Send Work Orders to AIMS

Send security alerts and vulnerabilities from IoT Security as work orders to AIMS.
  1. Log in to IoT Security and find a device with an asset tag that has a security alert or vulnerability.
    AIMS only accepts work orders for devices that are in its system and that it can identify by its asset tag.
    1. To see which devices have asset tags, click the column picker icon ( )to show the Asset Tag column if it’s hidden.
    2. Click the Asset Tag column heading to sort devices alphanumerically by asset tags. (Clicking a second time reverses their order and clicking a third time returns to the default sorting order by data.)
    3. Look among the devices with asset tags for one that’s impacted by a security alert or vulnerability for which you want to create a work order. Those with higher risk scores are likely to have alerts or vulnerabilities associated with them.
    4. Note the device name and the related alert or vulnerability.
  2. Generate a work order in the IoT Security portal from a security alert or vulnerability and send it to AIMS.
    1. To create a work order for a security alert, click
      Alerts
      Security Alerts
      , select the security alert for the impacted device you noted on the Devices page, and then click
      More
      Send to
      AIMS
      .
      or
      To create a work order for a vulnerability, click
      Risks
      Vulnerabilities
      , click the name of the vulnerability you noted earlier, select the device name in the Instances column, and then click
      More
      Send to
      AIMS
      .
      The Send to AIMS dialog box appears.
    2. Choose someone to assign the work order to in the Assign to list, choose a severity level in the Priority list, and enter a note in the Add Comments field.
      After you’ve configured these three required settings, the Send button changes from gray to blue, indicating that you can proceed.
    3. Send
      the work order to AIMS.
    4. To confirm that the work order was sent, refresh the Security Alerts or Vulnerability Details page and hover your cursor over the entry in the Last Action column for the alert or the Vulnerability Responses column for the vulnerability instance for which you sent a work order.

Recommended For You