You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-iot/enterprise-iot-get-started.md
+11-78Lines changed: 11 additions & 78 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Get started for Enterprise IoT for Microsoft Defender for IoT in the Defender portal
3
-
description: Learn how to set up and start monitoring enterprise IoT devices using Microsoft Enterprise Defender for IoT in the Microsoft Defender portal.
3
+
description: Learn how to set up and start monitoring enterprise IoT devices using Microsoft Defender for IoT in the Microsoft Defender portal.
4
4
ms.service: defender-for-iot
5
5
author: limwainstein
6
6
ms.author: lwainstein
@@ -35,13 +35,13 @@ Make sure that you have:
35
35
36
36
There are two ways to add enterprise IoT to the Defender portal:
37
37
38
-
-Microsoft 365 E5 (ME5)/ E5 Security and Defender for Endpoint P2 customers: Turn on support for Enterprise IoT Security in the Defender Portal. For more information, see [turn on enterprise IoT security](#turn-on-enterprise-iot-security).
38
+
- ME5/ E5 Security customers: Turn on support for Enterprise IoT Security in the Defender Portal. For more information, see [turn on enterprise IoT security](#turn-on-enterprise-iot-security).
39
39
40
-
- Defender for Endpoint customer: Start with a free trial or purchase standalone, per-device licenses to gain the same IoT-specific security value. For more information, see [standalone trial license](#standalone-enterprise-iot-trial-license). To purchase a license, see [purchase standalone license](#purchase-a-standalone-license).
40
+
- Defender for Endpoint P2 customers: Start with a free trial or purchase standalone, per-device licenses to gain the same IoT-specific security value. For more information, see [set up a standalone trial license](#set-up-a-standalone-trial-license). To purchase a full license, see [purchase the standalone full license](#set-up-a-standalone-full-license).
41
41
42
-
## Turn on enterprise IoT security
42
+
## ME5/ E5 Security customers
43
43
44
-
This procedure describes how to turn on enterprise IoT security in Defender portal, and is relevant only for ME5/E5 Security and Defender for Endpoint P2 customers.
44
+
This procedure describes how to turn on enterprise IoT security in Defender portal, and is relevant only for ME5/E5 Security customers.
45
45
46
46
If you have extra devices that aren't covered by your ME5/E5 licenses, you can purchase standalone licenses. For more information, see [calculate the number of devices for standalone licenses](#calculate-monitored-devices-for-enterprise-iot-security).
47
47
@@ -57,13 +57,13 @@ If you have extra devices that aren't covered by your ME5/E5 licenses, you can p
57
57
58
58
:::image type="content" source="media/enterprise-iot-get-started/eiot-toggle-on.png" alt-text="Screenshot of enterprise IoT toggled on in Microsoft Defender portal.":::
59
59
60
-
## Standalone enterprise IoT trial license
60
+
## Defender for Endpoint P2 customers
61
61
62
62
Customers with a Microsoft Defender for Endpoint P2 license only can use a trial standalone license for enterprise IoT security.
63
63
64
64
You can also purchase a license using the Microsoft 365 admin center. Before purchasing the license you need to [calculate the number of monitored devices in your network](#calculate-monitored-devices-for-enterprise-iot-security) to determine how many licenses you need.
65
65
66
-
### Start a standalone trial license
66
+
### Set up a standalone trial license
67
67
68
68
**To start an enterprise IoT trial**:
69
69
@@ -84,11 +84,11 @@ You can also purchase a license using the Microsoft 365 admin center. Before pur
84
84
> [!TIP]
85
85
> Make sure to [assign your licenses to specific users](/microsoft-365/admin/manage/assign-licenses-to-users) to start using them.
86
86
87
-
##Purchase a standalone license
87
+
### Set up a standalone full license
88
88
89
89
Before purchasing a license you must calculate the number of devices you're monitoring.
90
90
91
-
### Calculate monitored devices for enterprise IoT security
91
+
####Calculate monitored devices for enterprise IoT security
92
92
93
93
Use the following procedure to calculate how many devices you need to monitor if:
94
94
@@ -118,7 +118,7 @@ For more information, see the [Defender for Endpoint Device discovery overview](
118
118
> [!NOTE]
119
119
> Devices listed on the **Computers & Mobile** tab, including those managed by Defender for Endpoint or otherwise, are not included in the number of [devices](enterprise-iot.md#identified-unique-devices) monitored by Defender for IoT.
120
120
121
-
### Purchase standalone licenses
121
+
####Purchase the standalone licenses
122
122
123
123
To purchase standalone licenses:
124
124
@@ -135,73 +135,6 @@ To purchase standalone licenses:
135
135
136
136
For more information, see the [Microsoft 365 admin center help](/microsoft-365/admin/).
137
137
138
-
## View enterprise IoT added security value in the Microsoft Defender portal
139
-
140
-
When enterprise IoT is activated, the added security value of alerts, recommendations, and vulnerabilities are shown in the Defender portal.
141
-
142
-
**To view enterprise IoT security value**:
143
-
144
-
1. In [Microsoft Defender portal](https://security.microsoft.com/), select **Assets** > **Devices** to open the **Device inventory** page.
145
-
146
-
1. Select the **IoT devices** tab and select a specific device **IP** to drill down for more details. For example:
147
-
148
-
:::image type="content" source="media/enterprise-iot-get-started/select-a-device.png" alt-text="Screenshot of the IoT devices tab in Microsoft Defender portal." lightbox="media/enterprise-iot-get-started/select-a-device.png":::
149
-
150
-
1. On the device details page, explore the following tabs to view data added by enterprise IoT security for your device:
151
-
152
-
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
153
-
154
-
You can also set up advanced hunting queries to create custom alert rules. For more information, see [sample advanced hunting queries for Enterprise IoT monitoring](#sample-advanced-hunting-queries-for-enterprise-iot).
155
-
156
-
- On the **Security recommendations** tab, check for any recommendations available for the device to reduce risk and maintain a smaller attack surface.
157
-
158
-
- On the **Discovered vulnerabilities** tab, check for any known CVEs associated with the device. Known CVEs can help decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use [advanced hunting queries](#sample-advanced-hunting-queries-for-enterprise-iot) to collect vulnerabilities across all your devices.
159
-
160
-
### Hunt for threats
161
-
162
-
On the **Device inventory** page, select **Go hunt** to query devices using tables like the *[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)* table. On the **Advanced hunting** page, query data using other schemas.
163
-
164
-
## Sample advanced hunting queries for Enterprise IoT
165
-
166
-
This section lists sample advanced hunting queries that you can use in Microsoft 365 Defender to help you monitor and secure your IoT devices with Enterprise for IoT security.
167
-
168
-
### Find devices by specific type or subtype
169
-
170
-
Use the following query to identify devices that exist in your corporate network by type of device, such as routers:
171
-
172
-
```kusto
173
-
DeviceInfo
174
-
| summarize arg_max(Timestamp, *) by DeviceId
175
-
| where DeviceType == "NetworkDevice" and DeviceSubtype == "Router"
176
-
```
177
-
178
-
### Find and export vulnerabilities for your IoT devices
179
-
180
-
Use the following query to list all vulnerabilities on your IoT devices:
181
-
182
-
```kusto
183
-
DeviceInfo
184
-
| where DeviceCategory =~ "iot"
185
-
| join kind=inner DeviceTvmSoftwareVulnerabilities on DeviceId
186
-
```
187
-
188
-
For more information, see [Advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview) and [Understand the advanced hunting schema](/microsoft-365/security/defender/advanced-hunting-schema-tables).
189
-
190
-
## Turn off enterprise IoT security
191
-
192
-
Customers with ME5/E5 Security plans who no longer need the **Enterprise IoT security** service, can turn off the feature.
You stop getting security value in the Defender portal, including purpose-built alerts, vulnerabilities, and recommendations.
201
-
202
-
Customers with a Microsoft Defender for Endpoint P2 license who don't add a standalone license by the time the trial ends, have the trial automatically canceled, and lose access to Enterprise IoT security features.
203
-
204
138
## Next steps
205
139
206
-
change to manage page if added
207
-
[Get started with enterprise IoT](enterprise-iot-get-started.md)
Copy file name to clipboardExpand all lines: defender-for-iot/enterprise-iot-licenses.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ Customers with ME5/E5 Security plans who no longer need the enterprise IoT secur
37
37
38
38
Customers with a Defender for Endpoint P2 license who don't add a standalone license by the time the trial ends, have the trial automatically canceled, and lose access to enterprise IoT security features.
39
39
40
-
For more information, see [purchase a standalone license](enterprise-iot-get-started.md#purchase-a-standalone-license).
40
+
For more information, see [purchase a standalone license](enterprise-iot-get-started.md#purchase-the-standalone-licenses).
41
41
42
42
## Resolve billing issues associated with my enterprise IoT plan
title: Manage enterprise IoT security for Microsoft Defender for IoT in the Defender portal
3
+
description: Learn how to manage enterprise IoT devices using Microsoft Defender for IoT in the Microsoft Defender portal.
4
+
ms.service: defender-for-iot
5
+
author: limwainstein
6
+
ms.author: lwainstein
7
+
ms.localizationpriority: medium
8
+
ms.date: 08/19/2024
9
+
ms.topic: how-to
10
+
---
11
+
12
+
# Manage enterprise IoT security
13
+
14
+
When enterprise IoT is activated, the added security value of alerts, recommendations, and vulnerabilities are shown in the Defender portal.
15
+
16
+
## View enterprise IoT added security value in the Microsoft Defender portal
17
+
18
+
To view enterprise IoT security value:
19
+
20
+
1. In [Microsoft Defender portal](https://security.microsoft.com/), select **Assets** > **Devices** to open the **Device inventory** page.
21
+
22
+
1. Select the **IoT devices** tab and select a specific device **IP** to drill down for more details. For example:
23
+
24
+
:::image type="content" source="media/enterprise-iot-manage/select-a-device.png" alt-text="Screenshot of the IoT devices tab in Microsoft Defender portal." lightbox="media/enterprise-iot-manage/select-a-device.png":::
25
+
26
+
1. On the device details page, explore the following tabs to view data added by enterprise IoT security for your device:
27
+
28
+
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
29
+
30
+
You can also set up advanced hunting queries to create custom alert rules. For more information, see [sample advanced hunting queries for Enterprise IoT monitoring](#sample-advanced-hunting-queries-for-enterprise-iot).
31
+
32
+
- On the **Security recommendations** tab, check for any recommendations available for the device to reduce risk and maintain a smaller attack surface.
33
+
34
+
- On the **Discovered vulnerabilities** tab, check for any known CVEs associated with the device. Known CVEs can help decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use [advanced hunting queries](#sample-advanced-hunting-queries-for-enterprise-iot) to collect vulnerabilities across all your devices.
35
+
36
+
### Hunt for threats
37
+
38
+
On the **Device inventory** page, select **Go hunt** to query devices using tables like the *[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)* table. On the **Advanced hunting** page, query data using other schemas.
39
+
40
+
## Sample advanced hunting queries for Enterprise IoT
41
+
42
+
This section lists sample advanced hunting queries that you can use in Microsoft 365 Defender to help you monitor and secure your IoT devices with Enterprise for IoT security.
43
+
44
+
### Find devices by specific type or subtype
45
+
46
+
Use the following query to identify devices that exist in your corporate network by type of device, such as routers:
47
+
48
+
```kusto
49
+
DeviceInfo
50
+
| summarize arg_max(Timestamp, *) by DeviceId
51
+
| where DeviceType == "NetworkDevice" and DeviceSubtype == "Router"
52
+
```
53
+
54
+
### Find and export vulnerabilities for your IoT devices
55
+
56
+
Use the following query to list all vulnerabilities on your IoT devices:
57
+
58
+
```kusto
59
+
DeviceInfo
60
+
| where DeviceCategory =~ "iot"
61
+
| join kind=inner DeviceTvmSoftwareVulnerabilities on DeviceId
62
+
```
63
+
64
+
For more information, see [Advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview) and [Understand the advanced hunting schema](/microsoft-365/security/defender/advanced-hunting-schema-tables).
65
+
66
+
## Turn off enterprise IoT security
67
+
68
+
Customers with ME5/E5 Security plans who no longer need the **enterprise IoT security** service, can turn off the feature.
You stop getting security value in the Defender portal, including purpose-built alerts, vulnerabilities, and recommendations.
77
+
78
+
Customers with a Microsoft Defender for Endpoint P2 license who don't add a standalone license by the time the trial ends, have the trial automatically canceled, and lose access to Enterprise IoT security features. For more information, see [purchase a standalone license](enterprise-iot-get-started.md#purchase-the-standalone-licenses).
Copy file name to clipboardExpand all lines: defender-for-iot/enterprise-iot.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ While the number of IoT devices continues to grow, they often lack the security
21
21
22
22
Extend Microsoft Defender for IoT's security features to include enterprise IoT devices. Add the enterprise IoT security feature to your existing Microsoft Defender for Endpoint license, and view related alerts, vulnerabilities, and recommendations for IoT devices in Microsoft Defender.
23
23
24
-
Defender for IoT seamlessly integrates with Microsoft Defender portal and Defender for Endpoint to both discover IoT devices and provide security value, including purpose-built alerts, recommendations, and vulnerability data.
24
+
Defender for IoT seamlessly integrates with the Microsoft Defender portal and Defender for Endpoint to both discover IoT devices and provide security value, including purpose-built alerts, recommendations, and vulnerability data.
25
25
26
26
:::image type="content" source="media/enterprise-iot/eiot-architecture.png" alt-text="The architecture showing the use of enterprise IoT":::
27
27
@@ -43,7 +43,7 @@ For more information, see [Alerts queue in Microsoft 365 Defender](/defender-end
43
43
44
44
### Recommendations
45
45
46
-
The following Defender for Endpoint security recommendations are supported for Enterprise IoT devices:
46
+
The following Defender for Endpoint security recommendations are supported for enterprise IoT devices:
47
47
48
48
- Require authentication for Telnet management interface
@@ -52,7 +52,7 @@ The following Defender for Endpoint security recommendations are supported for E
52
52
53
53
### Vulnerabilities
54
54
55
-
Known CVEs vulnerabilities are detected and showing in the Defender portalassociated with the relevant device. Known CVEs can help you decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use advanced hunting queries to collect vulnerabilities across all your devices.
55
+
Known CVE vulnerabilities, already detected by the Defender portal, are also detected and displayed associated with the relevant enterprise IoT device in the Defender portal. Known CVEs can help you decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use advanced hunting queries to collect vulnerabilities across all your devices.
56
56
57
57
<!--
58
58
## Licensing and set up of enterprise IoT security
0 commit comments