![]() The risk score and rating take the vulnerability information and configuration item into account. Image 4: Overview of Microsoft threat and vulnerability management security recommendationsĪs part of the remediation workflow, ServiceNow VR prioritizes vulnerabilities using asset and business context, along with vulnerability risk scores. Image 3: Overview of ingested vulnerable items The included timeline shows performance metrics over the same period. Image 2 shows an all-up integration run status and details of how much data has been ingested over the last 30 days. Image 2: Integration run status dashboard Some of the available views include vulnerability groups, vulnerable items, and security recommendations taken directly from Microsoft threat and vulnerability management. Once ServiceNow VR has ingested information from Microsoft threat and vulnerability management, security teams can start with a top-level view of the ingested data or dive deep using various views. ![]() ![]() The diagram above shows the import of vulnerability assessment content from Microsoft threat and vulnerability management into ServiceNow VR to orchestrate the remediation workflow of vulnerabilities. ![]() Image 1: Vulnerability Response Workflow Diagram The integration leverages standard Vulnerability Response data import and CI reconciliation methods. It syncs these findings into VR tables and data structures, where vulnerabilities are matched against existing assets in your CMDB or creates a new Configuration Item (CI) if no match is found. ServiceNow’s VR module ingests asset information, data of open and fixed vulnerabilities, as well as recommendations from Microsoft threat and vulnerability management. The integration between these two products gives customers more flexibility in managing the end- to-end workflow of their vulnerability management program and aims to: That’s why we are excited to announce the general availability of a new integration between Microsoft threat and vulnerability management and ServiceNow Vulnerability Response (VR). At Microsoft, we believe that when these solutions work well together, customers benefit and can build stronger defenses. Most enterprises rely on a multitude of vendors, security solutions, and IT tools to combat advanced cyber-attacks.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |