be1f98 + 5c50701 commit 6f362a0

File tree

7 files changed

+90
-7
lines changed

7 files changed

+90
-7
lines changed

defender-endpoint/device-discovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ To address the challenge of gaining enough visibility to locate, identify, and s
9898
- **Microsoft Defender for IoT**: This integration combines Defender for Endpoint's device discovery capabilities with Microsoft Defender for IoT in the Microsoft Defender portal (Preview) to secure:
9999

100100
- OT devices, such as servers or packaging systems. For more information, see [onboard Defender for IoT in the Defender portal](/defender-for-iot/get-started).
101-
- Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint).
101+
- Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Get started with Enterprise IoT security](/defender-for-iot/enterprise-iot-get-started).
102102

103103
## Vulnerability assessment on discovered devices
104104

defender-for-iot/device-discovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Learn how to [discover and manage your IoT/OT devices](manage-devices-inventory.
2525

2626
If you don't yet have a Defender for IoT license, the **Device inventory** page detects your OT devices and lists them with regular device data, but without security data. For example, the device name, IP, and category are visible, while the risk level isn't visible. The device inventory also displays a note at the top of the page that indicates the number of unprotected OT devices.
2727

28-
In this case, [onboard Defender for IoT](get-started.md) to get security value for your OT devices.
28+
To enable protection and get the full security value for your OT devices, [onboard Defender for IoT](get-started.md) to get security value for your OT devices.
2929

3030
If you're seeing the message that indicates the number of unprotected OT devices, and you've already set up Defender for IoT, [set up a site](set-up-sites.md) and associate the relevant devices with it.
3131

defender-for-iot/enterprise-iot-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To view enterprise IoT security data:
2727

2828
1. When you select a specific device, the device details page opens. Explore the following tabs to view data added by enterprise IoT security for your device:
2929

30-
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
30+
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
3131

3232
You can also set up advanced hunting queries to create custom alert rules. For more information, see [advanced hunting queries for enterprise IoT security](#advanced-hunting-queries-for-enterprise-iot).
3333

@@ -41,7 +41,7 @@ On the **Device inventory** page, select **Go hunt** to query devices using tabl
4141

4242
## Advanced hunting queries for enterprise IoT
4343

44-
This section lists sample advanced hunting queries that you can use in Microsoft 365 Defender to help you monitor and secure your IoT devices with enterprise IoT security.
44+
This section lists sample advanced hunting queries that you can use in Microsoft Defender to help you monitor and secure your IoT devices with enterprise IoT security.
4545

4646
### Find devices by specific type or subtype
4747

defender-for-iot/enterprise-iot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ While the number of IoT devices continues to grow, they often lack the security
1919

2020
## Enterprise IoT monitoring in the Defender portal
2121

22-
Extend Microsoft Defender for IoT's security features to include enterprise IoT devices. Add the enterprise IoT security feature to your existing Microsoft Defender for Endpoint license, and view related vulnerabilities and recommendations for IoT devices that are seemlessly integrated into the Microsoft Defender portal.
22+
Extend Microsoft Defender for IoT's security features to include enterprise IoT devices. Add the enterprise IoT security feature to your existing Microsoft Defender for Endpoint license, and view related vulnerabilities and recommendations for IoT devices that are seamlessly integrated into the Microsoft Defender portal.
2323

2424
:::image type="content" source="media/enterprise-iot/eiot-architecture.png" alt-text="The architecture showing the use of enterprise IoT":::
2525

defender-xdr/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,8 @@
6262
href: /defender-office-365/mdo-about?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
6363
- name: Protect your cloud apps
6464
href: /defender-cloud-apps/what-is-defender-for-cloud-apps?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
65+
- name: Protect your IoT/OT assets
66+
href: protect-against-iot-ot-threats.md
6567
- name: Microsoft Secure Score
6668
items:
6769
- name: Overview
@@ -73,7 +75,7 @@
7375
- name: Track your score history and meet goals
7476
href: microsoft-secure-score-history-metrics-trends.md
7577
- name: Data storage and privacy
76-
href: secure-score-data-storage-privacy.md
78+
href: secure-score-data-storage-privacy.md
7779
- name: Investigate and respond to threats
7880
items:
7981
- name: Overview

defender-xdr/prerequisites.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,8 @@ Any of these licenses give you access to Microsoft Defender XDR features via the
4141
- Windows 11 Enterprise E5 or A5
4242
- Enterprise Mobility + Security (EMS) E5 or A5
4343
- Office 365 E5 or A5
44-
- Microsoft Defender for Endpoint
44+
- Microsoft Defender for Endpoint
45+
- [Microsoft Defender for IoT - Enterprise IoT protection](/defender-for-iot/enterprise-iot-licenses#enterprise-iot-licenses) (includes protection for enterprise IoT devices with the Microsoft 365 E5 (ME5) or E5 Security license)
4546
- Microsoft Defender for Identity
4647
- Microsoft Defender for Cloud Apps or [Cloud App Discovery](/defender-cloud-apps/editions-cloud-app-security-aad)
4748
- Microsoft Defender for Office 365 (Plan 2)
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: IoT/OT security - protect enterprise IoT and OT assets
3+
description: Learn how Defender for IoT detects and monitors IoT and OT devices to protect your environment against threats raised by IoT and OT devices.
4+
ms.service: defender-xdr
5+
ms.author: lwainstein
6+
author: limwainstein
7+
ms.localizationpriority: medium
8+
manager: raynew
9+
audience: ITPro
10+
ms.topic: conceptual
11+
ms.date: 01/20/2024
12+
appliesto:
13+
- Microsoft Defender for XDR
14+
- Microsoft Defender for Endpoint
15+
- Microsoft Defender for IoT
16+
17+
#Customer intent: As a Defender XDR customer, I want to know what IoT/OT protection is included in my license so that I can better protect my IoT/OT assets.
18+
---
19+
20+
# IoT/OT security - protect enterprise IoT and OT assets
21+
22+
The Internet of Things (IoT) connects billions of smart devices used in homes and businesses, while Operational Technology (OT) focuses on industrial systems like factory equipment and critical infrastructure. Securing OT/IoT environments comes with unique challenges, like unmanaged devices, increased attack surfaces, and the absence of traditional security controls (review [more security challenges](#enterprise-iot-security-challenges)).
23+
24+
To maintain operational reliability and safety, organizations must use [tailored IoT/OT security approaches](/defender-for-iot/microsoft-defender-iot) due to the unique risks in these environments. Microsoft Defender for IoT addresses these unique risks, providing comprehensive OT security, including visibility into OT environments and advanced threat protection.
25+
26+
In this article, you learn about IoT/OT security challenges, and how Defender XDR leverages Defender for IoT to detect and monitor enterprise IoT and OT devices.
27+
28+
> [!NOTE]
29+
> Microsoft E5 and E5 Security customers can enable enterprise IoT security as part of their license. Learn more about the [Enterprise IoT device protection](#enterprise-iot-device-protection-in-defender-for-endpoint-and-defender-xdr) supported for different licenses.
30+
31+
## Enterprise IoT security challenges
32+
33+
When IoT/OT devices can't be protected by traditional security monitoring systems, each new wave of innovation increases the risk and possible attack surfaces across those IoT devices and OT networks.
34+
35+
Specifically, enterprise IoT security challenges include:
36+
37+
- Lack of visibility into unmanaged IoT devices, which create significant blind spots and increase the enterprise attack surface.
38+
- Complex device authentication and identity management, where traditional security models like password-based authentication are often insufficient.
39+
- Large amounts of sensitive data with insufficient data encryption.
40+
- Lack of built-in security controls and security best practices, making enterprise IoT devices easy targets for sophisticated attacks.
41+
- Limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates.
42+
43+
## Enterprise IoT device protection in Defender for Endpoint and Defender XDR
44+
45+
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender for Endpoint and Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
46+
47+
While monitoring endpoints on the network, the existing Defender for Endpoint agent detects, identifies, assesses, and secures enterprise IoT assets on the monitored endpoints.
48+
49+
This table describes the supported protection for different licenses.
50+
51+
|License |Device discovery |Threat detection - managed/unmanaged devices |VM |Security recommendations |How to enable |
52+
|---------|---------|---------|---------|---------|---------|---------|
53+
|Microsoft Defender for Endpoint P2 |✅ |✅ |❌ |❌ |- [Start with a free trial](/defender-for-iot/enterprise-iot-get-started#set-up-a-standalone-trial-license)- Purchase the [standalone full license](/defender-for-iot/enterprise-iot-get-started#set-up-a-standalone-full-license). |
54+
|Enterprise IoT add-on device license (add-on to MDE P2) |✅ |✅ |✅ |✅ |[Enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) |
55+
|E5<sup>1</sup> |&#x2705; |&#x2705; |&#x2705; |&#x2705; |[Enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) |
56+
57+
<sup>1</sup>Includes the MDE P2 license and the enterprise IoT add-on. Each E5 user license supports five enterprise IoT add-on device licenses.
58+
59+
### Supported devices
60+
61+
Enterprise IoT protection includes devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs).
62+
63+
### Main features
64+
65+
|Feature |Location |More details |
66+
|---------|---------|---------|
67+
|Discover enterprise IoT assets for a full enterprise IoT inventory |**Assets > Devices > IoT devices** |[Device inventory overview](/defender-endpoint/machines-view-overview) |
68+
|Review alerts triggered by enterprise IoT assets |**Device details** page > **Alerts** tab |- Learn more about [Defender for Endpoint alerts](/defender-endpoint/review-alerts).<br>- Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials page](https://security.microsoft.com/tutorials/all). |
69+
|Review security recommendations for enterprise IoT assets |**Device details** page > **Security recommendations** tab |[Security recommendations in Defender for Endpoint](/defender-endpoint/device-discovery#vulnerability-assessment-on-discovered-devices) |
70+
|Discover vulnerabilities associated with enterprise IoT assets |**Device details** page > **Discovered vulnerabilities** tab |[Vulnerabilities in your organization](/defender-vulnerability-management/tvm-weaknesses) |
71+
|Use advanced hunting queries to [create custom alert rules](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) or to [collect vulnerabilities](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) across all your devices |**Advanced hunting** page in the Defender portal | |
72+
73+
## Extend protection to OT devices
74+
75+
To go beyond the protection that the Defender for Endpoint agent provides for enterprise IoT assets, Defender for IoT provides full visibility and security protection into OT assets in relevant internal networks.
76+
77+
For more information:
78+
79+
- [Onboard Defender for IoT](/defender-for-iot/get-started) to enable OT protection.
80+
- Learn about the [OT-specific security use-cases](/defender-for-iot/microsoft-defender-iot#what-are-the-main-defender-for-iot-use-cases) that Defender for IoT addresses.

0 commit comments

Comments
 (0)