This product pack has a set of instructions that can help in vulnerability management in an environment. This could be used to perform operations such as a vulnerability scan or deploying security patches in the environment.
A system administrator has been informed by his/her boss that a security audit is due next month, and he/she needs to ensure that all the devices in the environment will meet the security compliance standard set by the auditing organization. The system administrator could use these instructions to achieve the desired goal.
List the end-user devices which are potentially vulnerable to the REvil/Sodinokibi ransomware
Check if endpoint is potentially vulnerable to the Sodinokibi malware
Auto-generates links to the NVD database to identify CPE for each installation, to allow a search for CVE vulnerability listings.
List software installed with links to NVD for vulnerability assessment.
Report on Required Patches and Vulnerabilities, comparing Required CVE:KB map to device Relevant patch status. Refresh Relevant status from the patch source first, if it has not already been refreshed today. @patch
Report on Required Patches and Vulnerabilities, comparing Required CVE:KB map to device Relevant patch status. Refresh Relevant status from %PatchSource% first, if it has not already been refreshed today.