%3CLINGO-SUB%20id%3D%22lingo-sub-1784329%22%20slang%3D%22en-US%22%3EAzure%20Defender%20for%20IoT%20is%20now%20in%20public%20preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1784329%22%20slang%3D%22en-US%22%3E%3CH2%20id%3D%22toc-hId--1237181132%22%20id%3D%22toc-hId--1237181100%22%20id%3D%22toc-hId--1237181100%22%20id%3D%22toc-hId--1237181100%22%20id%3D%22toc-hId--1237181100%22%20id%3D%22toc-hId--1237181100%22%20id%3D%22toc-hId--1237181100%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22AdobeStock_96161096.jpeg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F226964i43D57DF0C6DB1965%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22AdobeStock_96161096.jpeg%22%20alt%3D%22AdobeStock_96161096.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-1250331701%22%20id%3D%22toc-hId-1250331733%22%20id%3D%22toc-hId-1250331733%22%20id%3D%22toc-hId-1250331733%22%20id%3D%22toc-hId-1250331733%22%20id%3D%22toc-hId-1250331733%22%20id%3D%22toc-hId-1250331733%22%3ESummary%3A%20Agentless%20security%20for%20unmanaged%20IoT%2FOT%20devices%3C%2FH2%3E%0A%3CP%3EAs%20industrial%20and%20critical%20infrastructure%20organizations%20implement%20digital%20transformation%2C%20the%20number%20of%20networked%20IoT%20and%20Operational%20Technology%20(OT)%20devices%20has%20greatly%20proliferated.%20Many%20of%20these%20devices%20lack%20visibility%20by%20IT%20teams%20and%20are%20often%20unpatched%20and%20misconfigured%2C%20making%20them%20soft%20targets%20for%20adversaries%20looking%20to%20pivot%20deeper%20into%20corporate%20networks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBusiness%20risks%20include%20financial%20losses%20due%20to%20production%20downtime%2C%20corporate%20liability%20from%20safety%20and%20environmental%20incidents%2C%20and%20theft%20of%20sensitive%20intellectual%20property%20such%20as%20proprietary%20formulas%20and%20manufacturing%20processes.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIncorporating%20agentless%2C%20IoT%2FOT-aware%20behavioral%20analytics%20from%20Microsoft's%20recent%20acquisition%20of%20CyberX%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-defender-for-iot%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Defender%20for%20IoT%3C%2FA%3E%20addresses%20these%20risks%20by%20discovering%20unmanaged%20IoT%2FOT%20assets%2C%20identifying%20IoT%2FOT%20vulnerabilities%2C%20and%20continuously%20monitoring%20for%20threats.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Defender%20for%20IoT%20is%20now%20available%20in%20public%20preview%20for%20on-premises%20deployments%2C%20with%20the%20option%20of%20connecting%20securely%20to%20Azure%20Sentinel%20to%20eliminate%20IT%2FOT%20silos%20and%20provide%20a%20unified%20view%20of%20threats%20across%20both%20IT%20and%20OT%20environments.%20It%20also%20integrates%20out-of-the%20box%20with%20third-party%20tools%20like%20Splunk%2C%20IBM%20QRadar%2C%20and%20ServiceNow.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--557122762%22%20id%3D%22toc-hId--557122730%22%20id%3D%22toc-hId--557122730%22%20id%3D%22toc-hId--557122730%22%20id%3D%22toc-hId--557122730%22%20id%3D%22toc-hId--557122730%22%20id%3D%22toc-hId--557122730%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-1930390071%22%20id%3D%22toc-hId-1930390103%22%20id%3D%22toc-hId-1930390103%22%20id%3D%22toc-hId-1930390103%22%20id%3D%22toc-hId-1930390103%22%20id%3D%22toc-hId-1930390103%22%20id%3D%22toc-hId-1930390103%22%3EIntroduction%3C%2FH2%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fazure-defender-for-iot-agentless-security-for-ot%2Fba-p%2F1698679%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAnnounced%20at%20Ignite%202020%3C%2FA%3E%2C%20Azure%20Defender%20for%20IoT%20delivers%20agentless%20security%20for%20continuously%20monitoring%20OT%20networks%20in%20industrial%20and%20critical%20infrastructure%20organizations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20deploy%20these%20capabilities%20fully%20on-premises%20without%20sending%20any%20data%20to%20Azure.%20Or%2C%20you%20can%20deploy%20in%20Azure-connected%20environments%20using%20our%20new%20native%20connector%20to%20integrate%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sentinel%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIoT%2FOT%20alerts%20into%20Azure%20Sentinel%3C%2FA%3E%2C%20benefiting%20from%20the%20scalability%20and%20cost%20benefits%20of%20the%20industry%E2%80%99s%20first%20cloud-native%20SIEM%2FSOAR%20platform.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20offers%20a%20number%20of%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Foverview%2Fiot%2Fsecurity%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eend-to-end%20IoT%20security%20solutions%3C%2FA%3E%26nbsp%3Bfor%20managed%20(or%20%E2%80%9Cgreenfield%E2%80%9D)%20IoT%20deployments%2C%20including%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fiot-hub%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20IoT%20Hub%3C%2FA%3E%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sphere%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Sphere%3C%2FA%3E%26nbsp%3Band%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fasc-for-iot%2Fsecurity-agent-architecture%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Emicro-agents%3C%2FA%3E%26nbsp%3Bfor%20embedded%20operating%20systems.%20However%2C%26nbsp%3B%20most%20of%20today%E2%80%99s%20IoT%2FOT%20devices%20are%20%E2%80%9Cunmanaged%E2%80%9D%20because%20they%20do%20not%20get%20provisioned%2C%20are%20not%20monitored%2C%20and%20lack%20built-in%20security%20such%20as%20agents%20or%20automated%20updates.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20a%20result%2C%20most%20IT%20security%20organizations%20have%20limited%20or%20no%20visibility%20into%20their%20OT%20networks.%20What%E2%80%99s%20more%2C%20these%20devices%20are%20often%20unpatched%20and%20misconfigured%2C%20making%20them%20soft%20targets%20for%20adversaries%20looking%20to%20pivot%20deeper%20into%20corporate%20networks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENetwork%20security%20monitoring%20tools%20developed%20for%20IT%20networks%20are%20unable%20to%20address%20these%20environments%20because%20they%E2%80%99re%20blind%20to%20specialized%20industrial%20protocols%20(Modbus%2C%20DNP3%2C%20BACnet%2C%20etc.).%20They%20also%20lack%20an%20understanding%20of%20the%20specialized%20device%20types%2C%20applications%2C%20and%20machine-to-machine%20(M2M)%20behaviors%20in%20IoT%2FOT%20environments.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-122935608%22%20id%3D%22toc-hId-122935640%22%20id%3D%22toc-hId-122935640%22%20id%3D%22toc-hId-122935640%22%20id%3D%22toc-hId-122935640%22%20id%3D%22toc-hId-122935640%22%20id%3D%22toc-hId-122935640%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1684518855%22%20id%3D%22toc-hId--1684518823%22%20id%3D%22toc-hId--1684518823%22%20id%3D%22toc-hId--1684518823%22%20id%3D%22toc-hId--1684518823%22%20id%3D%22toc-hId--1684518823%22%20id%3D%22toc-hId--1684518823%22%3EKey%20capabilities%3C%2FH2%3E%0A%3CP%3EAzure%20Defender%20for%20IoT%20enables%20IT%20and%20OT%20teams%20to%20auto-discover%20their%20unmanaged%20IoT%2FOT%20assets%2C%20identify%20critical%20vulnerabilities%2C%20and%20detect%20anomalous%20or%20unauthorized%20behavior%20%E2%80%94%20without%20impacting%20IoT%2FOT%20stability%20or%20performance.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Defender%20for%20IoT%20delivers%20insights%20within%20minutes%20of%20being%20connected%20to%20the%20network%2C%20leveraging%20patented%20IoT%2FOT-aware%20behavioral%20analytics%20and%20machine%20learning%20to%20eliminate%20the%20need%20to%20configure%20any%20rules%2C%20signatures%2C%20or%20other%20static%20IOCs.%20To%20capture%20the%20traffic%2C%20it%20uses%20an%20on-premises%20network%20sensor%20deployed%20as%20a%20virtual%20or%20physical%20appliance%20connected%20to%20a%20SPAN%20port%20or%20tap.%20The%20sensor%20implements%20non-invasive%20passive%20monitoring%20with%20Network%20Traffic%20Analysis%20(NTA)%20and%20Layer%207%20Deep%20Packet%20Inspection%20(DPI)%20to%20extract%20detailed%20IoT%2FOT%20information%20in%20real-time.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20also%20benefit%20from%20out-of-the%20box%20integration%20with%20third-party%20IT%20security%20tools%20like%20Splunk%2C%20IBM%20QRadar%2C%20and%20ServiceNow.%20Plus%2C%20it%E2%80%99s%20designed%20to%20fit%20right%20into%20existing%20OT%20environments%2C%20even%20across%20diverse%20automation%20equipment%20from%20all%20major%20OT%20suppliers%20(Rockwell%20Automation%2C%20Schneider%20Electric%2C%20GE%2C%20Emerson%2C%20Siemens%2C%20Honeywell%2C%20ABB%2C%20Yokogawa%2C%20etc.).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIntegration%20with%20existing%20SOC%20workflows%20is%20key%20to%20removing%20IT%2FOT%20silos%20while%20delivering%20unified%20monitoring%20and%20governance%20across%20both%20IT%20and%20OT.%20To%20help%20automate%20this%20complex%20security%20challenge%2C%20we%E2%80%99ve%20also%20beefed%20up%20Azure%20Sentinel%20with%20IoT%2FOT-specific%20SOAR%20playbooks%20and%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECombined%20with%20previous%20support%20in%20Azure%20Security%20Center%20for%20IoT%20for%20protecting%20managed%20IoT%2FOT%20devices%20connected%20via%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fiot-hub%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20IoT%20Hub%3C%2FA%3E%2C%20these%20new%20capabilities%20enable%20organizations%20to%20accelerate%20their%20digital%20transformation%20initiatives%20with%20a%20combined%20solution%20for%20both%20unmanaged%20and%20managed%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Rapid%20Deployment.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F226961i89A8F8C37529FC47%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Rapid%20Deployment.png%22%20alt%3D%22Rapid%20Deployment.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3ERapid%20non-invasive%20deployment%20leveraging%20patented%20IoT%2FOT-aware%20behavioral%20analytics%2C%20available%20either%20for%20on-premises%20or%20Azure-connected%20%3C%2FEM%3E%3CEM%3Eenvironments.%3C%2FEM%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-802993978%22%20id%3D%22toc-hId-802994010%22%20id%3D%22toc-hId-802994010%22%20id%3D%22toc-hId-802994010%22%20id%3D%22toc-hId-802994010%22%20id%3D%22toc-hId-802994010%22%20id%3D%22toc-hId-802994010%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1004460485%22%20id%3D%22toc-hId--1004460453%22%20id%3D%22toc-hId--1004460453%22%20id%3D%22toc-hId--1004460453%22%20id%3D%22toc-hId--1004460453%22%20id%3D%22toc-hId--1004460453%22%20id%3D%22toc-hId--1004460453%22%3EReal-time%20OT%20threat%20alerts%20provided%20by%20Azure%20Defender%20for%20IoT%20(examples)%3C%2FH2%3E%0A%3CUL%3E%0A%3CLI%3EUnauthorized%20device%20connected%20to%20the%20network%3C%2FLI%3E%0A%3CLI%3EUnauthorized%20connection%20to%20the%20internet%3C%2FLI%3E%0A%3CLI%3EUnauthorized%20remote%20access%3C%2FLI%3E%0A%3CLI%3ENetwork%20scanning%20operation%20detected%3C%2FLI%3E%0A%3CLI%3EUnauthorized%20PLC%20programming%3C%2FLI%3E%0A%3CLI%3EChanges%20to%20firmware%20versions%3C%2FLI%3E%0A%3CLI%3E%E2%80%9CPLC%20Stop%E2%80%9D%20and%20other%20potentially%20malicious%20commands%3C%2FLI%3E%0A%3CLI%3EDevice%20is%20suspected%20of%20being%20disconnected%3C%2FLI%3E%0A%3CLI%3EEthernet%2FIP%20CIP%20service%20request%20failure%3C%2FLI%3E%0A%3CLI%3EBACnet%20operation%20failed%3C%2FLI%3E%0A%3CLI%3EIllegal%20DNP3%20operation%3C%2FLI%3E%0A%3CLI%3EMaster-slave%20authentication%20error%3C%2FLI%3E%0A%3CLI%3EKnown%20malware%20detected%20(e.g.%2C%20WannaCry%2C%20EternalBlue)%3C%2FLI%3E%0A%3CLI%3EUnauthorized%20SMB%20login%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Screenshot%20examples.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F226965i5BD1243BF512BDF9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Screenshot%20examples.png%22%20alt%3D%22Screenshot%20examples.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorpneray_1%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CEM%3EAzure%20Defender%20for%20IoT%20provides%20holistic%20IoT%2FOT%20security%20including%20asset%20discovery%2C%20vulnerability%20management%2C%20and%20continuous%20threat%20monitoring%2C%20combined%20with%20deep%20Azure%20Sentinel%20integration.%3C%2FEM%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1483052348%22%20id%3D%22toc-hId-1483052380%22%20id%3D%22toc-hId-1483052380%22%20id%3D%22toc-hId-1483052380%22%20id%3D%22toc-hId-1483052380%22%20id%3D%22toc-hId-1483052380%22%20id%3D%22toc-hId-1483052380%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--324402115%22%20id%3D%22toc-hId--324402083%22%20id%3D%22toc-hId--324402083%22%20id%3D%22toc-hId--324402083%22%20id%3D%22toc-hId--324402083%22%20id%3D%22toc-hId--324402083%22%20id%3D%22toc-hId--324402083%22%3ETry%20it%20now%20at%20no%20charge%3C%2FH2%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fms.portal.azure.com%2F%23blade%2FMicrosoft_Azure_IoT_Defender%2FIoTDefenderDashboard%2FGetting_Started%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETry%20Azure%20Defender%20for%20IoT%3C%2FA%3E%20during%20public%20preview.%20This%20version%20includes%20the%20agentless%20security%20provided%20via%20the%20integration%20of%20CyberX%2C%20plus%20the%20ability%20to%20connect%20to%20Azure%20Sentinel.%20And%20please%20give%20us%20your%20feedback%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fiot-security%2Fbd-p%2FIoTSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EIoT%20Security%20Tech%20Community%3C%2FA%3E.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--458086839%22%20id%3D%22toc-hId--458086807%22%20id%3D%22toc-hId--458086807%22%20id%3D%22toc-hId--458086807%22%20id%3D%22toc-hId--458086807%22%20id%3D%22toc-hId--458086807%22%20id%3D%22toc-hId--458086807%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-2029425994%22%20id%3D%22toc-hId-2029426026%22%20id%3D%22toc-hId-2029426026%22%20id%3D%22toc-hId-2029426026%22%20id%3D%22toc-hId-2029426026%22%20id%3D%22toc-hId-2029426026%22%20id%3D%22toc-hId-2029426026%22%3ELearn%20more%20with%20these%20educational%20resources%3C%2FH2%3E%0A%3CUL%3E%0A%3CLI%3EWatch%20our%20Ignite%20session%20showing%20%3CA%20href%3D%22https%3A%2F%2Fmyignite.microsoft.com%2Fsessions%2F973175b0-2a2d-4b41-99f8-051e42ac575a%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehow%20Azure%20Defender%20for%20IoT%20and%20Azure%20Sentinel%20are%20combined%3C%2FA%3E%20to%20investigate%20multistage%20attacks%20that%20cross%20IT%2FOT%20boundaries%2C%20using%20the%20TRITON%20attack%20on%20a%20petrochemical%20facility%20as%20an%20example.%3C%2FLI%3E%0A%3CLI%3EWatch%20our%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DGfgOr6mEQgc%26amp%3Bfeature%3Dyoutu.be%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETech%20Community%20webinar%20describing%20MITRE%20ATT%26amp%3BCK%20for%20ICS%3C%2FA%3E%2C%20an%20OT-focused%20version%20of%20the%20well-known%20MITRE%20ATT%26amp%3BCK%20framework%20originally%20developed%20for%20IT%20networks.%3C%2FLI%3E%0A%3CLI%3EWatch%20our%20SANS%20webinar%20featuring%20the%20head%20of%20Microsoft%E2%80%99s%20datacenter%20security%20program%2C%20about%20%3CA%20href%3D%22https%3A%2F%2Fwww.sans.org%2Fwebcasts%2Fsecuring-building-management-systems-data-centers-ot-security-monitoring-115470%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esecuring%20building%20automation%20systems%20using%20continuous%20OT%20security%20monitoring%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EStay%20tuned%20for%20an%20upcoming%20webinar%20during%20which%20we%E2%80%99ll%20do%20a%20technical%20walkthrough%20of%20how%20to%20deploy%20and%20use%20Azure%20Defender%20for%20IoT.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1784329%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3BAzure%20Defender%20for%20IoT%20is%20now%20available%20in%20public%20preview%20for%20on-premises%20deployments%2C%20with%20the%20option%20of%20connecting%20securely%20to%20Azure%20Sentinel%20to%20eliminate%20IT%2FOT%20silos%20and%20provide%20a%20unified%20view%20of%20threats%20across%20both%20IT%20and%20OT%20environments.%20It%20also%20integrates%20out-of-the%20box%20with%20third-party%20tools%20like%20Splunk%2C%20IBM%20QRadar%2C%20and%20ServiceNow.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1784329%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Advanced%20Threat%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Security%20Center%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1791094%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Defender%20for%20IoT%20is%20now%20in%20public%20preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1791094%22%20slang%3D%22en-US%22%3E%3CP%3EReally%20amazing%20feature%2C%20If%20I%20had%20the%20opportunity%20i%20would%20have%20definitely%20implemented%20these%20security%20features%20in%20my%20own%20factory%2Fcompany.%20but%20for%20now%20at%20least%20I%20can%20learn%20them%20and%20advice%20others%20who%20have%20the%20facilities%20to%20benefit%20from%20these%20new%20technologies.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAlso%20I%20hope%20the%20marketing%20team%20can%20advertise%20properly%20and%20honestly%20make%20relevant%20people%20known%20about%20these%20features%2C%20that%20these%20things%20exist%20in%20Azure.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1792155%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Defender%20for%20IoT%20is%20now%20in%20public%20preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1792155%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20super%20exciting.%3C%2FP%3E%3CP%3EOne%20of%20great%20challenge%20with%20IoT%20is%20because%20they%20are%20small%20devices%20with%20limit%20functionalities%2C%20we%20couldn't%20install%20security%20tools%20on%20them%20and%20we%20have%20to%20relay%20on%20monitoring%20network%20traffics%20for%20potential%20attacks.%3C%2FP%3E%3CP%3EIt%20would%20have%20been%20interesting%20in%20case%20it%20would%20detect%20out%20of%20date%20firmware%20updates%20too.%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20normally%20won't%20know%20what%20devices%20are%20update%20and%20which%20are%26nbsp%3B%3CSTRONG%3Enot%3C%2FSTRONG%3E%20and%20updating%20firmware%20is%20not%20easy%20and%20it%20is%20like%20manual%20copying%20files%20and%20having%20list%20of%20devices%20where%20need%20update%20would%20be%20interesting.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1824143%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Defender%20for%20IoT%20is%20now%20in%20public%20preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1824143%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20sharing%20great%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.edupakistan.tk%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EKnowledge%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

AdobeStock_96161096.jpeg

Summary: Agentless security for unmanaged IoT/OT devices

As industrial and critical infrastructure organizations implement digital transformation, the number of networked IoT and Operational Technology (OT) devices has greatly proliferated. Many of these devices lack visibility by IT teams and are often unpatched and misconfigured, making them soft targets for adversaries looking to pivot deeper into corporate networks.

 

Business risks include financial losses due to production downtime, corporate liability from safety and environmental incidents, and theft of sensitive intellectual property such as proprietary formulas and manufacturing processes.

 

Incorporating agentless, IoT/OT-aware behavioral analytics from Microsoft's recent acquisition of CyberX, the new version of Azure Defender for IoT addresses these risks by discovering unmanaged IoT/OT assets, identifying IoT/OT vulnerabilities, and continuously monitoring for threats.

 

These new capabilities are now available in public preview for on-premises deployments, with the option of connecting securely to Azure Sentinel to eliminate IT/OT silos and provide a unified view of threats across both IT and OT environments. It also integrates out-of-the box with third-party tools like Splunk, IBM QRadar, and ServiceNow.

 

Introduction

Announced at Ignite 2020, Azure Defender for IoT delivers agentless security for continuously monitoring OT networks in industrial and critical infrastructure organizations.

 

You can deploy these capabilities fully on-premises without sending any data to Azure. Or, you can deploy in Azure-connected environments using our new native connector to integrate IoT/OT alerts into Azure Sentinel, benefiting from the scalability and cost benefits of the industry’s first cloud-native SIEM/SOAR platform.

 

Microsoft offers a number of end-to-end IoT security solutions for managed (or “greenfield”) IoT deployments, including Azure IoT HubAzure Sphere and micro-agents for embedded operating systems. However,  most of today’s IoT/OT devices are “unmanaged” because they do not get provisioned, are not monitored, and lack built-in security such as agents or automated updates.

 

As a result, most IT security organizations have limited or no visibility into their OT networks. What’s more, these devices are often unpatched and misconfigured, making them soft targets for adversaries looking to pivot deeper into corporate networks.

 

Network security monitoring tools developed for IT networks are unable to address these environments because they’re blind to specialized industrial protocols (Modbus, DNP3, BACnet, etc.). They also lack an understanding of the specialized device types, applications, and machine-to-machine (M2M) behaviors in IoT/OT environments.

 

Key capabilities

Azure Defender for IoT enables IT and OT teams to auto-discover their unmanaged IoT/OT assets, identify critical vulnerabilities, and detect anomalous or unauthorized behavior — without impacting IoT/OT stability or performance.

 

Azure Defender for IoT delivers insights within minutes of being connected to the network, leveraging patented IoT/OT-aware behavioral analytics and machine learning to eliminate the need to configure any rules, signatures, or other static IOCs. To capture the traffic, it uses an on-premises network sensor deployed as a virtual or physical appliance connected to a SPAN port or tap. The sensor implements non-invasive passive monitoring with Network Traffic Analysis (NTA) and Layer 7 Deep Packet Inspection (DPI) to extract detailed IoT/OT information in real-time.

 

You also benefit from out-of-the box integration with third-party IT security tools like Splunk, IBM QRadar, and ServiceNow. Plus, it’s designed to fit right into existing OT environments, even across diverse automation equipment from all major OT suppliers (Rockwell Automation, Schneider Electric, GE, Emerson, Siemens, Honeywell, ABB, Yokogawa, etc.).

 

Integration with existing SOC workflows is key to removing IT/OT silos while delivering unified monitoring and governance across both IT and OT. To help automate this complex security challenge, we’ve also beefed up Azure Sentinel with IoT/OT-specific SOAR playbooks and

 

Combined with previous support in Azure Security Center for IoT for protecting managed IoT/OT devices connected via Azure IoT Hub, these new capabilities enable organizations to accelerate their digital transformation initiatives with a combined solution for both unmanaged and managed devices.

 

Rapid Deployment.png

 

Rapid non-invasive deployment leveraging patented IoT/OT-aware behavioral analytics, available either for on-premises or Azure-connected environments.

 

Real-time OT threat alerts provided by Azure Defender for IoT (examples)

  • Unauthorized device connected to the network
  • Unauthorized connection to the internet
  • Unauthorized remote access
  • Network scanning operation detected
  • Unauthorized PLC programming
  • Changes to firmware versions
  • “PLC Stop” and other potentially malicious commands
  • Device is suspected of being disconnected
  • Ethernet/IP CIP service request failure
  • BACnet operation failed
  • Illegal DNP3 operation
  • Master-slave authentication error
  • Known malware detected (e.g., WannaCry, EternalBlue)
  • Unauthorized SMB login

 

Screenshot examples.png

 

 

Azure Defender for IoT provides holistic IoT/OT security including asset discovery, vulnerability management, and continuous threat monitoring, combined with deep Azure Sentinel integration.

 

Try it now at no charge

Try Azure Defender for IoT during public preview. This version includes the agentless security provided via the integration of CyberX, plus the ability to connect to Azure Sentinel. And please give us your feedback in the IoT Security Tech Community.

 

Learn more with these educational resources

 

 

 

 

 

 

 

 

3 Comments
Honored Contributor

Really amazing feature, If I had the opportunity i would have definitely implemented these security features in my own factory/company. but for now at least I can learn them and advice others who have the facilities to benefit from these new technologies.

 

Also I hope the marketing team can advertise properly and honestly make relevant people known about these features, that these things exist in Azure.

 

Valued Contributor

This is super exciting.

One of great challenge with IoT is because they are small devices with limit functionalities, we couldn't install security tools on them and we have to relay on monitoring network traffics for potential attacks.

It would have been interesting in case it would detect out of date firmware updates too. 

We normally won't know what devices are update and which are not and updating firmware is not easy and it is like manual copying files and having list of devices where need update would be interesting.

Occasional Visitor

Thanks for sharing great Knowledge