Skip to content

Commit d2ae176

Browse files
committed
change
1 parent 2ebd8ad commit d2ae176

File tree

1 file changed

+2
-22
lines changed

1 file changed

+2
-22
lines changed

articles/defender-for-iot/organizations/vulnerability-management.md

Lines changed: 2 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -10,29 +10,9 @@ ms.custom: enterprise-iot
1010

1111
With vulnerability management, Microsoft Defender for IoT in the Azure portal provides extended coverage for Operational Technology (OT) networks, which identify security vulnerabilities in OT network devices.
1212

13-
The OT security administrator proactively manages network exposure based on the vulnerability details and recommended remediation actions. The vulnerability data is displayed in the device inventory, workbooks and in the security recommendations for each device.
13+
The OT security administrator views vulnerability data, such as Common Vulnerabilities and Exposures (CVE) details and a CVSS score, in the device inventory, workbooks and security recommendations for each device. The administrator can then proactively manage network exposure based on the vulnerability details and recommended remediation actions.
1414

15-
Defender for IoT provides vulnerability coverage for [supported OT vendors](resources-manage-proprietary-protocols.md) where Defender for IoT can detect firmware models and firmware versions. Vulnerability data is based on the repository of standards-based vulnerability data documented in the US government National Vulnerability Database (NVD) and is displayed with its Common Vulnerabilities and Exposures (CVE) details and description.
16-
17-
## Vulnerabilities in the Device inventory
18-
19-
The Device inventory displays the current vulnerabilities detected on each device.
20-
21-
For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
22-
23-
## Vulnerability management workbook
24-
25-
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. Workbooks are pages created by Microsoft and provided out-of-the-box, which contain graphs and charts to display your data and help you analyze the data more effectively.
26-
27-
For more information, see [view workbooks](workbooks.md#view-workbooks).
28-
29-
## Vulnerability based security recommendations
30-
31-
OT devices listed in the Device inventory contain suggested security recommendations for any critically severe vulnerability detected for top OT vendors. The vulnerability recommendation is named **Secure your vulnerable <vendor> devices**.
32-
33-
The recommendations are based on the device vendor or Cybersecurity & Infrastructure Agency (CISA) and list the remediation steps needed to improve the security of the network.
34-
35-
For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).
15+
Defender for IoT provides vulnerability coverage for [supported OT vendors](resources-manage-proprietary-protocols.md) where Defender for IoT can detect firmware models and firmware versions. Vulnerability data is based on the repository of standards-based vulnerability data documented in the US government National Vulnerability Database (NVD) and is displayed with its CVE details and description.
3616

3717
## Vulnerability management capabilities
3818

0 commit comments

Comments
 (0)