You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/vulnerability-management.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,20 +8,22 @@ ms.custom: enterprise-iot
8
8
9
9
# Overview of vulnerability management in the Azure portal
10
10
11
-
With vulnerability management, Microsoft Defender for IoT in the Defender portal provides extended coverage for OT networks, gathers OT device data into one place, and displays the data with the other devices on your network.
11
+
With vulnerability management, Microsoft Defender for IoT in the Azure portal provides extended coverage for OT networks, gathers OT device data into one place, and displays the data with the other devices on your network.<!-- I dont agree with this sentence. Is it focusing on VM or D4IoT? THe VM: With vulnerability management, Microsoft Defender for IoT in the Azure portal proivides extended security coverage of OT networks, by identifying security weakness in the network(Better way to write this without using the word vulnerability?) gathering the data to be analyzed and displays individualized device data. -->
12
12
13
-
The OT security administrator proactively manages network exposure based on the vulnerability details and recommended remediation actions.
13
+
The OT security administrator proactively manages network exposure based on the vulnerability details and recommended remediation actions. The vulnerability data is displayed in the device inventory, workbooks and in the security recommendations for each device.
14
14
15
-
## Vulnerabilities in the device inventory
15
+
## Vulnerabilities in the Device inventory
16
16
17
-
The device inventory displays the current vulnerabiltiies specific to each device. For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
17
+
The Device inventory displays the current vulnerabiltiies detected on each device. For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
18
18
19
-
Displays current vulnerabilities specific to the device. Defender for IoT provides vulnerability coverage for [supported OT vendors](resources-manage-proprietary-protocols.md) where Defender for IoT can detect firmware models and firmware versions.<br><br>Vulnerability data is based on the repository of standards-based vulnerability data documented in the US government National Vulnerability Database (NVD). Select the CVE name to see the CVE details and description. <br><br>**Tip**: View vulnerability data across your network with the [Defender for IoT Vulnerability workbook](workbooks.md#view-workbooks).
19
+
Defender for IoT provides vulnerability coverage for [supported OT vendors](resources-manage-proprietary-protocols.md) where Defender for IoT can detect firmware models and firmware versions.Vulnerability data is based on the repository of standards-based vulnerability data documented in the US government National Vulnerability Database (NVD) and is displayed with its CVE details and description.
20
20
21
21
## Vulnerability management workbook
22
22
23
-
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. For more information, see [view workbooks](workbooks.md#view-workbooks).
23
+
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively. For more information, see [view workbooks](workbooks.md#view-workbooks).
24
24
25
25
## Vulnerability based security recommendations
26
26
27
-
OT devices listed in the Device inventory will suggest security recommendations for any critically severe vulnerability detected on it. The vulnerability recommendation is called **Secure your vulnerable <vendor> devices**. The recommendations are based on the device vendor or CISA (Cybersecurity & Infrastructure Agency) and will list the remediation steps needed to secury the network. For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).
27
+
OT devices listed in the Device inventory will suggest security recommendations for any critically severe vulnerability detected on it. The vulnerability recommendation is called **Secure your vulnerable <vendor> devices**.
28
+
29
+
The recommendations are based on the device vendor or CISA (Cybersecurity & Infrastructure Agency) and will list the remediation steps needed to improve the security of the network. For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).
0 commit comments