Proposed Pull Request Change

title description ms.topic ms.date ms.custom
Set up enterprise IoT security - Defender for IoT Enable enterprise IoT security for your IoT devices, using added security value in Microsoft Defender for IoT. quickstart 09/13/2023 ['enterprise-iot', 'sfi-image-nochange']
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Content Truncation Detected
The generated rewrite appears to be incomplete.
Original lines: -
Output lines: -
Ratio: -
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: Set up enterprise IoT security - Defender for IoT description: Enable enterprise IoT security for your IoT devices, using added security value in Microsoft Defender for IoT. ms.topic: quickstart ms.date: 09/13/2023 ms.custom: - enterprise-iot - sfi-image-nochange #CustomerIntent: As a security administrator, I want to understand how to set up enterprise IoT monitoring so that I can keep my EIoT devices safe. --- # Get started with enterprise IoT security monitoring This article describes how [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/) customers can enable enterprise IoT security for their IoT devices, using added security value in Microsoft Defender for IoT. While the IoT device inventory is already available for Defender for Endpoint P2 customers, turning on enterprise IoT security adds alerts, recommendations, and vulnerability data, purpose-built for IoT devices in your enterprise network. IoT devices include printers, cameras, VOIP phones, smart TVs, and more. Turning on enterprise IoT security means, for example, that you can use a recommendation in Microsoft Defender XDR to open a single IT ticket for patching vulnerable applications across both servers and printers. ## Prerequisites Before you start the procedures in this article, read through [Secure IoT devices in the enterprise](concept-enterprise.md) to understand more about the integration between Defender for Endpoint and Defender for IoT. Make sure that you have: - IoT devices in your network, visible in the Microsoft Defender XDR **Device inventory** - Access to the Microsoft Defender Portal as a [Security administrator](../../active-directory/roles/permissions-reference.md#security-administrator) - Microsoft Defender for Endpoint agents deployed in your environment. For more information, see [onboard Microsoft Defender for Endpoint](/defender-endpoint/onboarding). - One of the following licenses: - A Microsoft 365 E5 (ME5) or E5 Security license - Microsoft Defender for Endpoint P2, with an extra, standalone **Microsoft Defender for IoT - EIoT Device License - add-on** license, available for purchase or trial from the Microsoft 365 admin center. > [!TIP] > If you have a standalone license, you don't need to toggle on **Enterprise IoT Security** and can skip directly to [View added security value in Microsoft Defender XDR](#view-added-security-value-in-microsoft-defender-xdr). > For more information, see [Enterprise IoT security in Microsoft Defender XDR](concept-enterprise.md#enterprise-iot-security-in-microsoft-defender-xdr). ## Turn on enterprise IoT security monitoring This procedure describes how to turn on enterprise IoT monitoring in Microsoft Defender XDR, and is relevant only for ME5/E5 Security customers. Skip this procedure if you have one of the following types of licensing plans: - Customers with legacy Enterprise IoT pricing plan and an ME5/E5 Security license. - Customers with standalone, per-device licenses added on to Microsoft Defender for Endpoint P2. In such cases, the Enterprise IoT security setting is turned on as read-only. **To turn on enterprise IoT monitoring**: 1. In [Microsoft Defender XDR](https://security.microsoft.com/), select **Settings** \> **[Device Discovery](/microsoft-365/security/defender-endpoint/device-discovery)** \> **Enterprise IoT**. > [!NOTE] > Ensure you have turned on Device Discovery in **Settings** \> **Endpoints** \> **Advanced Features**. 2. Toggle the Enterprise IoT security option to **On**. For example: :::image type="content" source="media/enterprise-iot/eiot-toggle-on.png" alt-text="Screenshot of Enterprise IoT toggled on in Microsoft Defender XDR."::: ## View added security value in Microsoft Defender XDR This procedure describes how to view related alerts, recommendations, and vulnerabilities for a specific device in Microsoft Defender XDR, when the **Enterprise IoT security** option is turned on. **To view added security value**: 1. In [Microsoft Defender XDR](https://security.microsoft.com/), select **Assets** \> **Devices** to open the **Device inventory** page. 1. Select the **IoT devices** tab and select a specific device **IP** to drill down for more details. For example: :::image type="content" source="media/enterprise-iot/select-a-device.png" alt-text="Screenshot of the IoT devices tab in Microsoft Defender XDR." lightbox="media/enterprise-iot/select-a-device.png"::: 1. On the device details page, explore the following tabs to view data added by the enterprise IoT security for your device: - On the **Alerts** tab, check for any alerts triggered by the device. Simulate alerts in Microsoft 365 Defender for Enterprise IoT using the Raspberry Pi scenario available in the Microsoft 365 Defender [Evaluation & Tutorials](https://security.microsoft.com/tutorials/all) page. You can also set up advanced hunting queries to create custom alert rules. For more information, see [sample advanced hunting queries for Enterprise IoT monitoring](#sample-advanced-hunting-queries-for-enterprise-iot). - On the **Security recommendations** tab, check for any recommendations available for the device to reduce risk and maintain a smaller attack surface. - On the **Discovered vulnerabilities** tab, check for any known CVEs associated with the device. Known CVEs can help decide whether to patch, remove, or contain the device and mitigate risk to your network. Alternatively, use [advanced hunting queries](#sample-advanced-hunting-queries-for-enterprise-iot) to collect vulnerabilities across all your devices. **To hunt for threats**: On the **Device inventory** page, select **Go hunt** to query devices using tables like the *[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)* table. On the **Advanced hunting** page, query data using other schemas. ## Sample advanced hunting queries for Enterprise IoT This section lists sample advanced hunting queries that you can use in Microsoft 365 Defender to help you monitor and secure your IoT devices with Enterprise for IoT security. ### Find devices by specific type or subtype Use the following query to identify devices that exist in your corporate network by type of device, such as routers:  ```kusto DeviceInfo | summarize arg_max(Timestamp, *) by DeviceId | where DeviceType == "NetworkDevice" and DeviceSubtype == "Router"  ``` ### Find and export vulnerabilities for your IoT devices Use the following query to list all vulnerabilities on your IoT devices: ```kusto DeviceInfo | where DeviceCategory =~ "iot" | join kind=inner DeviceTvmSoftwareVulnerabilities on DeviceId ``` For more information, see [Advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview) and [Understand the advanced hunting schema](/microsoft-365/security/defender/advanced-hunting-schema-tables). ## Next steps > [!div class="nextstepaction"] > [Device discovery overview](/microsoft-365/security/defender-endpoint/device-discovery)
Success! Branch created successfully. Create Pull Request on GitHub
Error: