• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Mobility, Network Security, News

Microsoft Officially Unveils Protection for Unmanaged IoT Devices

New security features in Defender for IoT extend coverage to all endpoint types, applications, identities and operating systems.

July 11, 2022 Zachary Comeau Leave a Comment

MIcrosoft Entra External ID
stock.adobe.com/Peter

To help enterprises better secure their unmanaged IoT devices connected to IT networks, Microsoft is releasing new capabilities in Defender for IoT that allows Defender for Endpoint customers to extend their extended detection and response coverage to those devices.

According to Microsoft, these new security features extend Defender’s coverage to IoT devices such as digital signage, conference room systems and operational technology (OT) devices that have been prone to software vulnerabilities and attacks from cybercriminals. The company first announced the public preview of these capabilities last year during its annual Ignite conference.

“With this new addition, Defender for IoT now delivers comprehensive security for all endpoint types, applications, identities, and operating systems,” Microsoft IoT and security executives say in a new blog. “The new capabilities allow organizations to get the visibility and insights they need to address complex multi-stage attacks that specifically take advantage of IoT and OT devices to achieve their goals.”

This brings the same type of vulnerability management, threat detection, response and other capabilities for enterprise IoT devices previously only available for managed endpoint and OT devices, the executives write in the blog.

In addition, Microsoft is introducing a dedicated native integration for Microsoft 365 Defender customers designed to make enterprise IoT security more accessible, helping customers discover and secure IoT devices within Microsoft 365 Defender environments.

According to the blog, attackers have been observed scanning for unsecure, unmanaged IoT devices with default login credentials, gaining access to a network-connected camera, identifying other devices with exploitable vulnerabilities, harvesting network credentials, and moving laterally to leak documents, exfiltrate data or deploy malware.

The new capabilities in Defender for IoT will allow IT to use the existing Defender for Endpoint clients to gain visibility into devices deployed on the network without additional deployment or configuration via a deployable network sensor that can collect all network data it needs for discovery, behavioral analytics and machine learning, according to Microsoft.

With an understanding of the IoT devices in their environment, admins can use Defender for IoT to stay on top of misconfigured and unpatched devices. Defender for IoT will assess all of an enterprise’s IoT devices and offer recommendations in the Microsoft 365 console on how to fix any issues. Identification and risk assessments will run continuously as new IoT devices are added to the network.

Defender for IoT will apply the company’s machine learning and threat intelligence obtained from trillions of signals collected across the Microsoft ecosystem to help reduce the alert signal to noise ratio by prioritizing incidents that render end-to-end attacks in complete context rather than providing a long list of uncorrelated attacks, the company says.

The company says Defender for IoT remains a major component of its SIEM and XDR solutions.

“Through native integration with Microsoft Defender and Microsoft Sentinel, we can provide customers with the automation and visualization tools they need to address attacks crossing IT and OT network boundaries. These integrations also empower analysts to perform incident response holistically rather than as separate disconnected attacks that require extensive manual investigations to bring together. With these efficiency gains, organizations can stop attacks and bring their environments back to a pre-breach state far more quickly,” Microsoft executives wrote in the blog.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: IoT, Microsoft

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.