Skip to content

Commit 39d7d0a

Browse files
committed
toc fix
1 parent b29488f commit 39d7d0a

File tree

2 files changed

+13
-7
lines changed

2 files changed

+13
-7
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242
displayName: users, user
4343
- name: Device inventories
4444
href: device-inventory.md
45-
- name: Vulnerability-management
45+
- name: Vulnerability management
4646
href: vulnerability-management.md
4747
- name: Alerts
4848
href: alerts.md

articles/defender-for-iot/organizations/vulnerability-management.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Vulnerability management for Microsoft Defender for IoT in the Azure portal
33
description: Learn about vulnerability management for Microsoft Defender for IoT in the Azure portal.
44
ms.topic: concept-article
5-
ms.date: 03/25/2024
5+
ms.date: 09/03/2024
66
ms.custom: enterprise-iot
77
---
88

9-
# Overview of vulnerability management in the Azure portal
9+
# Vulnerability management in the Azure portal
1010

1111
With vulnerability management, Microsoft Defender for IoT in the Azure portal provides extended coverage for Operational Technology (OT) networks, which identify security vulnerabilities in OT network devices.
1212

@@ -16,14 +16,20 @@ Defender for IoT provides vulnerability coverage for [supported OT vendors](reso
1616

1717
## Vulnerabilities in the Device inventory
1818

19-
The Device inventory displays the current vulnerabilities detected on each device. For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
19+
The Device inventory displays the current vulnerabilities detected on each device.
20+
21+
For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
2022

2123
## Vulnerability management workbook
2224

23-
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively. For more information, see [view workbooks](workbooks.md#view-workbooks).
25+
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively.
26+
27+
For more information, see [view workbooks](workbooks.md#view-workbooks).
2428

2529
## Vulnerability based security recommendations
2630

27-
OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is called **Secure your vulnerable <vendor> devices**.
31+
OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is named **Secure your vulnerable <vendor> devices**.
32+
33+
The recommendations are based on the device vendor or Cybersecurity & Infrastructure Agency (CISA) and list the remediation steps needed to improve the security of the network.
2834

29-
The recommendations are based on the device vendor or CISA (Cybersecurity & Infrastructure Agency) and list the remediation steps needed to improve the security of the network. For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).
35+
For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).

0 commit comments

Comments
 (0)