Summary

In this exercise, you have learned how to:

  • Identify vulnerable devices across the entire environment, based on CVE information
  • Create automated remediation, based on CVE vulnerabilities
  • Use automation logs to monitor the execution of automation
  • Use dashboard to track CVE remediation

For additional information about Workspace ONE Intelligence, check out the VMware Workspace ONE Intelligence page at https://www.vmware.com/products/workspace-one/intelligence.html.

0 Comments

Add your comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.