Blog Post

Microsoft Defender for IoT Blog
4 MIN READ

Microsoft Defender for IoT Ninja Training

kimwall's avatar
kimwall
Icon for Microsoft rankMicrosoft
Jun 09, 2021

The following courses will guide you to becoming an Microsoft Defender for IoT Ninja. 

 

Curriculum  

This training program includes over 28 videos divided into 5 modules. For each session, the post includes a video, and/or a presentation, along with supporting information when relevant: product documentation, blog posts, and additional resources. 
 
The modules are organized into the following groups: 

  • Overview 
  • Basic Features 
  • Deployment 
  • Sentinel Integration 
  • Advanced  

Check back often as additional items will be published regularly.

  

Overview 

Microsoft Defender for IoT enables IT and OT teams to auto-discover their unmanaged IoT/OT assets, identify critical vulnerabilities, and detect anomalous or unauthorized behavior — without impacting IoT/OT stability or performance. 

Microsoft Defender for IoT delivers insights within minutes of being connected to the network, leveraging patented IoT/OT-aware behavioral analytics and machine learning to eliminate the need to configure any rules, signatures, or other static IOCs. To capture the traffic, it uses an on-premises network sensor deployed as a virtual or physical appliance connected to a SPAN port or tap. The sensor implements non-invasive passive monitoring with Network Traffic Analysis (NTA) and Layer 7 Deep Packet Inspection (DPI) to extract detailed IoT/OT information in real-time.

 

This section provides background information on IoT and OT networks and an overview of the Microsoft Defender for IoT platform.

 

Start Here 

 17m: How does Microsoft Defender for IoT secure OT (operational technology) environments? 
  How does Microsoft Defender for IoT secure OT (operational technology) environments? 
 12m: What is the Microsoft Defender for IoT Architecture? 
 What is the Microsoft Defender for IoT Architecture? 

 4m: Microsoft Defender for IoT Reference Architecture

 

Learn More 

Blog: Go inside the new Microsoft Defender for IoT including CyberX 

 22m: Agentless IoT/OT security with Microsoft Defender for IoT 
 35m: Microsoft Defender for IoT Overview  
 25m: Microsoft Defender for IoT Introduction 
 38m: What is OT and how is it different from IT? 
 23m: How Microsoft Defender for IoT fills the security gap in OT networks 
 13m: Microsoft Defender for IoT overview and demo 
 13m: Microsoft Defender for IoT agentless monitoring demo 

Blog: Designing a Robust Defense for Operational Technology Using Microsoft Defender for IoT

Blog: Microsoft scores highest in threat visibility coverage for MITRE ATT&CK for ICS

Blog: How to gain more from your connection to an OT network

 

 

 

Basic Features 

Learn about the core features of the platform including asset discovery, deployment options, reporting, alert handling, event timeline, risk assessment, attack vector simulations, and data mining and baselining.  

 

Start Here 

 43m: Demonstration of Microsoft Defender for IoT platform

 Demonstration of Microsoft Defender for IoT platform 
 10m: How to discover and classify assets within your industrial network using Defender for IoT 

 Asset discovery solution brief

 6m: How to discover exploitable paths using attack vector simulation 
 How to discover exploitable paths using attack vector simulation 
 8m: How to run reports and attack vector simulations 
 How to run reports and attack vector simulations 
 5m: How to use the event timeline 
 11m: How to analyze the risk assessment report 

 Sample Risk Assessment report

 9m: How to handle Microsoft Defender for IoT Alerts

 How to handle Microsoft Defender for IoT Alerts

 5m: How data mining and baselining works in Microsoft Defender for IoT

 How data mining and baselining works in Microsoft Defender for IoT

 

Learn More 

Doc: Working with the device inventory

Doc: Working with the Event Timeline

Doc: Risk Assessment Reporting

Doc: Understanding Sensor Alerts

Doc: Alert types and descriptions

Doc: Creating Data Mining Reports

 52m: Zero Trust Webinar with Microsoft Defender for IoT 
 24m: Analytics, data management and hunting with Microsoft Defender for IoT 
 24m: Deployment methodologies - hybrid cloud vs air-gapped environments 

Doc: Microsoft Defender for IoT Architecture in product documentation 

Blog: Cloud-delivered IoT/OT threat intelligence 

Blog: Microsoft Defender for IoT quick start instructions 

 

 

Deployment 

This section provides details on the deployment and tuning specifics. Learn about the differences between on-premises-only and cloud-connected options. Walk through the licensing components within the Azure portal.  

 

Start Here 

 35m: How to successfully deploy a sensor 

 How to successfully deploy a sensor

 15m: How to optimize and tune the Microsoft Defender for IoT platform

 How to optimize and tune the Microsoft Defender for IoT platform

 

Learn More 

Doc: Setting up your Defender for IoT network

Blog: Designing a Robust Defense for Operational Technology Using Microsoft Defender for IoT 

 33m: Deploying and configuring an offline sensor 

 

 

Sentinel Integration 

For cloud-connected options, remote sensors will send logging and analysis data to Azure. Once in the cloud, logging and asset data may be forwarded to Sentinel. All of the tools within Sentinel become available including automation/playbooks, workbooks, threat hunting and analytics, incident handling, notebooks, and more.  

 

Start Here 

 16m: How to protect OT networks from Triton using Microsoft Sentinel Playbooks 

 5m: How Microsoft Defender for IoT uses the IoT Hub

 5m: How to share Defender for IoT Raw Data with Sentinel 

 

Advanced 

Learn about advanced features and integrations including custom alerts, MITRE framework, enterprise data integration, large scale deployments, SOC integration, and more.  

 

Start Here 

 13m: How to use the enterprise data integrator 
 How to use the enterprise data integrator 

 12m: How to create custom alerts in Defender for IoT

  53m: How Defender for IoT maps to MITRE ATT&CK

 How Defender for IoT maps to MITRE ATT&CK

  5m: Integrating with Splunk and ServiceNow

 53m: Large scale deployment of Defender for IoT

  Large scale deployment of Defender for IoT

 

Learn More 

Blog: Looking for Anomalies in your IoT Asset Telemetry 

Doc: Creating Custom Alerts 

Doc: Integrating data into the enterprise device inventory

Blog: Microsoft Defender for IoT Raw-Data and ICS MITRE ATT&CK Matrix Mapping via Azure Sentinel

 

 

 

 

Microsoft Defender for IoT Product Documentation 

You may find product documentation in the Azure portal: 

  • Microsoft Defender for IoT Getting Started launch page 

  

Updated May 12, 2022
Version 30.0