You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/alerts.md
+25-17Lines changed: 25 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,30 +34,30 @@ While you can view alert details, investigate alert context, and triage and mana
34
34
|**OT network sensor consoles**| Alerts generated by that OT sensor | - View the alert's source and destination in the **Device map** <br>- View related events on the **Event timeline** <br>- Forward alerts directly to partner vendors <br>- Create alert comments <br> - Create custom alert rules <br>- Unlearn alerts |
35
35
|**Microsoft 365 Defender**| Alerts generated for Enterprise IoT devices detected by Microsoft Defender for Endpoint | - Manage alerts data together with other Microsoft 365 Defender data, including advanced hunting |
36
36
37
-
> [!TIP]
38
-
> Any alerts generated from different sensors in the same zone within a 10-minute timeframe, with the same type, status, alert protocol, and associated devices, are listed as a single, unified alert.
39
-
>
40
-
> - The 10-minute timeframe is based on the alert's *first detection* time.
41
-
> - The single, unified alert lists all of the sensors that detected the alert.
42
-
> - Alerts are combined based on the *alert* protocol, and not the device protocol.
43
-
>
44
-
45
-
For more information, see:
46
-
47
-
-[Alert data retention](references-data-retention.md#alert-data-retention)
48
-
-[Accelerating OT alert workflows](#accelerating-ot-alert-workflows)
49
-
-[Alert statuses and triaging options](alerts.md#alert-statuses-and-triaging-options)
50
-
-[Plan OT sites and zones](best-practices/plan-corporate-monitoring.md#plan-ot-sites-and-zones)
51
-
52
-
Alert options also differ depending on your location and user role. For more information, see [Azure user roles and permissions](roles-azure.md) and [On-premises users and roles](roles-on-premises.md).
37
+
### Alert management considerations
38
+
39
+
- Any alerts generated from different sensors in the same zone within a 10-minute timeframe, with the same type, status, alert protocol, and associated devices, are listed as a single, unified alert.
40
+
- The 10-minute timeframe is based on the alert's *first detection* time.
41
+
- The single, unified alert lists all of the sensors that detected the alert.
42
+
- Alerts are combined based on the *alert* protocol, and not the device protocol.
43
+
- For more information, see:
44
+
-[Alert data retention](references-data-retention.md#alert-data-retention)
45
+
-[Accelerating OT alert workflows](#accelerating-ot-alert-workflows)
46
+
-[Alert statuses and triaging options](alerts.md#alert-statuses-and-triaging-options)
47
+
-[Plan OT sites and zones](best-practices/plan-corporate-monitoring.md#plan-ot-sites-and-zones)
48
+
- Alert options also differ depending on your location and user role. For more information, see [Azure user roles and permissions](roles-azure.md) and [On-premises users and roles](roles-on-premises.md).
49
+
- When you view alerts in the alert list, some alerts may not correlate with alerts on specific sensors. For more information, see [Investigate alerts that don't correlate with specific sensors](respond-ot-alert.md#investigate-alerts-that-dont-correlate-with-a-specific-sensor).
53
50
54
51
## Aggregating alert violations
55
52
56
53
Alert fatigue caused by a high number of identical alerts could lead to your team failing to see or remediate vital alerts. Each alert listed in the Alerts page is a result of a network violation, for example the *Unpermitted Usage of Modbus Function Code*. Aggregating violations with the same parameters and remediation requirements into one single alert listing, reduces the number of alerts displayed on the Alerts page. The matching parameters differ depending on the alert type. For example, the *Unpermitted Usage of Modbus Function Code* alert needs to have the same source and destination IP addresses to produce an aggregated alert violation. The aggregated alert could include alerts with different violation codes, such as read and write codes.
57
54
58
55
You download the aggregated alert violation data, that lists each alert with the relevant parameters and functions, as a CSV file in the **Violations** tab of the alert details. This data can help teams to identify patterns, assess impact and prioritize responses more effectively based on the remediation suggestions in the **Take action** tab. Only alerts that have the same remediation process are aggregated into a single alert. However, individual violation events can still be viewed separately within their respective devices, providing additional clarity.
59
56
60
-
The alerts that can be aggregated are listed in the [Alert reference](alert-engine-messages.md#policy-engine-alerts) policy engine alerts tables under the **Aggregarted** heading.
57
+
> [!NOTE]
58
+
> After you learn an alert (with the **Learn** option in the alert's **Take action** tab), the same alert might be triggered again. This can happen if the new alert has different violation parameters than the original alert. To check which violations exist for an alert:
59
+
> - In the Azure portal, in the alert's **Violations** tab, select **Export**.
60
+
> - In the OT sensor console, in the alert's **Violations** tab, select **Download CSV**.
61
61
62
62
Alert grouping appears in both the OT sensor console and the Azure portal. For more information, see [remediate aggregated alerts in Sensor console](how-to-view-alerts.md#remediate-aggregated-alert-violations) and [remediate aggregated alerts in Azure portal](how-to-manage-cloud-alerts.md#remediate-aggregated-alert-violations).
63
63
@@ -149,6 +149,14 @@ Use learning mode to perform an initial triage on the alerts in your network, *l
149
149
150
150
For more information, see [Create a learned baseline of OT alerts](ot-deploy/create-learned-baseline.md).
151
151
152
+
## Alert investigation and remediation
153
+
154
+
Alert investigation allows you to understand the context of the alert, including the sensor that triggered the alert, the source and destination devices, and related activity on your OT network.
155
+
156
+
After you triage and investigate an alert, you can take remediation actions to resolve any issues identified during your investigation.
157
+
158
+
For more information, see [Investigate and respond to an OT network alert](respond-ot-alert.md).
159
+
152
160
## Next steps
153
161
154
162
Review alert types and messages to help you understand and plan remediation actions and playbook integrations. For more information, see [OT monitoring alert types and descriptions](alert-engine-messages.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-manage-cloud-alerts.md
+10-2Lines changed: 10 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,9 @@ Microsoft Defender for IoT alerts enhance your network security and operations w
18
18
19
19
For more information, see [Securing IoT devices in the enterprise](concept-enterprise.md) and the [Alerts queue in Microsoft Defender XDR](/microsoft-365/security/defender-endpoint/alerts-queue-endpoint-detection-response).
20
20
21
+
> [!TIP]
22
+
> You can use different areas in Defender for IoT to investigate alerts, and drill down into device and network details, violations, and more. For more information, see [Investigate and respond to and OT network alert](respond-ot-alert.md).
23
+
21
24
## Prerequisites
22
25
23
26
-**To have alerts in Defender for IoT**, you must have an [OT](onboard-sensors.md) onboarded, and network data streaming into Defender for IoT.
@@ -61,8 +64,10 @@ For more information, see [Azure user roles and permissions for Defender for IoT
61
64
|**Category**| The [category](alert-engine-messages.md#supported-alert-categories) associated with the alert, such as *operational issues*, *custom alerts*, or *illegal commands*. |
62
65
|**Type**| The internal name of the alert. |
63
66
64
-
> [!TIP]
65
-
> If you're seeing more alerts than expected, you might want to create suppression rules to prevent alerts from being triggered for legitimate network activity. For more information, see [Suppress irrelevant alerts](how-to-accelerate-alert-incident-response.md#suppress-irrelevant-alerts).
67
+
### Considerations
68
+
69
+
- If you're seeing more alerts than expected, you might want to create suppression rules to prevent alerts from being triggered for legitimate network activity. For more information, see [Suppress irrelevant alerts](how-to-accelerate-alert-incident-response.md#suppress-irrelevant-alerts).
70
+
- When you view alerts in the alert list, some alerts may not correlate with alerts on specific sensors. For more information, see [Investigate alerts that don't correlate with specific sensors](respond-ot-alert.md#investigate-alerts-that-dont-correlate-with-a-specific-sensor).
66
71
67
72
### Filter alerts displayed
68
73
@@ -165,6 +170,9 @@ To reduce alert fatigue, multiple versions of the same alert violation with iden
165
170
166
171
1. Select **Learn**, if needed. For more information, see [learning an alert](alerts.md#alert-statuses-and-triaging-options).
167
172
173
+
> [!NOTE]
174
+
> After you learn an alert, the same alert might be triggered again if the new alert has different violation parameters. To check why the alert was triggered, review the list of violations in the CSV file you downloaded in step 3.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-view-alerts.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,9 @@ For more information, see [On-premises users and roles for OT monitoring with De
26
26
27
27
## View alerts on an OT sensor
28
28
29
+
> [!NOTE]
30
+
> When you view alerts in the Azure portal **Alerts** page, some alerts may not correlate with alerts on specific sensors. For more information, see [Investigate alerts that don't correlate with specific sensors](respond-ot-alert.md#investigate-alerts-that-dont-correlate-with-a-specific-sensor).
31
+
29
32
1. Sign into your OT sensor console and select the **Alerts** page on the left.
30
33
31
34
By default, the following details are shown in the grid:
@@ -196,6 +199,9 @@ To reduce alert fatigue, multiple versions of the same alert violation with iden
196
199
197
200
1. Select **Learn**, if needed. For more information, see [learning an alert](alerts.md#alert-statuses-and-triaging-options).
198
201
202
+
> [!NOTE]
203
+
> An alert with specific violations does not prevent new alerts with different violations from appearing. After you learn an alert, the same alert might be triggered again if the new alert has different violation parameters. To check why the alert was triggered, review the list of violations in the alert list (for the first 10 alerts) or the CSV file you downloaded in step 3.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/respond-ot-alert.md
+12-1Lines changed: 12 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,12 @@ After updating the status, check the alert details page for the following detail
45
45
46
46
-**Source and destination device details**. Source and destination devices are listed in **Alert details** tab, and also in the **Entities** area below, as Microsoft Sentinel *entities*, with their own [entity pages](iot-advanced-threat-monitoring.md#investigate-further-with-iot-device-entities). In the **Entities** area, you'll use the links in the **Name** column to open the relevant device details pages for [further investigation](#investigate-related-alerts-on-the-azure-portal).
47
47
48
-
-**Site and/or zone**. These values help you understand the geographic and network location of the alert and if there are areas of the network that are now more vulnerable to attack.
48
+
-**Site and/or zone**. These values help you understand the geographic and network location of the alert and if there are areas of the network that are now more vulnerable to attack.
49
+
50
+
-**Sensor information**. Review the **Sensor**, **SiteDisplayName**, and other sensor information to provide context about the sensor that triggered the alert.
51
+
52
+
> [!NOTE]
53
+
> In some cases, the alerts displayed in the alert list might not correlate with specific sensors. For more information, see [Investigate alerts that don't correlate with specific sensors](#investigate-alerts-that-dont-correlate-with-a-specific-sensor).
49
54
50
55
-**MITRE ATT&CK** tactics and techniques. Scroll down in the left pane to view all MITRE ATT&CK details. In addition to descriptions of the tactics and techniques, select the links to the MITRE ATT&CK site to learn more about each one.
51
56
@@ -67,6 +72,12 @@ For example, a device that attempted to connect to a malicious IP, together with
67
72
68
73
:::image type="content" source="media/iot-solution/device-details-alerts.png" alt-text="Screenshot of the Alerts tab on a device details page.":::
69
74
75
+
## Investigate alerts that don't correlate with a specific sensor
76
+
77
+
In some cases, alerts in the Azure portal might not correlate with alerts on a specific sensor. The alert may be triggered by a specific sensor's configuration, like a device marked as a scanner in one sensor but not in another. As a result, alerts may only be displayed on the sensor that has the relevant configuration, even if other sensors also see the same traffic.
78
+
79
+
In this scenario, you can check the **Sensor**, **SiteDisplayName**, and **SensorZone** fields in the alert's **Alert details** tab to identify the sensor that generated the alert. You can then review that sensor's configuration and context to understand why the alert was triggered.
80
+
70
81
## Investigate alert details on the OT sensor
71
82
72
83
The OT sensor that triggered the alert will have more details to help your investigation.
0 commit comments