Summary
In this exercise, you have learned how to:
- Identify vulnerable devices across the entire environment, based on CVE information
- Create automated remediation, based on CVE vulnerabilities
- Use automation logs to monitor the execution of automation
- Use dashboard to track CVE remediation
For additional information about Workspace ONE Intelligence, check out the VMware Workspace ONE Intelligence page at https://www.vmware.com/products/workspace-one/intelligence.html.
0 Comments
Add your comment