Επεξεργασία

Κοινή χρήση μέσω


Defender for IoT device inventory

Defender for IoT's device inventory helps you identify details about specific devices, such as manufacturer, type, serial number, firmware, and more. Gathering details about your devices helps your teams proactively investigate vulnerabilities that can compromise your most critical assets.

  • Manage all your IoT/OT devices by building up-to-date inventory that includes all your managed and unmanaged devices

  • Protect devices with risk-based approach to identify risks such as missing patches, vulnerabilities, and prioritize fixes based on risk scoring and automated threat modeling

  • Update your inventory by deleting irrelevant devices and adding organization-specific information to emphasize your organization preferences

For example:

Screenshot of the Defender for IoT Device inventory page in the Azure portal.

Supported devices

Defender for IoT's device inventory supports the following device classes:

Devices For example ...
Manufacturing Industrial and operational devices, such as pneumatic devices, packaging systems, industrial packaging systems, industrial robots
Building Access panels, surveillance devices, HVAC systems, elevators, smart lighting systems
Health care Glucose meters, monitors
Transportation / Utilities Turnstiles, people counters, motion sensors, fire and safety systems, intercoms
Energy and resources DCS controllers, PLCs, historian devices, HMIs
Endpoint devices Workstations, servers, or mobile devices
Enterprise Smart devices, printers, communication devices, or audio/video devices
Retail Barcode scanners, humidity sensor, punch clocks

A transient device type indicates a device that was detected for only a short time. We recommend investigating these devices carefully to understand their impact on your network.

Unclassified devices are devices that don't otherwise have an out-of-the-box category defined.

Device management options

Defender for IoT device inventory is available in the following locations:

Location Description Extra inventory support
Azure portal OT devices detected from all cloud-connected OT sensors. - If you also use Microsoft Sentinel, incidents in Microsoft Sentinel are linked to related devices in Defender for IoT.

- Use Defender for IoT workbooks for visibility into all cloud-connected device inventory, including related alerts and vulnerabilities.

- If you have a legacy Enterprise IoT plan on your Azure subscription, the Azure portal also includes devices detected by Microsoft Defender for Endpoint agents. If you have an Enterprise IoT sensor, the Azure portal also includes devices detected by the Enterprise IoT sensor.
Microsoft Defender XDR Enterprise IoT devices detected by Microsoft Defender for Endpoint agents Correlate devices across Microsoft Defender XDR in purpose-built alerts, vulnerabilities, and recommendations.
OT network sensor consoles Devices detected by that OT sensor - View all detected devices across a network device map

- View related events on the Event timeline
An on-premises management console Devices detected across all connected OT sensors Enhance device data by importing data manually or via script

For more information, see:

Automatically consolidated devices

When you deploy Defender for IoT at scale, with several OT sensors, each sensor might detect different aspects of the same device. To prevent duplicated devices in your device inventory, Defender for IoT assumes that any devices found in the same zone, with a logical combination of similar characteristics, is the same device. Defender for IoT automatically consolidates these devices and lists them only once in the device inventory.

For example, any devices with the same IP and MAC address detected in the same zone are consolidated and identified as a single device in the device inventory. If you have separate devices from recurring IP addresses that are detected by multiple sensors, you want each of these devices to be identified separately. In such cases, onboard your OT sensors to different zones so that each device is identified as a separate and unique device, even if they have the same IP address. Devices that have the same MAC addresses, but different IP addresses aren't merged, and continue to be listed as unique devices.

A transient device type indicates a device that was detected for only a short time. We recommend investigating these devices carefully to understand their impact on your network.

Unclassified devices are devices that don't otherwise have an out-of-the-box category defined.

Tip

Define sites and zones in Defender for IoT to harden overall network security, follow principles of Zero Trust, and gain clarity in the data detected by your sensors.

Unauthorized devices

When you're first working with Defender for IoT, during the learning period just after deploying a sensor, all devices detected are identified as authorized devices.

After the learning period is over, any new devices detected are considered to be unauthorized and new devices. We recommend checking these devices carefully for risks and vulnerabilities. For example, in the Azure portal, filter the device inventory for Authorization == **Unauthorized**. On the device details page, drill down and check for related vulnerabilities, alerts, and recommendations.

The new status is removed as soon as you edit any of the device details or move the device on an OT sensor device map. In contrast, the unauthorized label remains until you manually edit the device details and mark it as authorized.

On an OT sensor, unauthorized devices are also included in the following reports:

  • Attack vector reports: Devices marked as unauthorized are included in an attack vector simulation as suspected rogue devices that might be a threat to the network.

  • Risk assessment reports: Devices marked as unauthorized are listed in risk assessment reports as their risks to your network require investigation.

Important OT devices

Mark OT devices as important to highlight them for extra tracking. On an OT sensor, important devices are included in the following reports:

  • Attack vector reports: Devices marked as important are included in an attack vector simulation as possible attack targets.

  • Risk assessment reports: Devices marked as important are counted in risk assessment reports when calculating security scores.

Device inventory column data

The following table lists the columns available in the Defender for IoT device inventory on the Azure portal and the OT sensor, a description of each column and whether and in which platform it is editible. Starred items (*) are also available from the OT sensor.

Note

Noted features listed below are in PREVIEW. The Azure Preview Supplemental Terms include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Name Description Editable
Authorization * Determines whether or not the device is marked as authorized. This value might need to change as the device security changes. Toggle Authorized device. Editable in Azure and OT Sensor
Business Function Describes the device's business function. Editable in Azure
Class The device's class.
Default: IoT
Editable in Azure
Data source The source of the data, such as a micro agent, OT sensor, or Microsoft Defender for Endpoint.
Default: MicroAgent
Not editable
Description * The device's description. Editable in both Azure and the OT Sensor
Device Id The device's Azure-assigned ID number. Not editable
Firmware model The device's firmware model. Editable in Azure
Firmware vendor The vendor of the device's firmware. Not editable
Firmware version * The device's firmware version. Editable in Azure
First seen * The date and time the device was first seen. Shown in MM/DD/YYYY HH:MM:SS AM/PM format. On the OT sensor, shown as Discovered. Not editable
Importance The device's important level: Low, Medium, or High. Editable in Azure
IPv4 Address * The device's IPv4 address. Not editable
IPv6 Address The device's IPv6 address. Not editable
Last activity * The date and time the device last sent an event through to Azure or to the OT sensor, depending on where you're viewing the device inventory. Shown in MM/DD/YYYY HH:MM:SS AM/PM format. Not editable
Location The device's physical location. Editable in Azure
MAC Address * The device's MAC address. Not editable
Model * The device's hardware model. Editable in Azure
Name * Mandatory. The device's name as the sensor discovered it, or as entered by the user. Editable in Azure and OT sensor
Network location (Public preview) * The device's network location. Displays whether the device is defined as local or routed, according to the configured subnets. Not editable
OS architecture The device's operating system architecture. Not editable
OS distribution The device's operating system distribution, such as Android, Linux, and Haiku. Not editable
OS platform * The device's operating system, if detected. On the OT sensor, shown as Operating System. Editable in OT Sensor
OS version The device's operating system version, such as Windows 10 or Ubuntu 20.04.1. Not editable
PLC mode * The device's PLC operating mode, including both the Key state (physical / logical) and the Run state (logical). If both states are the same, then only one state is listed.

- Possible Key states include: Run, Program, Remote, Stop, Invalid, and Programming Disabled.

- Possible Run states are Run, Program, Stop, Paused, Exception, Halted, Trapped, Idle, or Offline.
Editable in OT Sensor
Programming device * Defines whether the device is defined as a Programming Device, performing programming activities for PLCs, RTUs, and controllers, which are relevant to engineering stations. Editable in Azure and OT sensor
Protocols * The protocols that the device uses. Not editable
Purdue level The Purdue level in which the device exists. Editable in OT sensor
Scanner device * Defines whether the device performs scanning-like activities in the network. Editable in OT Sensor
Sensor The sensor the device is connected to. Not editable
Serial number * The device's serial number. Not editable
Site The device's site.

All Enterprise IoT sensors are automatically added to the Enterprise network site.
Not editable
Slots * The number of slots the device has. Not editable
Subtype The device's subtype, such as Speaker or Smart TV.
Default: Managed Device
Editable in Azure
Tags The device's tags. Editable in Azure
Type * The device type, such as Communication or Industrial.
Default: Miscellaneous
Editable in Azure and OT sensor
Vendor * The name of the device's vendor, as defined in the MAC address. < Also inconsistent - in inventory called vendor, in pane called hardware vendor> Editable in Azure
VLAN * The device's VLAN. Not editable
Zone The device's zone. Not editable

The following columns are available in the OT sensors only, and aren't editible.

  • The device's DHCP Address.
  • The device's FQDN address and FQDN Last Lookup Time.
  • The device Groups that include the device, as defined on the OT sensor's device map.
  • The device's Module address.
  • The device's Rack.
  • The number of Unacknowledged Alerts alerts associated with the device.

Note

The additional Agent type and Agent version columns are used for by device builders. For more information, see Microsoft Defender for IoT for device builders documentation.

Next steps

For more information, see: