Skip to content

Commit feb6765

Browse files
committed
add manage
1 parent f6e8acc commit feb6765

File tree

6 files changed

+95
-82
lines changed

6 files changed

+95
-82
lines changed

defender-for-iot/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@
2020
href: enterprise-iot-licenses.md
2121
- name: Get started with enterprise IoT
2222
href: enterprise-iot-get-started.md
23+
- name: Manage enterprise IoT
24+
href: enterprise-iot-manage.md
2325
- name: Get started
2426
items:
2527
- name: Prerequisites

defender-for-iot/enterprise-iot-get-started.md

Lines changed: 11 additions & 78 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Get started for Enterprise IoT for Microsoft Defender for IoT in the Defender portal
3-
description: Learn how to set up and start monitoring enterprise IoT devices using Microsoft Enterprise Defender for IoT in the Microsoft Defender portal.
3+
description: Learn how to set up and start monitoring enterprise IoT devices using Microsoft Defender for IoT in the Microsoft Defender portal.
44
ms.service: defender-for-iot
55
author: limwainstein
66
ms.author: lwainstein
@@ -35,13 +35,13 @@ Make sure that you have:
3535

3636
There are two ways to add enterprise IoT to the Defender portal:
3737

38-
- Microsoft 365 E5 (ME5)/ E5 Security and Defender for Endpoint P2 customers: Turn on support for Enterprise IoT Security in the Defender Portal. For more information, see [turn on enterprise IoT security](#turn-on-enterprise-iot-security).
38+
- ME5/ E5 Security customers: Turn on support for Enterprise IoT Security in the Defender Portal. For more information, see [turn on enterprise IoT security](#turn-on-enterprise-iot-security).
3939

40-
- Defender for Endpoint customer: Start with a free trial or purchase standalone, per-device licenses to gain the same IoT-specific security value. For more information, see [standalone trial license](#standalone-enterprise-iot-trial-license). To purchase a license, see [purchase standalone license](#purchase-a-standalone-license).
40+
- Defender for Endpoint P2 customers: Start with a free trial or purchase standalone, per-device licenses to gain the same IoT-specific security value. For more information, see [set up a standalone trial license](#set-up-a-standalone-trial-license). To purchase a full license, see [purchase the standalone full license](#set-up-a-standalone-full-license).
4141

42-
## Turn on enterprise IoT security
42+
## ME5/ E5 Security customers
4343

44-
This procedure describes how to turn on enterprise IoT security in Defender portal, and is relevant only for ME5/E5 Security and Defender for Endpoint P2 customers.
44+
This procedure describes how to turn on enterprise IoT security in Defender portal, and is relevant only for ME5/ E5 Security customers.
4545

4646
If you have extra devices that aren't covered by your ME5/E5 licenses, you can purchase standalone licenses. For more information, see [calculate the number of devices for standalone licenses](#calculate-monitored-devices-for-enterprise-iot-security).
4747

@@ -57,13 +57,13 @@ If you have extra devices that aren't covered by your ME5/E5 licenses, you can p
5757

5858
:::image type="content" source="media/enterprise-iot-get-started/eiot-toggle-on.png" alt-text="Screenshot of enterprise IoT toggled on in Microsoft Defender portal.":::
5959

60-
## Standalone enterprise IoT trial license
60+
## Defender for Endpoint P2 customers
6161

6262
Customers with a Microsoft Defender for Endpoint P2 license only can use a trial standalone license for enterprise IoT security.
6363

6464
You can also purchase a license using the Microsoft 365 admin center. Before purchasing the license you need to [calculate the number of monitored devices in your network](#calculate-monitored-devices-for-enterprise-iot-security) to determine how many licenses you need.
6565

66-
### Start a standalone trial license
66+
### Set up a standalone trial license
6767

6868
**To start an enterprise IoT trial**:
6969

@@ -84,11 +84,11 @@ You can also purchase a license using the Microsoft 365 admin center. Before pur
8484
> [!TIP]
8585
> Make sure to [assign your licenses to specific users](/microsoft-365/admin/manage/assign-licenses-to-users) to start using them.
8686
87-
## Purchase a standalone license
87+
### Set up a standalone full license
8888

8989
Before purchasing a license you must calculate the number of devices you're monitoring.
9090

91-
### Calculate monitored devices for enterprise IoT security
91+
#### Calculate monitored devices for enterprise IoT security
9292

9393
Use the following procedure to calculate how many devices you need to monitor if:
9494

@@ -118,7 +118,7 @@ For more information, see the [Defender for Endpoint Device discovery overview](
118118
> [!NOTE]
119119
> Devices listed on the **Computers & Mobile** tab, including those managed by Defender for Endpoint or otherwise, are not included in the number of [devices](enterprise-iot.md#identified-unique-devices) monitored by Defender for IoT.
120120
121-
### Purchase standalone licenses
121+
#### Purchase the standalone licenses
122122

123123
To purchase standalone licenses:
124124

@@ -135,73 +135,6 @@ To purchase standalone licenses:
135135

136136
For more information, see the [Microsoft 365 admin center help](/microsoft-365/admin/).
137137

138-
## View enterprise IoT added security value in the Microsoft Defender portal
139-
140-
When enterprise IoT is activated, the added security value of alerts, recommendations, and vulnerabilities are shown in the Defender portal.
141-
142-
**To view enterprise IoT security value**:
143-
144-
1. In [Microsoft Defender portal](https://security.microsoft.com/), select **Assets** > **Devices** to open the **Device inventory** page.
145-
146-
1. Select the **IoT devices** tab and select a specific device **IP** to drill down for more details. For example:
147-
148-
:::image type="content" source="media/enterprise-iot-get-started/select-a-device.png" alt-text="Screenshot of the IoT devices tab in Microsoft Defender portal." lightbox="media/enterprise-iot-get-started/select-a-device.png":::
149-
150-
1. On the device details page, explore the following tabs to view data added by enterprise IoT security for your device:
151-
152-
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
153-
154-
You can also set up advanced hunting queries to create custom alert rules. For more information, see [sample advanced hunting queries for Enterprise IoT monitoring](#sample-advanced-hunting-queries-for-enterprise-iot).
155-
156-
- On the **Security recommendations** tab, check for any recommendations available for the device to reduce risk and maintain a smaller attack surface.
157-
158-
- On the **Discovered vulnerabilities** tab, check for any known CVEs associated with the device. Known CVEs can help decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use [advanced hunting queries](#sample-advanced-hunting-queries-for-enterprise-iot) to collect vulnerabilities across all your devices.
159-
160-
### Hunt for threats
161-
162-
On the **Device inventory** page, select **Go hunt** to query devices using tables like the *[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)* table. On the **Advanced hunting** page, query data using other schemas.
163-
164-
## Sample advanced hunting queries for Enterprise IoT
165-
166-
This section lists sample advanced hunting queries that you can use in Microsoft 365 Defender to help you monitor and secure your IoT devices with Enterprise for IoT security.
167-
168-
### Find devices by specific type or subtype
169-
170-
Use the following query to identify devices that exist in your corporate network by type of device, such as routers: 
171-
172-
```kusto
173-
DeviceInfo
174-
| summarize arg_max(Timestamp, *) by DeviceId
175-
| where DeviceType == "NetworkDevice" and DeviceSubtype == "Router" 
176-
```
177-
178-
### Find and export vulnerabilities for your IoT devices
179-
180-
Use the following query to list all vulnerabilities on your IoT devices:
181-
182-
```kusto
183-
DeviceInfo
184-
| where DeviceCategory =~ "iot"
185-
| join kind=inner DeviceTvmSoftwareVulnerabilities on DeviceId
186-
```
187-
188-
For more information, see [Advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview) and [Understand the advanced hunting schema](/microsoft-365/security/defender/advanced-hunting-schema-tables).
189-
190-
## Turn off enterprise IoT security
191-
192-
Customers with ME5/E5 Security plans who no longer need the **Enterprise IoT security** service, can turn off the feature.
193-
194-
**To turn off enterprise IoT monitoring**:
195-
196-
1. In [Microsoft Defender portal](https://security.microsoft.com/), select **Settings** > **Device discovery** > **Enterprise IoT**.
197-
198-
1. Toggle the option to **Off**.
199-
200-
You stop getting security value in the Defender portal, including purpose-built alerts, vulnerabilities, and recommendations.
201-
202-
Customers with a Microsoft Defender for Endpoint P2 license who don't add a standalone license by the time the trial ends, have the trial automatically canceled, and lose access to Enterprise IoT security features.
203-
204138
## Next steps
205139

206-
change to manage page if added
207-
[Get started with enterprise IoT](enterprise-iot-get-started.md)
140+
[Manage enterprise IoT](enterprise-iot-manage.md)

defender-for-iot/enterprise-iot-licenses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Customers with ME5/E5 Security plans who no longer need the enterprise IoT secur
3737

3838
Customers with a Defender for Endpoint P2 license who don't add a standalone license by the time the trial ends, have the trial automatically canceled, and lose access to enterprise IoT security features.
3939

40-
For more information, see [purchase a standalone license](enterprise-iot-get-started.md#purchase-a-standalone-license).
40+
For more information, see [purchase a standalone license](enterprise-iot-get-started.md#purchase-the-standalone-licenses).
4141

4242
## Resolve billing issues associated with my enterprise IoT plan
4343

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
title: Manage enterprise IoT security for Microsoft Defender for IoT in the Defender portal
3+
description: Learn how to manage enterprise IoT devices using Microsoft Defender for IoT in the Microsoft Defender portal.
4+
ms.service: defender-for-iot
5+
author: limwainstein
6+
ms.author: lwainstein
7+
ms.localizationpriority: medium
8+
ms.date: 08/19/2024
9+
ms.topic: how-to
10+
---
11+
12+
# Manage enterprise IoT security
13+
14+
When enterprise IoT is activated, the added security value of alerts, recommendations, and vulnerabilities are shown in the Defender portal.
15+
16+
## View enterprise IoT added security value in the Microsoft Defender portal
17+
18+
To view enterprise IoT security value:
19+
20+
1. In [Microsoft Defender portal](https://security.microsoft.com/), select **Assets** > **Devices** to open the **Device inventory** page.
21+
22+
1. Select the **IoT devices** tab and select a specific device **IP** to drill down for more details. For example:
23+
24+
:::image type="content" source="media/enterprise-iot-manage/select-a-device.png" alt-text="Screenshot of the IoT devices tab in Microsoft Defender portal." lightbox="media/enterprise-iot-manage/select-a-device.png":::
25+
26+
1. On the device details page, explore the following tabs to view data added by enterprise IoT security for your device:
27+
28+
- On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page.
29+
30+
You can also set up advanced hunting queries to create custom alert rules. For more information, see [sample advanced hunting queries for Enterprise IoT monitoring](#sample-advanced-hunting-queries-for-enterprise-iot).
31+
32+
- On the **Security recommendations** tab, check for any recommendations available for the device to reduce risk and maintain a smaller attack surface.
33+
34+
- On the **Discovered vulnerabilities** tab, check for any known CVEs associated with the device. Known CVEs can help decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use [advanced hunting queries](#sample-advanced-hunting-queries-for-enterprise-iot) to collect vulnerabilities across all your devices.
35+
36+
### Hunt for threats
37+
38+
On the **Device inventory** page, select **Go hunt** to query devices using tables like the *[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)* table. On the **Advanced hunting** page, query data using other schemas.
39+
40+
## Sample advanced hunting queries for Enterprise IoT
41+
42+
This section lists sample advanced hunting queries that you can use in Microsoft 365 Defender to help you monitor and secure your IoT devices with Enterprise for IoT security.
43+
44+
### Find devices by specific type or subtype
45+
46+
Use the following query to identify devices that exist in your corporate network by type of device, such as routers: 
47+
48+
```kusto
49+
DeviceInfo
50+
| summarize arg_max(Timestamp, *) by DeviceId
51+
| where DeviceType == "NetworkDevice" and DeviceSubtype == "Router" 
52+
```
53+
54+
### Find and export vulnerabilities for your IoT devices
55+
56+
Use the following query to list all vulnerabilities on your IoT devices:
57+
58+
```kusto
59+
DeviceInfo
60+
| where DeviceCategory =~ "iot"
61+
| join kind=inner DeviceTvmSoftwareVulnerabilities on DeviceId
62+
```
63+
64+
For more information, see [Advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview) and [Understand the advanced hunting schema](/microsoft-365/security/defender/advanced-hunting-schema-tables).
65+
66+
## Turn off enterprise IoT security
67+
68+
Customers with ME5/E5 Security plans who no longer need the **enterprise IoT security** service, can turn off the feature.
69+
70+
**To turn off enterprise IoT security**:
71+
72+
1. In [Microsoft Defender portal](https://security.microsoft.com/), select **Settings** > **Device discovery** > **Enterprise IoT**.
73+
74+
1. Toggle the option to **Off**.
75+
76+
You stop getting security value in the Defender portal, including purpose-built alerts, vulnerabilities, and recommendations.
77+
78+
Customers with a Microsoft Defender for Endpoint P2 license who don't add a standalone license by the time the trial ends, have the trial automatically canceled, and lose access to Enterprise IoT security features. For more information, see [purchase a standalone license](enterprise-iot-get-started.md#purchase-the-standalone-licenses).

defender-for-iot/enterprise-iot.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ While the number of IoT devices continues to grow, they often lack the security
2121

2222
Extend Microsoft Defender for IoT's security features to include enterprise IoT devices. Add the enterprise IoT security feature to your existing Microsoft Defender for Endpoint license, and view related alerts, vulnerabilities, and recommendations for IoT devices in Microsoft Defender.
2323

24-
Defender for IoT seamlessly integrates with Microsoft Defender portal and Defender for Endpoint to both discover IoT devices and provide security value, including purpose-built alerts, recommendations, and vulnerability data.
24+
Defender for IoT seamlessly integrates with the Microsoft Defender portal and Defender for Endpoint to both discover IoT devices and provide security value, including purpose-built alerts, recommendations, and vulnerability data.
2525

2626
:::image type="content" source="media/enterprise-iot/eiot-architecture.png" alt-text="The architecture showing the use of enterprise IoT":::
2727

@@ -43,7 +43,7 @@ For more information, see [Alerts queue in Microsoft 365 Defender](/defender-end
4343

4444
### Recommendations
4545

46-
The following Defender for Endpoint security recommendations are supported for Enterprise IoT devices:
46+
The following Defender for Endpoint security recommendations are supported for enterprise IoT devices:
4747

4848
- Require authentication for Telnet management interface
4949
- Disable insecure administration protocol – Telnet
@@ -52,7 +52,7 @@ The following Defender for Endpoint security recommendations are supported for E
5252

5353
### Vulnerabilities
5454

55-
Known CVEs vulnerabilities are detected and showing in the Defender portal associated with the relevant device. Known CVEs can help you decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use advanced hunting queries to collect vulnerabilities across all your devices.
55+
Known CVE vulnerabilities, already detected by the Defender portal, are also detected and displayed associated with the relevant enterprise IoT device in the Defender portal. Known CVEs can help you decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use advanced hunting queries to collect vulnerabilities across all your devices.
5656

5757
<!--
5858
## Licensing and set up of enterprise IoT security
File renamed without changes.

0 commit comments

Comments
 (0)