Device Security
Legacy IoT Security
Table of Contents
Expand All
|
Collapse All
Device Security Docs
Legacy IoT Security
Manually send vulnerabilities from the Device Security portal
through Cortex XSOAR to Nuvolo to make work orders.
- Navigate to VulnerabilitiesVulnerability OverviewAll Vulnerabilities, click a vulnerability name, and then select the check box of a vulnerability instance.Click MoreSend toNuvolo.The Send to Nuvolo panel appears.Enter a priority number using the priority numbering system in Nuvolo and add a comment.After you’ve configured these required settings, the Send button changes from gray to blue, indicating that you can proceed.Click Send.After you click Send, a link appears. When you click it, a new browser window opens to the XSOAR playbook for this action.To confirm that the vulnerability was sent, click the link to the XSOAR playbook for this action.For the link in Device Security to open the corresponding playbook in Cortex XSOAR, you must already be logged in to your XSOAR instance before clicking it.The green boxes in the playbook indicate that a particular step was successfully performed. Following the path through the playbook gives you feedback about whether an action was carried out successfully or, if not, where the process changed course.Also, the action “Sent to Nuvolo” appears in the Vulnerability Responses column. If you don’t see this column, click the Columns icon (Log in to Nuvolo and check the Security Queue for receiving security incidents from Device Security.You can also send a vulnerability to Nuvolo from the Vulnerabilities section of the Device Details page.