Getting Started with Workspace ONE Intelligence Reports and Dashboards: Workspace ONE Operational Tutorial
Overview
VMware provides this operational tutorial to help you with your VMware Workspace ONE® environment. In this tutorial, explore the basics of VMware Workspace ONE® Intelligence™. Learn how to enable Workspace ONE Intelligence, use reports to gain insights, and use dashboards to help visualize data and enforce device compliance.
Additionally, learn how to automate patch remediation for Windows devices based on missing critical OS patches and CVEs (common vulnerabilities and exposures).
Audience
This operational tutorial is intended for IT professionals and Workspace ONE UEM administrators of existing production environments.
Knowledge of additional technologies such as device management, analytics, APIs and VMware Workspace ONE® UEM is also helpful.
Getting Started with Workspace ONE Intelligence
Workspace ONE Intelligence is designed to simplify user experience without compromising security. The intelligence service aggregates and correlates data from multiple sources to give complete visibility into the entire environment.
In this exercise, you opt-in to Workspace ONE Intelligence, retrieve the API service key, and integrate Workspace ONE Intelligence Automation Connectors with Workspace ONE UEM.
Prerequisites
Before you can perform the procedures in this activity, ensure you have the following components installed and configured:
- Workspace ONE UEM 2005 or later – contact your support representative if Workspace ONE Intelligence Reports is not enabled in your environment.
- For Workspace ONE UEM on-premises environments, you must install the Workspace ONE Intelligence Connector.
- Customer-level Organization Group.
- Admin role with Intelligence permissions. For more information, see Admin Roles
- Notepad ++ with word wrap enabled (In Notepad++, select View > Word wrap).
This activity requires certain account credentials. Note the account information in the following table. The details provided in this table are based on a test environment. Your user account details will differ.
Workspace ONE UEM Credentials |
|
Base URL | |
API Username | |
API Password | |
Username | |
Password | |
Logging in to the Workspace ONE UEM Console
To log in to the Workspace ONE UEM console, perform the following steps:
- Navigate to the environment URL of your Workspace ONE UEM console. For example, https://test.awmdm.com.
- Enter your username and password for the environment then click Log In.
For more information, see Logging in to the Console.
Accessing Workspace ONE Intelligence
After you have met the requirements, you are ready to enable Workspace ONE Intelligence.
- In the Workspace ONE UEM console, navigate to Monitor > Intelligence.
- Select Opt-in, and select Launch after installing the Workspace ONE Intelligence Connector service.
For more details, see Access Workspace ONE Intelligence.
If you already have an Intelligence environment enabled and data already flowing in, skip to the next activity.
Retrieving the Workspace ONE UEM API Key
After you have accessed Workspace ONE Intelligence, you can retrieve the Workspace ONE UEM API key.
- In the Workspace ONE UEM console, navigate to Groups & Settings > All Settings > System > Advanced > API > REST API.
- Copy the APIserver key to Notepad++.
Logging in to the Workspace ONE Intelligence Console
To perform most of the steps in this tutorial, you must log in to the Workspace ONE Intelligence console. Now that you have opted-in to the service, you can launch the Intelligence console from the Workspace ONE UEM console.
- From the Workspace ONE UEM console, navigate to Monitor > Intelligence and click Launch.
Note: You can launch Workspace ONE Intelligence only from a Customer type Organization Group. If you select a non-customer type Organization Group in the Workspace ONE UEM Console, the Monitor menu option will not be available. - Confirm that the Workspace ONE Intelligence console is open.
Integrating Workspace ONE Intelligence Automation Connectors
After retrieving the AirWatch API service key, you are ready to integrate Workspace ONE Intelligence Automation Connectors with Workspace ONE UEM.
To take full advantage of Workspace ONE Intelligence, you need to configure at least one Automation Connector to enable Automation Actions in your environment.
Among the multiple available Connectors, the Workspace ONE UEM connector is key, as it enables Intelligence Automation to take actions against your organization's devices, apps, and OS updates.
Follow steps to set up Integrations in Workspace ONE Intelligence which will allow API communication between Workspace ONE Intelligence and Workspace ONE UEM.
Using Reports to Gain Insights
After enabling Workspace ONE Intelligence, you are ready to explore its basic capabilities. In this exercise, you learn how to create reports that can mitigate issues, drive business decisions, and automatically share information with other departments.
Prerequisites
Before you can perform the procedures in this activity, you must meet the following requirements:
- Complete enrollment for one of the following devices:
Creating Reports
In this activity, explore reporting capabilities by creating a report for enrolled devices. You will use a predefined template. For complete control of the report, use the Custom Report template to define your own criteria.
- In the Workspace ONE Intelligence console, click Reports.
- If this is your first time accessing the Reports section, click Get Started.
- Click Add > From Template.
- To select the Enrolled Devices template:
- Select Devices and then select the Status tag.
- Click Start for the Enrolled Devices template. Selecting this template creates a report about enrolled devices that displays data in pre-defined columns.
- To add a filter, perform the following steps:
- Under Filters, click the + icon to add a new filter.
- Enter
platform
in the first search field. - Select Platform under Devices from the drop-down menu that appears.
- Select Includes from the Search for value drop-down menu.
- Select Apple iOS, Android, and Windows Desktop from the final drop-down menu.
Note: You can manually type each platform name and press Enter to add them to the list.
The platform list is based on devices available in your environment, so you might not see all three requested platforms in this activity.
- Scroll down to the Report Preview section and click Refresh Preview. Observe how your currently enrolled devices automatically populate in the preview.
Note: The screenshot shown is from a test environment. Your report preview is based on your environment and will differ from the preview you see in the screenshot. - To add report columns, perform the following steps:
- Under Report Preview, click the Edit Columns button.
- Scroll down to find the Devices section.
Tip: You can click the arrows next to App Feedback and Apps to collapse these sections. - Under Available Columns, select the following:
- Available Device Storage Capacity
- Available Physical Memory
- BIOS Version
- Battery Percent
- Click Add.
- Click Save.
To change the column order on the report, use the Up and Down buttons.
- Click Save to save the report.
- After the report saves, it is added to a list of available reports. Select the report that you want to review.
- From this view, you can configure additional management settings:
For more details, see Reports for Workspace ONE Intelligence.
Downloading Reports
After saving a report, you can almost immediately download it as a CSV file. In this activity, you download the CSV file for the Enrolled Devices report.
- To access the report's available downloads, select the Downloads tab.
- On the Downloads tab, click the Refresh icon and verify that the status is
Completed
. - Click Download.
- Validate that a CSV of the Enrolled Devices report is downloaded.
Scheduling Reports
After saving a report, you can use scheduling to automate data collection and collaboration. In this activity, schedule the Enrolled Devices report to run on a monthly basis.
- Select Schedules and click Add.
- Configure the report schedule.
The following is an example:- Enter a Schedule Name. For example,
Windows, Android, and Apple Enrolled Devices
. - For Recurrence, select Monthly.
- For Day of the Month, select 1.
- For Starts At, enter 08:00 AM.
- For Ends, select a future date such as 06/30/2028.
- Click Schedule.
- Enter a Schedule Name. For example,
- On the Schedules tab, confirm that the schedule matches the parameters you defined.
- To delete a report schedule, select the report and click Delete.
Using Dashboards to Visualize Data
Dashboards are a powerful tool in Workspace ONE Intelligence that supplement reporting capabilities with rich visualizations of available data. In this exercise, learn how to use dashboards to visualize data in Workspace ONE Intelligence.
Prerequisites
Before you can perform the procedures in this activity, you must meet the following requirements:
- Complete enrollment for one of the following devices:
Customizing the Dashboard View
As a supplement to its reporting capabilities, the Workspace ONE Intelligence dashboard displays critical business data in an easy-to-consume visual summary. Within dashboards, the configurable widgets allow you to customize the data that displays. In this activity, add a widget that shows enrollment information from the past 14 days.
- In the Workspace ONE Intelligence console, select the Dashboards tab.
- A Getting Started page is shown the first time you access the Dashboards page. If displayed, click Get Started.
- Click Add > Custom Dashboard.
- Enter a dashboard name, such as
My Devices
. - Enter an optional description for the dashboard.
- Click Save.
- Enter a dashboard name, such as
- Newly created dashboards, by default, have no information on them. You can add widgets to them and create custom dashboards to meet your business needs.
Click Add Widget > From Template.- Explore widget categories and templates. To begin creating a widget, you can select Custom Widget or select one of built-in widgets by selecting the categories and tags. The list of categories will be based on the integrations configured on your Workspace ONE Intelligence and may differ from the image you see in this activity. The available categories can include:
- Apps
- Authentication
- Automations
- Devices
- Hub
- Platform
- Product
- Security
- Integration
- Bookmarks
When you start with Workspace ONE Intelligence for the first time, you will see multiple categories.
Then, use the tag for each category to filter the customizable templates to define the content your widget displays. For complete control of the widget's content, use the Custom Widget template to define your own criteria.
Feel free to click on each category to see the templates available to each.
- Select the Devices category and select Enrollments.
- Click Start for the Total Enrollments template.
- To create a snapshot of total enrollments over time, configure the template as follows:
- Update the name to
Total Enrollments Over Time
. - Select Historical.
- For Chart Type, select Line.
- For by Group, enter
Platform
. - Set the Date Range to
Last 14 Days
.
- Click Save.
- Update the name to
After configuring the Total Enrollment Over Time widget, you can manage how it displays on your dashboard. In this activity, modify your dashboard view by repositioning and expanding the Total Enrollment Over Time widget.
By default, the new widget appears at the bottom of your dashboard. Because this is the first widget on this dashboard, it will be at the top.
- Customize the Dashboard:
- Click Total Enrollments Over Time (the chart title) and drag the widget to a new location on your dashboard.
- Click and drag the corners of the widget to change the width or height of the Total Enrollments Over Time widget.
- After you are satisfied with the position and size of the widget, click Save.
- Click Save to save the dashboard layout.
For more details, see Dashboards in Intelligence.
Using Dashboards to Enforce Device Compliance
In addition to its standard dashboards, Workspace ONE Intelligence also provides a set of security-focused dashboards. These dashboards query the entire environment to identify the most at-risk devices: compromised devices, passcode-less devices, unencrypted devices, and others. In this activity, learn how to Security Risk dashboards in Workspace ONE Intelligence can help you enforce device compliance and mitigate risk.
Prerequisites
Before you can perform the procedures in this activity, you must meet the following requirements:
- Complete enrollment for one of the following devices:
Increasing Compliance Across Devices
The Security Risk dashboards in Workspace ONE Intelligence gather reports on numerous device states and quickly identify high-risk devices. In this activity, you explore the following Security Risk dashboards Workspace ONE Intelligence: Threats Summary, Compromised Devices, Policy Risks, and Vulnerabilities.
- In the Workspace ONE Intelligence console, navigate to Dashboards > Intelligence Dashboards > Security Risk.
- View the Threats Summary dashboard.
The Threats Summary dashboard appears by default and displays the number of threats reported by the Trust Network solutions that are integrated into your environment.
Workspace ONE Intelligence integrates with several security endpoints solutions that report threats, such as Anomalies, malware, policy violation, suspicious network activities, and so on. The threats are reported into Intelligence by the Trust Network solutions almost immediately, and you can navigate through each data point to identify the threats and devices impacted by that threat.
Scroll down to the Compromised Devices chart. - View the Compromised Devices dashboard.
The Compromised Device dashboard appears by default and displays the number of devices that reported as compromised in the past 30 days. A device becomes compromised when it is in violation of the compliance policies defined by the IT administrator. Common compliance policies include deny listed apps, devices not seen in the past 24 hours, no passcode, and more. - Select Policy Risks to view the number of passcode-less devices detected in the past 30 days.
Then, after you understand the scope of the issue, use automation to mitigate the risk. For example, you can create a rule to automatically move a passcode-less device to quarantine, or remove its access to corporate data. - Scroll down to Unencrypted Devices. This chart shows the total number of unencrypted devices identified on a daily basis by Workspace ONE Intelligence.
- Point to the data points for additional details about the number of devices per platform.
- Click View to obtain a detailed list of devices.
- Click Security Risk: Policy Risks to return.
- Select the Vulnerabilities tab to view the number of vulnerable devices in the last 30 days.
Without encryption, confidential information is unprotected, and can easily land in the wrong hands. To mitigate this risk, create policies to enforce device encryption. For example, you can create a policy to block corporate access until the device is encrypted through Workspace ONE UEM.
For more information, see Security Risk Dashboard.
Automating Patch Remediation
Identifying security risks across all Windows devices is a challenge particularly when those devices are not managed. However, combining device management capabilities with Workspace ONE UEM allows IT administrators to report and approve patch deployment using Workspace ONE UEM.
In an environment with thousands of devices, patches being released on a weekly basis, and distributed responsibility between IT and InfoSec teams, it is crucial to provide unified visibility and real-time data to drive accurate decisions and minimize any security risk to the business.
Workspace ONE Intelligence integrates with Workspace ONE UEM to provide that unified visibility and real-time data. In addition, Intelligence brings automation workflows which allows IT to automate the patch approval process and continue monitoring the environment.
In this exercise, you identify the multiple Windows OS Versions and patches deployed across your environment, identify Windows devices that are missing critical OS patches, use automation to push the correct patches to the corresponding devices, and then monitor the remediation process.
Note: Before you begin, you must have an enrolled Windows device.
Identifying Windows Devices Missing Critical OS Patches
In this activity, use the OS Updates dashboard to view details about OS versions deployed and patch status across all managed Windows devices.
- In the Workspace ONE Intelligence console, navigate to Dashboards > Intelligence Dashboards > OS Updates.
- Click View Dashboard for one of the cards, for example, Windows Desktop.
The OS Updates dashboard shows how heterogeneous the environment is based on the number of OS versions available on your environment per platform.
The dashboard only shows the cards based on the current devices managed in your environment. For this exercise, if you enroll only one Windows device, it only shows one card. - Explore devices by OS version.
The OS Versions dashboard includes the Number of Devices by OS Version chart, which allows you to understand number of OS versions across the Windows managed devices in your organization.
- Select Patches to find the Number of Patches by Update Status chart. This chart helps you to focus and prioritize which available and failed patches must be installed as soon as possible.
- Click the Available bar and then click View to see a list of OS updates available to install per device. This list includes all the devices and related available OS updates. The column Windows Patch Update Classification can help you to prioritize which patches must be installed first to improve device security and minimize risk for the organization.
- Filter for a specific Windows patch (KB).
For the purpose of this exercise, use KB 4503308 to automate the deployment. If you don't have KB 4503308 in your environment, choose another available KB and use that as the reference for this exercise.- Click Edit.
- Enter
Windows Patch KB Number
. - Enter
4503308
. - Click Apply.
- Review devices that require a patch and its status.
As a result, you can see the number of devices requiring that specific patch and the last time those devices reported an update status related to the patches.
On the top chart, two devices report to be missing that patch. On the bottom chart, you can see when each device reports the status related to that specific patch.
Using Automation to Remediate Patches
After identifying the devices at risk, create an automated process that pushes the correct patches to the devices.
- Navigate to Automations > Intelligence Automations > Workflows.
- Click Add > Custom Workflow.
- Select Workspace ONE UEM > Devices.
- Define Automation settings:
For the purpose of this exercise, use KB4503308 to automate the deployment.
- Enter a name for the automation. For example,
Windows Patch Remediation
. - Under Filter (If), select Windows Patch KB Number.
- Select Equals.
- Enter the KB Number
4503308
. - Click + to add a second filter.
- Select Windows Patch Update Status.
- Select Includes.
- Select Available.
Based on the filter conditions, Intelligence reports the number of devices where patch 4503308 is not installed. Click View to see the filter results.
- Add an Action.
- Scroll down to the Action (Then) section, and click the + icon.
- Select Workspace ONE UEM from the available connections.
- Scroll down and select the Approve Patch action.
- Define Action Settings:
- For Revision ID, enter
${airwatch.windowspatch.winpatch_revision_id}
. This will automatically assume the KB number from the filter condition. - Click the toggle to enable automation.
- Click Save.
- For Revision ID, enter
- Click Save & Enable.
- Confirm that your automation has been created and that it has a status of
Enabled
.
Monitoring Patch Remediation
After you have enabled an action, you can monitor its execution in the Workspace ONE Intelligence console. In this activity, you walk-through monitoring the patch remediation action you just created.
- To review the logs, click View on the Windows Patch Remediation (Spectre/Meltdown) action.
- Select the Activity tab. The log data for automation actions is displayed in this section.
- Review the Activity logs - The activity list shows the log data of automation actions taken per OS update. You can click each Target Identifier link to obtain the device details on each action.
- Return to the Workspace ONE UEM console.
- On Workspace ONE UEM Console you can validate the patch status change triggered by the Workspace ONE Intelligence Automation.
- Click Devices.
- Click List View.
- Click the Device Name for your enrolled device.
- Validate patch approval status.
- Click Updates.
- Enter
KB4503308
in the search box and press Enter. - Look for the
KB4503308
, the status should be changed toApproved
.
- Log in to the enrolled Windows device that just had a patch approved, validate if Windows Update is downloading.
- Navigate to Windows Start > Settings > Update & Security.
- From Windows Update, you can follow the status (downloading, pending restart, installed) of all approved patches. Some patches might require a machine restart.
- Return to the Workspace ONE UEM console to force the device to check-in and query the device OS updates data.
- Navigate to Devices > List View and select your Windows device.
- Navigate to More Actions > OS Updates.
- To check the logs, navigate to More > Troubleshooting.
- You will see logs noting
Available OS Update requested
when the task is triggered, andAvailable OS Updates confirmed
when the details are reported. - Click Refresh if needed to check the logs again for both events.
Automating Patch Remediation Based on CVE
Security Risk analysis provides visibility into all vulnerabilities, correlating Microsoft KBs with Common Vulnerability and Exposure (CVE) and Common Vulnerability Scoring System (CVSS) into a unified view to help you to make decisions based on real-time information. In addition, learn how to remediate those vulnerabilities through automation and create dashboards to monitor the remediation.
In this exercise, you explore the Vulnerabilities dashboard. This dashboard provides visibility into the impact of vulnerabilities that are reported through Common Vulnerabilities and Exposures (CVEs) and correlated to the existing patches on each of your managed Windows devices.
Note: Before you begin, you must have an enrolled Windows device.
Identifying Vulnerabilities on Managed Windows Devices
In this activity, you use the Vulnerabilities dashboard to view a list of vulnerabilities, retrieve details on those vulnerabilities, and search for and explore CVE details.
- On the Workspace ONE Intelligence console, navigate to Dashboards > Intelligence Dashboards > Security Risk > Vulnerabilities.
- Navigate through the vulnerabilities listed. Each vulnerability card shows the number of devices impacted by the CVE and if the patch has been installed.
- Identify a critical CVE that impacts a high number of devices and copy the number to Notepad++. For example, CVE-2020-0687.
- To obtain detailed information from NIST and Microsoft, navigate to Learn More > NIST Article or Microsoft Advisory.
- Review Vulnerable Devices based on CVSS Score – this chart helps to prioritize patches based on the highest number of devices impacted. On the chart, you can see that most of the vulnerable devices in this environment are associated with patches that score 9.3. Based on the current scenario, the IT administrator can decide to patch those devices, which is close to 100 and minimize the security risk on the environment.
- Clicking one of the KBs represented on the high score bar provides more information. As a result, you obtain a list of patches and correlated devices impacted based on the CVSS Score previously selected.
- You can scroll down and find the list of Vulnerabilities in a table format, which allows you to search, order the results and for each CVE see the link of detailed information on NIST and Microsoft websites.
- Use the search field to located specific CVE.
- Click the title bar to sort results based on CVSS Score, Published date, and Impacted number of devices, in ascending or descending order.
- Click the dot menu and select NIST Article or Microsoft Advisory. These websites provide more information about the related CVE.
Creating Automations
Automation in Workspace ONE Intelligence uses numerous parameters that trigger a workflow. You can customize the workflow to act on unique scenarios in your Workspace ONE environment.
In this exercise, you create an automated process that pushes the patches associated with the CVE to the devices and then you monitor this process in the logs.
- Navigate to Automations > Intelligence Automations > Workflows.
- Click Add > From Template.
- Search for the Approve Windows Update template and click Start.
- Enter the name of the Automation. For example,
CVE-XXX-XXXX Approval
, where XXX-XXXX refers to the CVE number identified in the previous activity. - Enter
Failed
andAvailable
for Windows Patch Update Status. - Enter the
CVE-XXX-XXXX
for the CVE Id, where XXX-XXXX refers to the number of the CVE identified during the previous activity.
- Enter the name of the Automation. For example,
- Based on the defined conditions, Workspace ONE Intelligence provides real-time visibility on the impacted devices. Click View for a list of impacted devices.
- Explore the results.
- Use the drop-down arrow to change how the results are grouped.
- Select different chart types.
- Click the upper-right arrow to close the Filter Results.
- Based on the initial template, the Approve Patch has been defined as the first action.
The Revision ID uses the lookup value ${airwatch.windowspatch.winpatch_revision_id}, which dynamically searches for all patches (KBs) associated to the CVE—this will generate a UEM API call to approve each KB. - Save and Enable the workflow.
Monitoring Automation Execution in the Logs
After you have enabled an action, you can monitor its execution in the Workspace ONE Intelligence console. In this activity, you walk-through the logs and actions taken by the automation previously created.
- Click View on the automation you created and then select the Activity tab.
- Review the Automation Log screen that displays the list of devices targeted by this automation.
- A
COMPLETED
status shows for successful actions. - An
ERROR
status shows for actions that reported errors during the API Intelligence call. The error details are also listed. - Click the Target Identifier to view the device details.
- A
Creating a Dashboard to Track CVE Information
After the automation has been enabled to start patching devices, you can create a dashboard to track the approval process as the automation remediates. You can track the approval progress for all devices and determine which devices are missing approvals, which devices are approved, and which devices are patched (meaning the KB is installed).
In this activity, you create a dashboard to track the progress of CVE remediation. This process includes creating and configuring a number of widgets to track vulnerable or impacted devices and patched or remediated devices.
- Navigate to Dashboards > Intelligence Dashboards > My Dashboards.
- Click Add > Custom Dashboard, enter a name for your dashboard and click Save.
- Click Add Widget > From Template.
- Search for the following template: Windows Devices Vulnerable to High CVE (CVSS >= 7).
- Click Start.
- Configure the widget as follows:
- Change the title to Vulnerable/Impacted Devices.
- Keep the default setting for Windows Patch Update Status / Does not Include / Installed, Removed. This filters only for devices missing the patch.
- Change the Common Vulnerability Severity Score filter to CVE Identifier List.
- Enter your CVE number, which is in the format CVE-XXXX-XXXX.
- Click Save.
- To adjust the widget size, click Customize, resize your widget by dragging the corners, and click Save.
- To duplicate a widget:
- Click the menu icon.
- Select Duplicate.
- Rename the widget to
Vulnerable Devices Needing Patch Approval
. - Remove the Description.
- Click Save.
- Adjust the position and size of the new Widget and click Save on the Dashboard.
- On the Vulnerable Devices Needing Patch Approval widget, click the menu icon and select Edit.
- Configure the Vulnerable Devices Needing Patch Approval widget:
- Click the plus icon to add a new filter condition.
- Enter
Windows Patch Approval Status
. - Enter
Unapproved
. - Click Save.
- Create a widget for Vulnerable Devices Needing Patch Assignment:
This new widget represents the count of devices that don’t have the KB patch installed and approved to remediate CVE-XXXXXXX vulnerability.- Duplicate the second widget created and rename to
Vulnerable Devices Needing Patch Assignment
. - Edit the newly created widget and change the Windows Patch Approval Status to Does Not Include Installed.
- Add a filter with the following condition: Windows Patch Assignment Status / Includes / Unassigned.
- Click Save.
- Duplicate the second widget created and rename to
- Create a widget for Patched/Remediated Devices:
The Patched/Remediated Devices widget brings the count of devices that have the KB patch installed (not necessarily approved or assigned) that does remediate the CVE-XXXX-XXXX vulnerability.- Duplicate the Vulnerable/Impacted Devices widget.
- Rename it to
Patched/Remediated Devices
. - Edit the widget and change the values in the Windows Patch Update Status to Include Installed.
- Review the widgets you have created. The four widgets that you just created, should all be aligned to the left. The numbers will differ from your environment and will be updated based on the patch process.
- Add a Security Update Status widget:
The Security Update widget is a breakdown of all the devices with a CVE-XXXX-XXXX record associated with the corresponding patch record by their OS update status. It shows which devices are patched, which devices are not and why.- Click Add Widget > From Template.
- Search for the Security Updates Status template and click Start.
- Configure the Security Update Status widget:
- Rename the Widget to Device Update Status for CVE-XXXX-XXXX.
- Replace the Windows Patch Update Classification filter with CVE Identifier List / Contains All Of / CVE-XXXX-XXXX. Replace CVE-XXXX-XXXX with your CVE number.
- Click Save.
- Organize your dashboard:
Rearrange the dashboard as shown in the image.- Duplicate the Device Update Status for CVE-XXXX-XXXX and name the new widget
Number of Devices by Update Status and Approval Status
. - Click Edit for the new Number of Devices by Update Status and Approval Status widget.
- Duplicate the Device Update Status for CVE-XXXX-XXXX and name the new widget
- Configure the Number of Devices by Update Status and Approval Status widget:
Keep the default filter settings.- Select Table for the chart type.
- Add the following in Group by:
- CVE Identifier List
- Windows Patch KB Number
- Windows Patch KB Title
- Windows Patch Update Status
- Click Save.
- Review the final dashboard. Your final dashboard will look like the example shown and over time, the dashboard will update based on the patch remediation progress initiated by Workspace ONE Intelligence.
Summary and Additional Resources
This operational tutorial provided basic management steps for Workspace ONE Intelligence.
Procedures included:
- Getting started with Workspace ONE Intelligence
- Using reports to gain insights
- Using dashboards to visualize data and enforce device compliance
- Automating patch remediation
Additional Resources
For more information about Workspace ONE, explore the VMware Workspace ONE Activity Path. The activity path provides step-by-step guidance to help you level up in your Workspace ONE knowledge. You will find everything from beginner to advanced curated assets in the form of articles, videos, and labs.
Additionally, you can check out the VMware Workspace ONE and VMware Horizon Reference Architecture which provides a framework and guidance for architecting an integrated digital workspace using VMware Workspace ONE and VMware Horizon.
Changelog
The following updates were made to this guide:
Date |
Description of Changes |
2022/03/22 |
|
About the Author
This tutorial was written by:
- Andreano Lanusse, End-User-Computing Staff Architect, Technical Marketing, VMware.
Feedback
Your feedback is valuable.
To comment on this paper, contact VMware End-User-Computing Technical Marketing at euc_tech_content_feedback@vmware.com.