Use the Vulnerability Management feature in the Marketplace > Solutions area of Workspace ONE Intelligence to view and interact with vulnerability data, trend widgets, and CVE lists for your managed devices.
Solutions are workspaces that gather all the necessary objects for a feature into a single area in Workspace ONE Intelligence. Solutions can include widgets and processes from dashboards, workflows, and reports so you can view the health of features and analyze them, find issues, and fix them.
Find the Vulnerability Management are in Marketplace > Solutions > Vulnerability Management.
The Vulnerability Management solution works for Windows devices.
Vulnerability Management combines and displays information from Workspace ONE UEM and from third-party reporting services that report security data.
SLAs help you prioritize patch installations and their subsequent KBs. Depending on the security protocols set by your organization, you can set the priority level for installing patches depending on the CVSS score.
For example, if your organization considers CVSS scores ranging from 4.4 to 6.5 as high risk but not critical to the health of your device deployment, you can configure to agree to remediate 50% of devices impacted by a CVE having a score in the 4.4 to 6.5 range within 5 days. You can change the CVSS ranges on the range slider if the default ranges do not match your organization’s security protocols.
Workspace ONE Intelligence uses SLA configurations to visualize the health of the patching progress in the SLA Patch Target widget in every CVE.
Your SLA configurations control the displayed data in the SLA Patch Target widget. View the widget to know if a patching process is healthy or needs troubleshooting.
When you first configure the Vulnerability Management solution, you can configure SLAs in the Input Patching SLAs wizard. Use the Settings area in the Vulnerability Management solution to edit your SLA configurations.
Workspace ONE Intelligence displays a KB Install Trend widget in every CVE. Use this widget to view the progression of KB installations for all impacted devices over time. For example, if 5 devices require a CVE, you can look at the KB Install Trend in that CVE record to see how many devices have received which KBs by a certain date. If the widget shows 3 devices have installed the KBs by today’s date, you know you have 2 vulnerable devices that need the KBs installed. You can take the appropriate action to protect the 2 devices.