Skip to content

Commit 317ec1c

Browse files
committed
table
1 parent 39d7d0a commit 317ec1c

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

articles/defender-for-iot/organizations/vulnerability-management.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,3 +33,13 @@ OT devices listed in the Device inventory contain suggested security recommendat
3333
The recommendations are based on the device vendor or Cybersecurity & Infrastructure Agency (CISA) and list the remediation steps needed to improve the security of the network.
3434

3535
For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).
36+
37+
## Vulnerability management capabilities
38+
39+
The key vulnerability management capabilities are:
40+
41+
| Capability | Description |
42+
| --- | ---|
43+
| [Device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details)| The Device inventory displays the current vulnerabilities detected on each device. |
44+
| [Workbooks](workbooks.md#view-workbooks) | Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively. |
45+
| [Security Recommendations](recommendations.md#supported-security-recommendations) | OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is named **Secure your vulnerable <vendor> devices**.<br><br>The recommendations are based on the device vendor or Cybersecurity & Infrastructure Agency (CISA) and list the remediation steps needed to improve the security of the network. |

0 commit comments

Comments
 (0)