Skip to content

Commit c434b90

Browse files
authored
Merge pull request #940 from tarTech23/sitec
Site schema
2 parents a155f47 + abef3b2 commit c434b90

File tree

3 files changed

+49
-3
lines changed

3 files changed

+49
-3
lines changed

defender-for-iot/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,11 @@
77
- name: Overview
88
items:
99
- name: What is Microsoft Defender for IoT in the Defender portal?
10-
href: microsoft-defender-iot.md
10+
href: microsoft-defender-iot.md
11+
- name: What's new
12+
href: whats-new.md
1113
- name: Site security
12-
href: site-security-overview.md
14+
href: site-security-overview.md
1315
- name: Get started
1416
items:
1517
- name: Prerequisites

defender-for-iot/investigate-threats.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,17 @@ Defender for IoT generates its own unique alert.
5959

6060
| Name | Description |
6161
|----|----|
62-
|**Possible operational impact due to a compromised device** |A compromised device communicated with an operational technology (OT) asset. An attacker might be attempting to control or disrupt physical operations. |
62+
|**Possible operational impact due to a compromised device** |A compromised device communicated with an operational technology (OT) asset. An attacker might be attempting to control or disrupt physical operations. |
63+
64+
## Advanced hunting
65+
66+
Use the **Site** property listed in the **DeviceInfo** table to write queries for advanced hunting. This allows you to filter devices according to a specific site, for example, all devices that communicated with malicious devices at a specific site.
67+
68+
The following query lists all endpoint devices with the specific IP address at the San Francisco site.
69+
70+
```kusto
71+
DeviceInfo
72+
|where Site == "SanFrancisco" and PublicIP == "192.168.1.1" and DeviceCategory == "Endpoint"
73+
```
74+
75+
This is relevant for both the device inventory and site security. For more information, see [Advanced hunting](/../defender-xdr/advanced-hunting-overview) and the [Advanced hunting DeviceInfo schema](/../defender-xdr/advanced-hunting-deviceinfo-table).

defender-for-iot/whats-new.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
title: What's new in Microsoft Defender for IoT in the Defender portal
3+
description: This article describes new features available in Microsoft Defender for IoT in the Defender portal, including both OT and Enterprise IoT networks.
4+
ms.topic: whats-new
5+
ms.service: defender-for-iot
6+
author: lwainstein
7+
ms.author: lwainstein
8+
ms.localizationpriority: medium
9+
ms.date: 03/07/2024
10+
ms.custom: enterprise-iot
11+
---
12+
13+
# What's new in Microsoft Defender for IoT?
14+
15+
This article describes features available in Microsoft Defender for IoT in the Defender portal, across both OT and Enterprise IoT networks.
16+
17+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
18+
19+
## July 2024
20+
21+
|Service area |Updates |
22+
|---------|---------|
23+
| **OT networks** | - [Site property added DeviceInfo schema](#new-site-property-added-deviceinfo-schema) |
24+
25+
### New Site property added DeviceInfo schema
26+
27+
In the advanced hunting tables, the **Site** property is added to the **DeviceInfo** schema. For more information, see [investigate threats](investigate-threats.md#advanced-hunting).
28+
29+
## Next steps
30+
31+
[Get started with Defender for IoT](get-started.md)

0 commit comments

Comments
 (0)