Skip to content

Commit 970e2af

Browse files
authored
Merge branch 'main' into docs-editor/android-configure-mam-1724494175
2 parents e27b75d + 40a98a3 commit 970e2af

19 files changed

+442
-126
lines changed

defender-endpoint/indicator-file.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
88
ms.localizationpriority: medium
9-
ms.date: 03/20/2024
9+
ms.date: 08/26/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -115,17 +115,15 @@ Choose if to Generate an alert on the file block event and define the alerts set
115115
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
116116

117117
> [!IMPORTANT]
118-
>
119-
> - Typically, file blocks are enforced and removed within a couple of minutes, but can take upwards of 30 minutes.
120-
> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
121-
> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
122-
> - If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
123-
>
118+
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
119+
- If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
120+
- In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
121+
- If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
122+
124123
> For more information about the EnableFileHashComputation group policy, see [Defender CSP](/windows/client-management/mdm/defender-csp).
125-
>
126-
> For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
124+
> > For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
127125
128-
## Advanced hunting capabilities (preview)
126+
> ## Advanced hunting capabilities (preview)
129127
130128
> [!IMPORTANT]
131129
> Information in this section (**Public Preview for Automated investigation and remediation engine**) relates to prerelease product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
@@ -158,11 +156,17 @@ The response action activity can also be viewable in the device timeline.
158156
Cert and File IoC policy handling conflicts follow this order:
159157

160158
1. If the file isn't allowed by Windows Defender Application Control and AppLocker enforce mode policies, then **Block**.
159+
161160
2. Else, if the file is allowed by the Microsoft Defender Antivirus exclusions, then **Allow**.
161+
162162
3. Else, if the file is blocked or warned by a block or warn file IoCs, then **Block/Warn**.
163+
163164
4. Else, if the file is blocked by SmartScreen, then **Block**.
165+
164166
5. Else, if the file is allowed by an allow file IoC policy, then **Allow**.
167+
165168
6. Else, if the file is blocked by attack surface reduction rules, controlled folder access, or antivirus protection, then **Block**.
169+
166170
7. Else, **Allow** (passes Windows Defender Application Control & AppLocker policy, no IoC rules apply to it).
167171

168172
> [!NOTE]
@@ -184,15 +188,13 @@ Microsoft Defender Vulnerability Management's block vulnerable application featu
184188
|Windows Defender Application Control|Allow|Block|Allow|
185189
|Windows Defender Application Control|Block|Allow|Block|
186190
|Microsoft Defender Antivirus exclusion|Allow|Block|Allow|
187-
|
188191

189192
## See also
190193

191194
- [Create indicators](manage-indicators.md)
192195
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
193196
- [Create indicators based on certificates](indicator-certificates.md)
194197
- [Manage indicators](indicator-manage.md)
195-
196198
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
197199

198200
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/indicator-ip-domain.md

Lines changed: 22 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice:
1717
search.appverid: met150
18-
ms.date: 10/06/2023
18+
ms.date: 08/26/2024
1919
---
2020

2121
# Create indicators for IPs and URLs/domains
@@ -46,38 +46,42 @@ You can block malicious IPs/URLs through the settings page or by machine groups,
4646
> [!NOTE]
4747
> Classless Inter-Domain Routing (CIDR) notation for IP addresses is not supported.
4848
49-
## Before you begin
50-
51-
It's important to understand the following prerequisites prior to creating indicators for IPS, URLs, or domains:
52-
53-
### Network Protection requirements
54-
55-
URL/IP allow and block requires that the Microsoft Defender for Endpoint component _Network Protection_ is enabled in block mode. For more information on Network Protection and configuration instructions, see [Enable network protection](enable-network-protection.md).
56-
5749
### Supported operating systems
5850

59-
- Windows 10, version 1709 or later
6051
- Windows 11
61-
- Windows Server 2016
62-
- Windows Server 2012 R2
63-
- Windows Server 2019
52+
- Windows 10, version 1709 or later
6453
- Windows Server 2022
54+
- Windows Server 2019
55+
- Windows Server 2016 running [Defender for Endpoint modern unified solution](/defender-endpoint/configure-server-endpoints) (requires installation through MSI)
56+
- Windows Server 2012 R2 running [Defender for Endpoint modern unified solution](/defender-endpoint/configure-server-endpoints) (requires installation through MSI)
6557
- macOS
6658
- Linux
6759
- iOS
6860
- Android
6961

70-
### Windows Server 2016 and Windows Server 2012 R2 requirements
62+
## Before you begin
7163

72-
Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2).
64+
It's important to understand the following prerequisites prior to creating indicators for IPS, URLs, or domains.
7365

7466
### Microsoft Defender Antivirus version requirements
7567

76-
The _Antimalware client version_ must be 4.18.1906.x or later.
68+
This feature is available if your organization uses [Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-windows) (in active mode)
69+
70+
[Behavior Monitoring](/defender-endpoint/behavior-monitor) is enabled
71+
72+
[Cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus) is turned on.
73+
74+
[Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is functional
75+
76+
The antimalware client version must be `4.18.1906.x` or later. See [Monthly platform and engine versions](/defender-endpoint/microsoft-defender-antivirus-updates).
77+
78+
### Network Protection requirements
79+
80+
URL/IP allow and block requires that the Microsoft Defender for Endpoint component _Network Protection_ is enabled in **block mode**. For more information on Network Protection and configuration instructions, see [Enable network protection](enable-network-protection.md).
7781

7882
### Custom network indicators requirements
7983

80-
Ensure that **Custom network indicators** is enabled in **Microsoft Defender XDR** \> **Settings** \> **Advanced features**. For more information, see [Advanced features](advanced-features.md).
84+
To start blocking IP addresses and/or URL's, turn on "**Custom network indicators"** feature in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features**. For more information, see [Advanced features](advanced-features.md).
8185

8286
For support of indicators on iOS, see [Microsoft Defender for Endpoint on iOS](ios-configure-features.md#configure-custom-indicators).
8387

@@ -138,7 +142,7 @@ In the case where multiple different action types are set on the same indicator
138142
2. Warn
139143
3. Block
140144

141-
_Allow_ overrides _warn_ which overrides _block_: Allow > Warn > Block. Therefore, in the above example, Microsoft.com would be allowed.
145+
_Allow_ overrides _warn_ which overrides _block_: Allow > Warn > Block. Therefore, in the above example, `Microsoft.com` would be allowed.
142146

143147
### Defender for Cloud Apps Indicators
144148

defender-for-iot/TOC.yml

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,17 @@
1111
- name: What's new
1212
href: whats-new.md
1313
- name: Site security
14-
href: site-security-overview.md
14+
href: site-security-overview.md
15+
- name: Enterprise IoT
16+
items:
17+
- name: Enterprise IoT overview
18+
href: enterprise-iot.md
19+
- name: Enterprise IoT licenses
20+
href: enterprise-iot-licenses.md
21+
- name: Get started with enterprise IoT
22+
href: enterprise-iot-get-started.md
23+
- name: Manage enterprise IoT
24+
href: enterprise-iot-manage.md
1525
- name: Get started
1626
items:
1727
- name: Prerequisites

defender-for-iot/device-discovery.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-for-iot
55
author: limwainstein
66
ms.author: lwainstein
77
ms.localizationpriority: medium
8-
ms.date: 06/19/2024
8+
ms.date: 08/19/2024
99
ms.topic: conceptual
1010
---
1111

@@ -64,6 +64,17 @@ Defender for IoT's device inventory supports the following device classes:
6464
|**Enterprise**|Smart devices, printers, communication devices, or audio/video devices|
6565
|**Retail**|Barcode scanners, humidity sensor, punch clocks|
6666

67+
### Identified, unique devices
68+
69+
Defender for IoT can discover all devices, of any type, across all environments. Devices are listed in the Defender for IoT **Device inventory** pages based on a unique IP and MAC address coupling.
70+
71+
Defender for IoT identifies single and unique devices as follows:
72+
73+
|Type |Description |
74+
|---------|---------|
75+
|**Identified as individual devices** | Devices identified as *individual* devices include:<br>**IT, OT, or IoT devices with one or more NICs**, including network infrastructure devices such as switches and routers<br><br>**Note**: A device with modules or backplane components, such as racks or slots, is counted as a single device, including all modules or backplane components.|
76+
|**Not identified as individual devices** | The following items *aren't* considered as individual devices, and do not count against your license:<br><br>- **Public internet IP addresses** <br>- **Multi-cast groups**<br>- **Broadcast groups**<br>- **Inactive devices**<br><br> Network-monitored devices are marked as *inactive* when there's no network activity detected within a specified time:<br><br> - **OT networks**: No network activity detected for more than 60 days<br> - **Enterprise IoT networks**: No network activity detected for more than 30 days<br><br>**Note**: Endpoints already managed by Defender for Endpoint are not considered as separate devices by Defender for IoT. |
77+
6778
## Next steps
6879

6980
[Discover and manage devices](manage-devices-inventory.md)
Lines changed: 142 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,142 @@
1+
---
2+
title: Get started for Enterprise IoT for Microsoft Defender for IoT in the Defender portal
3+
description: Learn how to set up and start monitoring enterprise IoT devices using Microsoft Defender for IoT in the Microsoft Defender portal.
4+
ms.service: defender-for-iot
5+
author: limwainstein
6+
ms.author: lwainstein
7+
ms.localizationpriority: medium
8+
ms.date: 08/25/2024
9+
ms.topic: how-to
10+
---
11+
12+
# Get started with enterprise IoT
13+
14+
Enterprise IoT security improves the monitoring and protection of the IoT devices in your network, such as printers, smart TVs, Voice over Internet Protocol (VoIP) devices, conferencing systems and purpose-built, proprietary devices.
15+
16+
The security monitoring includes IoT related alerts, vulnerabilities, and recommendations that are integrated with your existing Microsoft Defender for Endpoint data. To understand more about the integration between Defender for Endpoint and Defender for IoT, see [enterprise IoT overview](enterprise-iot.md).
17+
18+
In this article you'll learn how to add enterprise IoT to your Microsoft Defender portal and use the IoT specific security features to protect your IoT environment.
19+
20+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
21+
22+
## Prerequisites
23+
24+
Make sure that you have:
25+
26+
- IoT devices in your network, visible in the Microsoft Defender portal **Device inventory**
27+
28+
- Access to the Microsoft Defender Portal as a [Security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator)
29+
30+
- One of the following licenses:
31+
32+
- A Microsoft 365 E5 (ME5) or E5 Security license. Enterprise IoT security is included in this package and needs to be turned on.
33+
34+
- Microsoft Defender for Endpoint P2, with an extra, standalone **Microsoft Defender for IoT - EIoT Device License - add-on** license, available for trial or purchase from the Microsoft 365 admin center.
35+
36+
## Add enterprise IoT security in the Defender portal
37+
38+
There are two ways to add enterprise IoT to the Defender portal:
39+
40+
- ME5/ E5 Security customers: Turn on support for enterprise IoT Security in the Defender Portal. For more information, see [turn on enterprise IoT security](#me5-e5-security-customers).
41+
42+
- Defender for Endpoint P2 customers: Start with a free trial or purchase standalone, per-device licenses to gain the same IoT-specific security value. For more information, see [set up a standalone trial license](#set-up-a-standalone-trial-license). To purchase a full license, see [purchase the standalone full license](#set-up-a-standalone-full-license).
43+
44+
## ME5/ E5 Security customers
45+
46+
This procedure describes how to turn on enterprise IoT security in Defender portal for ME5/ E5 Security customers.
47+
48+
If you have extra devices that aren't covered by your ME5/E5 licenses, you can purchase standalone licenses. For more information, see [set up a standalone full license](#set-up-a-standalone-full-license).
49+
50+
**To turn on enterprise IoT security**:
51+
52+
1. In [Microsoft Defender portal](https://security.microsoft.com/), select **Settings** > **Device Discovery** > **Enterprise IoT**.
53+
54+
> [!NOTE]
55+
>
56+
> Ensure you have turned on Device Discovery in **Settings** > **Endpoints** > **Advanced Features**.
57+
58+
1. Toggle the Enterprise IoT security option to **On**. For example:
59+
60+
:::image type="content" source="media/enterprise-iot-get-started/eiot-toggle-on.png" alt-text="Screenshot of enterprise IoT toggled on in Microsoft Defender portal.":::
61+
62+
## Defender for Endpoint P2 customers
63+
64+
Customers with a Microsoft Defender for Endpoint P2 license only can use a trial standalone license for enterprise IoT security.
65+
66+
You can also purchase a license using the Microsoft 365 admin center. Before purchasing the license you need to [calculate the number of monitored devices in your network](#calculate-monitored-devices-for-enterprise-iot-security) to determine how many licenses you need.
67+
68+
### Set up a standalone trial license
69+
70+
**To start an enterprise IoT trial**:
71+
72+
1. Go to the [Microsoft 365 admin center](https://portal.office.com/AdminPortal/Home#/catalog) > **Marketplace**.
73+
74+
1. Search for the **Microsoft Defender for IoT - EIoT Device License - add-on** and filter the results by **Other services**. For example:
75+
76+
:::image type="content" source="media/enterprise-iot-get-started/eiot-standalone.png" alt-text="Screenshot of the Marketplace search results for the EIoT Device License.":::
77+
78+
> [!IMPORTANT]
79+
>
80+
> The prices shown in this image are for example purposes only and are not intended to reflect actual prices.
81+
82+
1. Under **Microsoft Defender for IoT - EIoT Device License - add-on**, select **Details**.
83+
84+
1. On the **Microsoft Defender for IoT - EIoT Device License - add-on** page, select **Start free trial**. On the **Check out** page, select **Try now**.
85+
86+
> [!TIP]
87+
> Make sure to [assign your licenses to specific users](/microsoft-365/admin/manage/assign-licenses-to-users) to start using them.
88+
89+
### Set up a standalone full license
90+
91+
Before purchasing a license you must calculate the number of devices you're monitoring.
92+
93+
#### Calculate monitored devices for enterprise IoT security
94+
95+
Use the following procedure to calculate how many devices you need to monitor if:
96+
97+
- You're an ME5/E5 Security customer and think you need to monitor more devices than the devices allocated per ME5/E5 Security license
98+
- You're a Defender for Endpoint P2 customer who's purchasing standalone enterprise IoT licenses
99+
100+
**To calculate the number of devices you're monitoring:**
101+
102+
1. In [Microsoft Defender portal](https://security.microsoft.com/), select **Assets** > **Devices** to open the **Device inventory** page.
103+
104+
1. Note down the total number of **IoT devices** listed.
105+
106+
For example:
107+
108+
:::image type="content" source="media/enterprise-iot-get-started/device-inventory-iot.png" alt-text="Screenshot of network device and IoT devices in the device inventory in Microsoft Defender for Endpoint." lightbox="media/enterprise-iot-get-started/device-inventory-iot.png":::
109+
110+
1. Round your total to a multiple of 100 and compare it against the number of licenses you have. For example:
111+
112+
- If in Microsoft Defender portal **Device inventory**, you have *1204* IoT devices.
113+
- Round down to *1200* devices.
114+
- You have 240 ME5 licenses, which cover **1200** devices.
115+
116+
You need another **4** standalone devices to cover the gap.
117+
118+
For more information, see the [Defender for Endpoint Device discovery overview](/microsoft-365/security/defender-endpoint/device-discovery).
119+
120+
> [!NOTE]
121+
> Devices listed on the **Computers & Mobile** tab, including those managed by Defender for Endpoint or otherwise, are not included in the number of [devices](device-discovery.md#identified-unique-devices) monitored by Defender for IoT.
122+
123+
#### Purchase the standalone license
124+
125+
To purchase the standalone full license:
126+
127+
1. Go to the [Microsoft 365 admin center](https://portal.office.com/AdminPortal/Home#/catalog) **Billing > Purchase services**. If you don't have this option, select **Marketplace** instead.
128+
129+
1. Search for the **Microsoft Defender for IoT - EIoT Device License - add-on** and filter the results by **Other services**. For example:
130+
131+
:::image type="content" source="media/enterprise-iot-get-started/eiot-standalone.png" alt-text="Screenshot of the Marketplace search results for the EIoT Device License.":::
132+
133+
> [!IMPORTANT]
134+
> The prices shown in this image are for example purposes only and are not intended to reflect actual prices.
135+
136+
1. On the **Microsoft Defender for IoT - EIoT Device License - add-on** page, enter your selected license quantity, select a billing frequency, and then select **Buy**.
137+
138+
For more information, see the [Microsoft 365 admin center help](/microsoft-365/admin/).
139+
140+
## Next steps
141+
142+
[Manage enterprise IoT](enterprise-iot-manage.md)

0 commit comments

Comments
 (0)