With vulnerability management, Microsoft Defender for IoT in the Defender portal provides extended coverage for OT networks, gathers OT device data into one place, and displays the data with the other devices on your network.
The OT security administrator proactively manages network exposure based on the vulnerability details and recommended remediation actions.
Important
This article discusses Microsoft Defender for IoT in the Defender portal (Preview).
Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
Vulnerability management capabilities
The key vulnerability management capabilities are:
Capability
Description
Extended vulnerability coverage
Defender for IoT uses detailed OT device firmware information and discovers the device vendor, model, and version to identify known vulnerabilities.
You can manage and control the vulnerabilities globally, per tenant or device group, per device from the device page, or per vulnerable product through the Inventory page.
Users can report inaccuracies on discovered CVEs or request support for new vulnerabilities.
Weaknesses page
The Microsoft Defender portal displays Microsoft Defender for IoT security vulnerabilities in the Endpoints > Weaknesses page.
Vulnerabilities are listed based on their publicly registered Common Vulnerability and Exposures(CVEs) ID.
The Weaknesses page lists the detected security vulnerabilities across all devices, endpoints, applications and other sources on your network. The data can be filtered according to device groups based on the created sites.
The OT security administrator uses the list of detected vulnerabilities in the Weaknesses page to send a remediation request for the relevant team to handle.
Microsoft Defender for IoT in the Defender portal is a unified security solution built specifically to identify IoT and OT devices, vulnerabilities, and threats.
This article describes how to set up and create a site as part of the site security feature included in Microsoft Defender for IoT in the Microsoft Defender portal.