mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #1015 from MicrosoftDocs/TVMReportInaccuracy
Tvm report inaccuracy
This commit is contained in:
commit
14589c3198
Binary file not shown.
Before Width: | Height: | Size: 2.1 KiB After Width: | Height: | Size: 1.2 KiB |
Binary file not shown.
Before Width: | Height: | Size: 179 KiB After Width: | Height: | Size: 105 KiB |
Binary file not shown.
After Width: | Height: | Size: 24 KiB |
Binary file not shown.
After Width: | Height: | Size: 8.3 KiB |
@ -56,11 +56,25 @@ From that page, you can do any of the following depending on what you need to do
|
|||||||
|
|
||||||
## Report inaccuracy
|
## Report inaccuracy
|
||||||
|
|
||||||
You can report on a false positive when you see any vague, inaccurate, incomplete, or already remediated information in the machine page, under **Security recommendation** column.
|
You can report a false positive when you see any vague, inaccurate, incomplete, or already remediated information in the machine page, under **Security recommendation** column.
|
||||||
|
|
||||||
|
1. Click **:** then select **Report inaccuracy**. A flyout pane opens.
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
2. From the flyout pane, select the inaccuracy category from the drop-down menu.
|
||||||
|

|
||||||
|
|
||||||
|
3. Include your email address so Microsoft can send you feedback regarding the inaccuracy you reported.
|
||||||
|
|
||||||
|
4. Include your machine name for investigation context.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
||||||
|
|
||||||
|
5. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
||||||
|
|
||||||
Click **:** then select the inaccuracy category from the dropdown menu. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
Loading…
x
Reference in New Issue
Block a user