You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/device-discovery.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ To address the challenge of gaining enough visibility to locate, identify, and s
98
98
-**Microsoft Defender for IoT**: This integration combines Defender for Endpoint's device discovery capabilities with Microsoft Defender for IoT in the Microsoft Defender portal (Preview) to secure:
99
99
100
100
- OT devices, such as servers or packaging systems. For more information, see [onboard Defender for IoT in the Defender portal](/defender-for-iot/get-started).
101
-
- Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint).
101
+
- Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Get started with Enterprise IoT security](/defender-for-iot/enterprise-iot-get-started).
Copy file name to clipboardExpand all lines: defender-xdr/protect-against-iot-ot-threats.md
+25-15Lines changed: 25 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,39 +13,49 @@ ms.date: 01/20/2024
13
13
14
14
# Protect enterprise IoT assets
15
15
16
-
As the Internet of Things (IoT) and Operational Technology (OT) security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](../defender-for-iot/microsoft-defender-iot.md) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
16
+
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. As the IoT/OT security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](../defender-for-iot/microsoft-defender-iot) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
17
17
18
18
In this article, you learn about IoT/OT security challenges, which protection is included with Defender XDR, how Defender XDR detects and monitors enterprise IoT devices, and how to extend this protection to OT devices and environments.
19
19
20
20
> [!NOTE]
21
-
> Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. For more information, see [how it works](#how-defender-xdr-detects-and-monitors-enterprise-iot-devices).
21
+
> Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license.
22
22
23
23
## Enterprise IoT security challenges
24
24
25
-
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. IoT/OT devices and networks are often built using specialized protocols, and might prioritize operational challenges over security.
25
+
When IoT/OT devices can't be protected by traditional security monitoring systems, each new wave of innovation increases the risk and possible attack surfaces across those IoT devices and OT networks.
26
26
27
-
When IoT/OT devices can't be protected by traditional security monitoring systems, each new wave of innovation increases the risk and possible attack surfaces across those IoT devices and OT networks.
Specific challenges for enterprise IoT assets include:
29
+
- Complex device authentication and identity management, where traditional security models like password-based authentication are often insufficient.
30
+
- Large amounts of sensitive data with insufficient data encryption.
31
+
- Lack of security best practices in development, including the use of reputable and updated libraries.
32
+
- Limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates.
33
+
- Unmanaged IoT devices, lack of visibility into IoT assets, and limited options for vulnerability management. These conditions increase the enterprise attack surfaces.
30
34
31
-
- Complex device authentication and identity management, and traditional security models like password-based authentication are often insufficient.
32
-
- IoT devices commonly collect large amounts of sensitive data, but they don’t encrypt data properly.
33
-
- IoT device creators do not always follow development security best practices, including the use of reputable and updated libraries.
34
-
- Many IoT devices have limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates.
35
-
- Unmanaged IoT devices increase enterprise attack surfaces. There is often a lack of visibility into IoT assets and limited options for vulnerability management.
36
-
37
-
## How Defender XDR protects enterprise IoT devices
35
+
## Enterprise IoT device protection in Defender XDR
38
36
39
37
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
40
38
41
39
The existing Defender for Endpoint agent runs on enterprise IoT assets and identifies, assesses, and secures them like any other organizational endpoint.
42
40
43
-
|How to enable |Supported devices |Main capabilities |
41
+
## License and supported devices
42
+
43
+
Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. Each license supports five devices per ME5/ E5 Security license.
44
+
45
+
Defender XDR protects Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs).
46
+
47
+
## Main capabilities
48
+
49
+
|Feature |Location |More details |
44
50
|---------|---------|---------|
45
-
|Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. |[Supported devices](../defender-for-iot/organizations/billing#defender-for-iot-devices) include an extensive range of hardware models and vendors, spanning corporate IoT devices such as printers, cameras, and VoIP phones, among others. |- **[Discover assets]([Device discovery overview](../defender-endpoint/machines-view-overview.md)** for a full enterprise IoT inventory.<br>- **[Review alerts]([Review alerts in Microsoft Defender for Endpoint](../defender-endpoint/review-alerts.md)) triggered by IoT assets**.<br>- Set up [advanced hunting queries](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint#sample-advanced-hunting-queries-for-enterprise-iot) to create custom alert rules.<br>- [Review security recommendations](../defender-vulnerability-management/tvm-security-recommendation.md) available for IoT assets to reduce risk and maintain a smaller attack surface.<br>- Check for [known vulnerabilities]([Vulnerable components](../defender-vulnerability-management/tvm-remediation.md)) associated with IoT assets. Alternatively, use [advanced hunting queries](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint#sample-advanced-hunting-queries-for-enterprise-iot) to collect vulnerabilities across all your devices. |
51
+
|Discover enterprise IoT assets for a full enterprise IoT inventory. |**Assets > Devices > IoT devices**|[Device inventory overview](../defender-endpoint/machines-view-overview)|
52
+
|Review alerts triggered by enterprise IoT assets |**Device details** page > **Alerts** tab |- Learn more about [Defender for Endpoint alerts](../defender-endpoint/review-alerts).<br>- Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials page](https://security.microsoft.com/tutorials/all). |
53
+
|Review security recommendations for enterprise IoT assets |**Device details** page > **Security recommendations** tab |[Security recommendations in Defender for Endpoint](/defender-endpoint/device-discovery#vulnerability-assessment-on-discovered-devices)|
54
+
|Discover vulnerabilities associated with enterprise IoT assets |**Device details** page > **Discovered vulnerabilities** tab |[Vulnerabilities in your organization](/defender-vulnerability-management/tvm-weaknesses)|
55
+
|Use advanced hunting queries to [create custom alert rules](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) or to [collect vulnerabilities](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) across all your devices. |
46
56
47
57
## Extend protection to OT devices
48
58
49
-
To go beyond the protection that the Defender for Endpoint agent provides for OT/IoT assets, Defender for IoT provides full visibility and security protection with OT sensors that monitor traffic in relevant internal networks. Learn more about [Defender for IoT features and use cases](/defender-for-iot/microsoft-defender-iot).
59
+
To go beyond the protection that the Defender for Endpoint agent provides for enterprise IoT assets, Defender for IoT provides full visibility and security protection into OT assets in relevant internal networks. Learn more about [Defender for IoT features and use cases](/defender-for-iot/microsoft-defender-iot).
50
60
51
61
To enable OT protection, you need to enable the Defender for IoT license. Learn how to [onboard Defender for IoT](/defender-for-iot/get-started).
0 commit comments