Discover and manage devices

Microsoft Defender for IoT in the Microsoft Defender portal includes the device inventory, which helps you identify details about specific OT devices. Gathering details about your devices helps your teams proactively investigate vulnerabilities that can compromise your most critical assets. This article describes how to discover and manage your devices in the device inventory. You can filter data in the inventory, explore the inventory, investigate device details, and more.

Learn more about the benefits of OT device discovery.

Important

This article discusses Microsoft Defender for IoT in the Defender portal (Preview).

If you're an existing customer working on the classic Defender for IoT portal (Azure portal), see the Defender for IoT on Azure documentation.

Learn more about the Defender for IoT management portals.

Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.

Access the Device inventory page

Access the Device inventory page by selecting Devices from the Assets navigation menu in the Microsoft Defender portal.

Prerequisites

Review the Defender for IoT prerequisites.

Note

If you don't yet have a Defender for IoT license, the Device inventory page lists OT devices without security data. For example, the device name, IP, and category are visible, while the risk level isn't visible. The device inventory also displays a note at the top of the page that indicates the number of unprotected OT devices.

In this case, onboard Defender for IoT to get security value for your OT devices.

View OT devices

View OT devices as part of the device inventory.

To customize the device inventory views:

Note

Currently, devices discovered in the Defender XDR portal aren't synchronized with Azure, and therefore the list of devices discovered could be different in each portal.

Manage OT devices

Next steps

Prioritize and remediate vulnerabilities