Skip to content

Commit ddabe63

Browse files
committed
draft2
1 parent fcdc40d commit ddabe63

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

articles/defender-for-iot/organizations/vulnerability-management.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,5 +12,16 @@ With vulnerability management, Microsoft Defender for IoT in the Defender portal
1212

1313
The OT security administrator proactively manages network exposure based on the vulnerability details and recommended remediation actions.
1414

15+
## Vulnerabilities in the device inventory
1516

17+
The device inventory displays the current vulnerabiltiies specific to each device. For more information, see [device inventory](how-to-manage-device-inventory-for-organizations.md#view-full-device-details).
1618

19+
Displays current vulnerabilities specific to the device. Defender for IoT provides vulnerability coverage for [supported OT vendors](resources-manage-proprietary-protocols.md) where Defender for IoT can detect firmware models and firmware versions.<br><br>Vulnerability data is based on the repository of standards-based vulnerability data documented in the US government National Vulnerability Database (NVD). Select the CVE name to see the CVE details and description. <br><br>**Tip**: View vulnerability data across your network with the [Defender for IoT Vulnerability workbook](workbooks.md#view-workbooks).
20+
21+
## Vulnerability management workbook
22+
23+
Data about the vulnerabilities detected on OT devices is available using the **Vulnerabilities** workbook. For more information, see [view workbooks](workbooks.md#view-workbooks).
24+
25+
## Vulnerability based security recommendations
26+
27+
OT devices listed in the Device inventory will suggest security recommendations for any critically severe vulnerability detected on it. The vulnerability recommendation is called **Secure your vulnerable <vendor> devices**. The recommendations are based on the device vendor or CISA (Cybersecurity & Infrastructure Agency) and will list the remediation steps needed to secury the network. For more information, see [supported security recommendations](recommendations.md#supported-security-recommendations).

0 commit comments

Comments
 (0)