In this exercise, you have learned how to:

  • Identify vulnerable devices across the entire environment, based on CVE information
  • Create automated remediation, based on CVE vulnerabilities
  • Use automation logs to monitor the execution of automation
  • Use dashboard to track CVE remediation

For additional information about Workspace ONE Intelligence, check out the VMware Workspace ONE Intelligence page at


Add your comment

E-Mail me when someone replies to this comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.