security
11 TopicsSensor Disconnection Notifications with Microsoft Defender for IoT and Microsoft Sentinel 🚀
What Does This Playbook Do? This new automated playbook sends real-time email notifications whenever a sensor disconnects from the cloud. This ensures you’re immediately alerted if there’s an issue, allowing you to take quick action to investigate and resolve the problem. Why It’s Important: Real-Time Alerts: Get instant notifications when a sensor goes offline. Proactive Monitoring: Identify the issue early, reducing downtime and improving response times. Seamless Integration: Works effortlessly with Microsoft Defender for IoT and Microsoft Sentinel for a unified security approach. How to Set It Up: Setting up this playbook is quick and easy. For step-by-step instructions, check out the detailed setup guide here. This playbook was created in collaboration with Marian Hristov, a leading partner working with Defender for IoT.432Views0likes0CommentsIntroducing Single Sign-On (SSO) for Sensor Console: Enhanced Security and Streamlined Access
We are excited to announce that Single Sign-On (SSO) is now available for the sensor console! This new feature streamlines the login process by using Entra ID, enhancing security and convenience for all users.2.1KViews0likes0CommentsPublic Preview Announcement: OT-Enabled SOC with Microsoft Sentinel and Defender for IoT
We are excited to announce the public preview of our Defender for IoT solution for Microsoft Sentinel. With this solution, Microsoft Sentinel delivers the first in the industry native SOC experience for IT and OT environmentsMicrosoft Defender for IoT for Device Builders in Public Preview
We would like to introduce you to our latest Public Preview: Microsoft Defender for IoT's embedded security capabilities for device builders and solution operators, which will empower them to create and manage secure-by-design IoT devices.8.6KViews2likes0CommentsAzure Defender for IoT Raw-Data and ICS MITRE ATT&CK Matrix Mapping via Azure Sentinel
A series of major cyberattacks across industries served as a wake-up call that the traditional “air-gapped” model for OT cybersecurity had become outdated in the era of IT/OT convergence and initiatives such as Smart Manufacturing and Smart Buildings. And the IoT and Industrial Internet of things (IIoT) are only getting bigger. Analysts predict we’ll have billions of IoT devices connected worldwide in a few years, drastically increasing the surface area for attacks. By incorporating agentless technology from Microsoft, Azure Defender for IoT enables IT and OT teams to identify critical vulnerabilities and detect threats using IoT/OT-aware behavioral analytics and machine learning— all without impacting availability or performance, we will detail in this blog post how to ingest Azure Defender for IoT Raw-Data to Azure Sentinel and cover the ICS MITRE ATT&CK matrix via analytics rules!Azure Defender for IoT is now in public preview
Azure Defender for IoT is now available in public preview for on-premises deployments, with the option of connecting securely to Azure Sentinel to eliminate IT/OT silos and provide a unified view of threats across both IT and OT environments. It also integrates out-of-the box with third-party tools like Splunk, IBM QRadar, and ServiceNow.53KViews5likes3CommentsHow to Gain More from your Connection to an OT Network
Attempting to improve OT security without accurate device inventories, firmware revisions, and network maps is not effective. One of the most productive and non-intrusive tools in the Cyber Security Engineer’s bag is network intrusion detection. But how can we implement this kind of system without causing any bumps in the road for the real-time processes?15KViews4likes3Comments