Skip to content

Commit 15fba42

Browse files
authored
Merge pull request #285713 from tarTech23/vul
VM overview
2 parents 59c7caf + d2ae176 commit 15fba42

File tree

2 files changed

+27
-0
lines changed

2 files changed

+27
-0
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@
4242
displayName: users, user
4343
- name: Device inventories
4444
href: device-inventory.md
45+
- name: Vulnerability management
46+
href: vulnerability-management.md
4547
- name: Alerts
4648
href: alerts.md
4749
- name: Zero Trust and your OT/IoT networks
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Vulnerability management for Microsoft Defender for IoT in the Azure portal
3+
description: Learn about vulnerability management for Microsoft Defender for IoT in the Azure portal.
4+
ms.topic: concept-article
5+
ms.date: 09/03/2024
6+
ms.custom: enterprise-iot
7+
---
8+
9+
# Vulnerability management in the Azure portal
10+
11+
With vulnerability management, Microsoft Defender for IoT in the Azure portal provides extended coverage for Operational Technology (OT) networks, which identify security vulnerabilities in OT network devices.
12+
13+
The OT security administrator views vulnerability data, such as Common Vulnerabilities and Exposures (CVE) details and a CVSS score, in the device inventory, workbooks and security recommendations for each device. The administrator can then proactively manage network exposure based on the vulnerability details and recommended remediation actions.
14+
15+
Defender for IoT provides vulnerability coverage for [supported OT vendors](resources-manage-proprietary-protocols.md) where Defender for IoT can detect firmware models and firmware versions. Vulnerability data is based on the repository of standards-based vulnerability data documented in the US government National Vulnerability Database (NVD) and is displayed with its CVE details and description.
16+
17+
## Vulnerability management capabilities
18+
19+
The key vulnerability management capabilities are:
20+
21+
| Capability | Description |
22+
| --- | ---|
23+
| [Device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details)| The Device inventory displays the current vulnerabilities detected on each device. |
24+
| [Workbooks](workbooks.md#view-workbooks) | Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively. |
25+
| [Security Recommendations](recommendations.md#supported-security-recommendations) | OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is named **Secure your vulnerable `vendor` devices**.<br><br>The recommendations are based on the device vendor or Cybersecurity & Infrastructure Agency (CISA) and list the remediation steps needed to improve the security of the network. |

0 commit comments

Comments
 (0)