Skip to content

Commit b29488f

Browse files
committed
review meir
1 parent fdc6860 commit b29488f

File tree

1 file changed

+7
-11
lines changed

1 file changed

+7
-11
lines changed
Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,29 @@
11
---
22
title: Vulnerability management for Microsoft Defender for IoT in the Azure portal
3-
description: Learn about vulnerabiltity management for Microsoft Defender for IoT in the AAzure portal.
3+
description: Learn about vulnerability management for Microsoft Defender for IoT in the Azure portal.
44
ms.topic: concept-article
55
ms.date: 03/25/2024
66
ms.custom: enterprise-iot
77
---
88

99
# Overview of vulnerability management in the Azure portal
1010

11-
With vulnerability management, Microsoft Defender for IoT in the Azure portal provides extended coverage for OT networks, gathers OT device data into one place, and displays the data with the other devices on your network.<!-- I dont agree with this sentence. Is it focusing on VM or D4IoT? THe VM: With vulnerability management, Microsoft Defender for IoT in the Azure portal proivides extended security coverage of OT networks, by identifying security weakness in the network(Better way to write this without using the word vulnerability?) gathering the data to be analyzed and displays individualized device data. -->
12-
13-
Meir - can I rewrite this intro as follows:
14-
15-
With vulnerability management, Microsoft Defender for IoT in the Azure portal proivides extended security coverage of OT networks, by identifying security weakness in the network(Better way to write this without using the word vulnerability?) gathering the data to be analyzed and displays individualized device data.
11+
With vulnerability management, Microsoft Defender for IoT in the Azure portal provides extended coverage for Operational Technology (OT) networks, which identify security vulnerabilities in OT network devices.
1612

1713
The OT security administrator proactively manages network exposure based on the vulnerability details and recommended remediation actions. The vulnerability data is displayed in the device inventory, workbooks and in the security recommendations for each device.
1814

19-
## Vulnerabilities in the Device inventory
15+
Defender for IoT provides vulnerability coverage for [supported OT vendors](resources-manage-proprietary-protocols.md) where Defender for IoT can detect firmware models and firmware versions. Vulnerability data is based on the repository of standards-based vulnerability data documented in the US government National Vulnerability Database (NVD) and is displayed with its Common Vulnerabilities and Exposures (CVE) details and description.
2016

21-
The Device inventory displays the current vulnerabiltiies detected on each device. For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
17+
## Vulnerabilities in the Device inventory
2218

23-
Defender for IoT provides vulnerability coverage for [supported OT vendors](resources-manage-proprietary-protocols.md) where Defender for IoT can detect firmware models and firmware versions. Vulnerability data is based on the repository of standards-based vulnerability data documented in the US government National Vulnerability Database (NVD) and is displayed with its CVE details and description.
19+
The Device inventory displays the current vulnerabilities detected on each device. For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
2420

2521
## Vulnerability management workbook
2622

2723
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively. For more information, see [view workbooks](workbooks.md#view-workbooks).
2824

2925
## Vulnerability based security recommendations
3026

31-
OT devices listed in the Device inventory will suggest security recommendations for any critically severe vulnerability detected on it. The vulnerability recommendation is called **Secure your vulnerable <vendor> devices**.
27+
OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is called **Secure your vulnerable <vendor> devices**.
3228

33-
The recommendations are based on the device vendor or CISA (Cybersecurity & Infrastructure Agency) and will list the remediation steps needed to improve the security of the network. For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).
29+
The recommendations are based on the device vendor or CISA (Cybersecurity & Infrastructure Agency) and list the remediation steps needed to improve the security of the network. For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).

0 commit comments

Comments
 (0)