Skip to content

Commit 9353b46

Browse files
committed
Restructuring
1 parent d79146d commit 9353b46

File tree

3 files changed

+29
-41
lines changed

3 files changed

+29
-41
lines changed

defender-endpoint/device-discovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ To address the challenge of gaining enough visibility to locate, identify, and s
9898
- **Microsoft Defender for IoT**: This integration combines Defender for Endpoint's device discovery capabilities with Microsoft Defender for IoT in the Microsoft Defender portal (Preview) to secure:
9999

100100
- OT devices, such as servers or packaging systems. For more information, see [onboard Defender for IoT in the Defender portal](/defender-for-iot/get-started).
101-
- Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint).
101+
- Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Get started with Enterprise IoT security](/defender-for-iot/enterprise-iot-get-started).
102102

103103
## Vulnerability assessment on discovered devices
104104

defender-xdr/TOC.yml

Lines changed: 3 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@
6464
href: /defender-office-365
6565
- name: Protect your cloud apps
6666
href: /defender-cloud-apps
67+
- name: Protect your IoT/OT assets
68+
href: protect-against-iot-ot-threats.md
6769
- name: Microsoft Secure Score
6870
items:
6971
- name: Overview
@@ -75,31 +77,7 @@
7577
- name: Track your score history and meet goals
7678
href: microsoft-secure-score-history-metrics-trends.md
7779
- name: Data storage and privacy
78-
href: secure-score-data-storage-privacy.md
79-
- name: Protect your endpoints
80-
href: /defender-endpoint
81-
- name: Protect your IoT/OT assets
82-
href: protect-against-iot-ot-threats.md
83-
- name: Protect your identities
84-
items:
85-
- name: Sensor settings and health
86-
href: /defender-for-identity/sensor-settings?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
87-
- name: Directory Services account
88-
href: /defender-for-identity/deploy/directory-service-accounts?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
89-
- name: VPN integration
90-
href: /defender-for-identity/vpn-integration?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
91-
- name: Set entity tags
92-
href: /defender-for-identity/entity-tags?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
93-
- name: Investigate Defender for Identity alerts
94-
href: /defender-for-identity/manage-security-alerts?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
95-
- name: Configure detection exclusions
96-
href: /defender-for-identity/exclusions?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
97-
- name: Email and syslog notifications
98-
href: /defender-for-identity/notifications?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
99-
- name: Protect your Office 365 workloads
100-
href: /defender-office-365
101-
- name: Create Custom Defender XDR reports
102-
href: defender-xdr-custom-reports.md
80+
href: secure-score-data-storage-privacy.md
10381
- name: Investigate and respond to threats
10482
items:
10583
- name: Overview

defender-xdr/protect-against-iot-ot-threats.md

Lines changed: 25 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -13,39 +13,49 @@ ms.date: 01/20/2024
1313

1414
# Protect enterprise IoT assets
1515

16-
As the Internet of Things (IoT) and Operational Technology (OT) security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](../defender-for-iot/microsoft-defender-iot.md) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
16+
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. As the IoT/OT security landscape becomes more complex and attacks become more sophisticated, organizations must [secure their IoT/OT environments](../defender-for-iot/microsoft-defender-iot) efficiently to maintain operational reliability and safety. Microsoft Defender for IoT is designed to secure these environments, protecting networks and devices from unique IoT/OT vulnerabilities and threats.
1717

1818
In this article, you learn about IoT/OT security challenges, which protection is included with Defender XDR, how Defender XDR detects and monitors enterprise IoT devices, and how to extend this protection to OT devices and environments.
1919

2020
> [!NOTE]
21-
> Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. For more information, see [how it works](#how-defender-xdr-detects-and-monitors-enterprise-iot-devices).
21+
> Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license.
2222
2323
## Enterprise IoT security challenges
2424

25-
The Internet of Things (IoT) supports billions of connected devices that use both operational technology (OT) and IoT networks. IoT/OT devices and networks are often built using specialized protocols, and might prioritize operational challenges over security.
25+
When IoT/OT devices can't be protected by traditional security monitoring systems, each new wave of innovation increases the risk and possible attack surfaces across those IoT devices and OT networks.
2626

27-
When IoT/OT devices can't be protected by traditional security monitoring systems, each new wave of innovation increases the risk and possible attack surfaces across those IoT devices and OT networks.
27+
Specifically, enterprise IoT security challenges include:
2828

29-
Specific challenges for enterprise IoT assets include:
29+
- Complex device authentication and identity management, where traditional security models like password-based authentication are often insufficient.
30+
- Large amounts of sensitive data with insufficient data encryption.
31+
- Lack of security best practices in development, including the use of reputable and updated libraries.
32+
- Limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates.
33+
- Unmanaged IoT devices, lack of visibility into IoT assets, and limited options for vulnerability management. These conditions increase the enterprise attack surfaces.
3034

31-
- Complex device authentication and identity management, and traditional security models like password-based authentication are often insufficient.
32-
- IoT devices commonly collect large amounts of sensitive data, but they don’t encrypt data properly.
33-
- IoT device creators do not always follow development security best practices, including the use of reputable and updated libraries.
34-
- Many IoT devices have limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates.
35-
- Unmanaged IoT devices increase enterprise attack surfaces. There is often a lack of visibility into IoT assets and limited options for vulnerability management.
36-
37-
## How Defender XDR protects enterprise IoT devices
35+
## Enterprise IoT device protection in Defender XDR
3836

3937
[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations.
4038

4139
The existing Defender for Endpoint agent runs on enterprise IoT assets and identifies, assesses, and secures them like any other organizational endpoint.
4240

43-
|How to enable |Supported devices |Main capabilities |
41+
## License and supported devices
42+
43+
Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. Each license supports five devices per ME5/ E5 Security license.
44+
45+
Defender XDR protects Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs).
46+
47+
## Main capabilities
48+
49+
|Feature |Location |More details |
4450
|---------|---------|---------|
45-
|Defender for Endpoint customers can [enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) as part of their Microsoft 365 E5 (ME5) / E5 Security license. |[Supported devices](../defender-for-iot/organizations/billing#defender-for-iot-devices) include an extensive range of hardware models and vendors, spanning corporate IoT devices such as printers, cameras, and VoIP phones, among others. |- **[Discover assets]([Device discovery overview](../defender-endpoint/machines-view-overview.md)** for a full enterprise IoT inventory.<br>- **[Review alerts]([Review alerts in Microsoft Defender for Endpoint](../defender-endpoint/review-alerts.md)) triggered by IoT assets**.<br>- Set up [advanced hunting queries](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint#sample-advanced-hunting-queries-for-enterprise-iot) to create custom alert rules.<br>- [Review security recommendations](../defender-vulnerability-management/tvm-security-recommendation.md) available for IoT assets to reduce risk and maintain a smaller attack surface.<br>- Check for [known vulnerabilities]([Vulnerable components](../defender-vulnerability-management/tvm-remediation.md)) associated with IoT assets. Alternatively, use [advanced hunting queries](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint#sample-advanced-hunting-queries-for-enterprise-iot) to collect vulnerabilities across all your devices. |
51+
|Discover enterprise IoT assets for a full enterprise IoT inventory. |**Assets > Devices > IoT devices** |[Device inventory overview](../defender-endpoint/machines-view-overview) |
52+
|Review alerts triggered by enterprise IoT assets |**Device details** page > **Alerts** tab |- Learn more about [Defender for Endpoint alerts](../defender-endpoint/review-alerts).<br>- Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials page](https://security.microsoft.com/tutorials/all). |
53+
|Review security recommendations for enterprise IoT assets |**Device details** page > **Security recommendations** tab |[Security recommendations in Defender for Endpoint](/defender-endpoint/device-discovery#vulnerability-assessment-on-discovered-devices) |
54+
|Discover vulnerabilities associated with enterprise IoT assets |**Device details** page > **Discovered vulnerabilities** tab |[Vulnerabilities in your organization](/defender-vulnerability-management/tvm-weaknesses) |
55+
|Use advanced hunting queries to [create custom alert rules](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) or to [collect vulnerabilities](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) across all your devices. |
4656

4757
## Extend protection to OT devices
4858

49-
To go beyond the protection that the Defender for Endpoint agent provides for OT/IoT assets, Defender for IoT provides full visibility and security protection with OT sensors that monitor traffic in relevant internal networks. Learn more about [Defender for IoT features and use cases](/defender-for-iot/microsoft-defender-iot).
59+
To go beyond the protection that the Defender for Endpoint agent provides for enterprise IoT assets, Defender for IoT provides full visibility and security protection into OT assets in relevant internal networks. Learn more about [Defender for IoT features and use cases](/defender-for-iot/microsoft-defender-iot).
5060

5161
To enable OT protection, you need to enable the Defender for IoT license. Learn how to [onboard Defender for IoT](/defender-for-iot/get-started).

0 commit comments

Comments
 (0)