Unauthorized device in the network (Microsoft Defender for IoT)

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This alert leverages Defender for IoT to detect a new device indicating a legitimate device recently installed on the network or an indication of malicious activity such as a cyber threat attempting to manipulate the SCADA network.

Attribute Value
Type Analytic Rule
Solution IoTOTThreatMonitoringwithDefenderforIoT
ID f4c71e55-6192-47ca-92e2-0856ae502a46
Severity Medium
Status Available
Kind Scheduled
Tactics Discovery
Techniques T0842
Required Connectors IoT
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
SecurityAlert ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to IoTOTThreatMonitoringwithDefenderforIoT