|
| 1 | +--- |
| 2 | +title: IoT/OT security - protect enterprise IoT and OT assets |
| 3 | +description: Learn how Defender for IoT detects and monitors IoT and OT devices to protect your environment against threats raised by IoT and OT devices. |
| 4 | +ms.service: defender-xdr |
| 5 | +ms.author: lwainstein |
| 6 | +author: limwainstein |
| 7 | +ms.localizationpriority: medium |
| 8 | +manager: raynew |
| 9 | +audience: ITPro |
| 10 | +ms.topic: conceptual |
| 11 | +ms.date: 01/20/2024 |
| 12 | +appliesto: |
| 13 | + - Microsoft Defender for XDR |
| 14 | + - Microsoft Defender for Endpoint |
| 15 | + - Microsoft Defender for IoT |
| 16 | + |
| 17 | +#Customer intent: As a Defender XDR customer, I want to know what IoT/OT protection is included in my license so that I can better protect my IoT/OT assets. |
| 18 | +--- |
| 19 | + |
| 20 | +# IoT/OT security - protect enterprise IoT and OT assets |
| 21 | + |
| 22 | +The Internet of Things (IoT) connects billions of smart devices used in homes and businesses, while Operational Technology (OT) focuses on industrial systems like factory equipment and critical infrastructure. Securing OT/IoT environments comes with unique challenges, like unmanaged devices, increased attack surfaces, and the absence of traditional security controls (review [more security challenges](#enterprise-iot-security-challenges)). |
| 23 | + |
| 24 | +To maintain operational reliability and safety, organizations must use [tailored IoT/OT security approaches](/defender-for-iot/microsoft-defender-iot) due to the unique risks in these environments. Microsoft Defender for IoT addresses these unique risks, providing comprehensive OT security, including visibility into OT environments and advanced threat protection. |
| 25 | + |
| 26 | +In this article, you learn about IoT/OT security challenges, and how Defender XDR leverages Defender for IoT to detect and monitor enterprise IoT and OT devices. |
| 27 | + |
| 28 | +> [!NOTE] |
| 29 | +> Microsoft E5 and E5 Security customers can enable enterprise IoT security as part of their license. Learn more about the [Enterprise IoT device protection](#enterprise-iot-device-protection-in-defender-for-endpoint-and-defender-xdr) supported for different licenses. |
| 30 | +
|
| 31 | +## Enterprise IoT security challenges |
| 32 | + |
| 33 | +When IoT/OT devices can't be protected by traditional security monitoring systems, each new wave of innovation increases the risk and possible attack surfaces across those IoT devices and OT networks. |
| 34 | + |
| 35 | +Specifically, enterprise IoT security challenges include: |
| 36 | + |
| 37 | +- Lack of visibility into unmanaged IoT devices, which create significant blind spots and increase the enterprise attack surface. |
| 38 | +- Complex device authentication and identity management, where traditional security models like password-based authentication are often insufficient. |
| 39 | +- Large amounts of sensitive data with insufficient data encryption. |
| 40 | +- Lack of built-in security controls and security best practices, making enterprise IoT devices easy targets for sophisticated attacks. |
| 41 | +- Limited computational capacity, making it difficult to implement standard security measures like encryption, authentication, and firmware updates. |
| 42 | + |
| 43 | +## Enterprise IoT device protection in Defender for Endpoint and Defender XDR |
| 44 | + |
| 45 | +[Enterprise IoT security](/defender-for-iot/enterprise-iot) in Microsoft Defender for Endpoint and Defender XDR provides IoT-specific security value for IoT devices, including risk and exposure levels, vulnerabilities, and recommendations. |
| 46 | + |
| 47 | +While monitoring endpoints on the network, the existing Defender for Endpoint agent detects, identifies, assesses, and secures enterprise IoT assets on the monitored endpoints. |
| 48 | + |
| 49 | +This table describes the supported protection for different licenses. |
| 50 | + |
| 51 | +|License |Device discovery |Threat detection - managed/unmanaged devices |VM |Security recommendations |How to enable | |
| 52 | +|---------|---------|---------|---------|---------|---------|---------| |
| 53 | +|Microsoft Defender for Endpoint P2 |✅ |✅ |❌ |❌ |- [Start with a free trial](/defender-for-iot/enterprise-iot-get-started#set-up-a-standalone-trial-license)- Purchase the [standalone full license](/defender-for-iot/enterprise-iot-get-started#set-up-a-standalone-full-license). | |
| 54 | +|Enterprise IoT add-on device license (add-on to MDE P2) |✅ |✅ |✅ |✅ |[Enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) | |
| 55 | +|E5<sup>1</sup> |✅ |✅ |✅ |✅ |[Enable enterprise IoT security](/defender-for-iot/enterprise-iot-get-started#add-enterprise-iot-security-in-the-defender-portal) | |
| 56 | + |
| 57 | +<sup>1</sup>Includes the MDE P2 license and the enterprise IoT add-on. Each E5 user license supports five enterprise IoT add-on device licenses. |
| 58 | + |
| 59 | +### Supported devices |
| 60 | + |
| 61 | +Enterprise IoT protection includes devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). |
| 62 | + |
| 63 | +### Main features |
| 64 | + |
| 65 | +|Feature |Location |More details | |
| 66 | +|---------|---------|---------| |
| 67 | +|Discover enterprise IoT assets for a full enterprise IoT inventory |**Assets > Devices > IoT devices** |[Device inventory overview](/defender-endpoint/machines-view-overview) | |
| 68 | +|Review alerts triggered by enterprise IoT assets |**Device details** page > **Alerts** tab |- Learn more about [Defender for Endpoint alerts](/defender-endpoint/review-alerts).<br>- Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials page](https://security.microsoft.com/tutorials/all). | |
| 69 | +|Review security recommendations for enterprise IoT assets |**Device details** page > **Security recommendations** tab |[Security recommendations in Defender for Endpoint](/defender-endpoint/device-discovery#vulnerability-assessment-on-discovered-devices) | |
| 70 | +|Discover vulnerabilities associated with enterprise IoT assets |**Device details** page > **Discovered vulnerabilities** tab |[Vulnerabilities in your organization](/defender-vulnerability-management/tvm-weaknesses) | |
| 71 | +|Use advanced hunting queries to [create custom alert rules](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) or to [collect vulnerabilities](/defender-for-iot/enterprise-iot-manage#advanced-hunting-queries-for-enterprise-iot) across all your devices |**Advanced hunting** page in the Defender portal | | |
| 72 | + |
| 73 | +## Extend protection to OT devices |
| 74 | + |
| 75 | +To go beyond the protection that the Defender for Endpoint agent provides for enterprise IoT assets, Defender for IoT provides full visibility and security protection into OT assets in relevant internal networks. |
| 76 | + |
| 77 | +For more information: |
| 78 | + |
| 79 | +- [Onboard Defender for IoT](/defender-for-iot/get-started) to enable OT protection. |
| 80 | +- Learn about the [OT-specific security use-cases](/defender-for-iot/microsoft-defender-iot#what-are-the-main-defender-for-iot-use-cases) that Defender for IoT addresses. |
0 commit comments