You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/vulnerability-management.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,11 @@
2
2
title: Vulnerability management for Microsoft Defender for IoT in the Azure portal
3
3
description: Learn about vulnerability management for Microsoft Defender for IoT in the Azure portal.
4
4
ms.topic: concept-article
5
-
ms.date: 03/25/2024
5
+
ms.date: 09/03/2024
6
6
ms.custom: enterprise-iot
7
7
---
8
8
9
-
# Overview of vulnerability management in the Azure portal
9
+
# Vulnerability management in the Azure portal
10
10
11
11
With vulnerability management, Microsoft Defender for IoT in the Azure portal provides extended coverage for Operational Technology (OT) networks, which identify security vulnerabilities in OT network devices.
12
12
@@ -16,14 +16,20 @@ Defender for IoT provides vulnerability coverage for [supported OT vendors](reso
16
16
17
17
## Vulnerabilities in the Device inventory
18
18
19
-
The Device inventory displays the current vulnerabilities detected on each device. For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
19
+
The Device inventory displays the current vulnerabilities detected on each device.
20
+
21
+
For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
20
22
21
23
## Vulnerability management workbook
22
24
23
-
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively. For more information, see [view workbooks](workbooks.md#view-workbooks).
25
+
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively.
26
+
27
+
For more information, see [view workbooks](workbooks.md#view-workbooks).
24
28
25
29
## Vulnerability based security recommendations
26
30
27
-
OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is called **Secure your vulnerable <vendor> devices**.
31
+
OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is named **Secure your vulnerable <vendor> devices**.
32
+
33
+
The recommendations are based on the device vendor or Cybersecurity & Infrastructure Agency (CISA) and list the remediation steps needed to improve the security of the network.
28
34
29
-
The recommendations are based on the device vendor or CISA (Cybersecurity & Infrastructure Agency) and list the remediation steps needed to improve the security of the network. For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).
35
+
For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).
0 commit comments