See How Cyber Incident Response Works in Axonius
Step 1: Identify impacted devices
Identify all devices impacted by a specific vulnerability (in this example, a Log4j CVE), based on the software version.
Step 2: Visualize scope with dashboards
Incident response dashboards give security teams at-a-glance device data to understand the scope of this vulnerability across all devices.
Step 3: Map users to risk
Understand users associated with impacted devices, including “higher risk” users.
Step 4: Filter device details
Utilize dashboard filters to identify the details for a specific device or user impacted by the vulnerability — in this example, details like device model, device manufacturer, device power state etc.
Step 5: Locate remediation tools
Identify where the right tools exist to remediate assets with this vulnerability — in this example, Microsoft Endpoint Configuration Manager.
Step 6: Automate remediation workflows
Using the Action Center in Axonius, create a workflow that notifies a user about the vulnerability → then creates a ticket → then deploys a command that includes a fix to remediate the vulnerability. Different assets may have different remediation paths.