Skip to content

Commit 2ebd8ad

Browse files
committed
fiX
1 parent 317ec1c commit 2ebd8ad

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/defender-for-iot/organizations/vulnerability-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,4 +42,4 @@ The key vulnerability management capabilities are:
4242
| --- | ---|
4343
| [Device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details)| The Device inventory displays the current vulnerabilities detected on each device. |
4444
| [Workbooks](workbooks.md#view-workbooks) | Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively. |
45-
| [Security Recommendations](recommendations.md#supported-security-recommendations) | OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is named **Secure your vulnerable <vendor> devices**.<br><br>The recommendations are based on the device vendor or Cybersecurity & Infrastructure Agency (CISA) and list the remediation steps needed to improve the security of the network. |
45+
| [Security Recommendations](recommendations.md#supported-security-recommendations) | OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is named **Secure your vulnerable `vendor` devices**.<br><br>The recommendations are based on the device vendor or Cybersecurity & Infrastructure Agency (CISA) and list the remediation steps needed to improve the security of the network. |

0 commit comments

Comments
 (0)