mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 12:23:37 +00:00
Update tvm-software-inventory.md
This commit is contained in:
@ -37,21 +37,23 @@ Since it is real-time, in a matter of minutes, you will see vulnerability inform
|
|||||||
|
|
||||||
You can report a false positive when you see any vague, inaccurate version information, incomplete, or already remediated information in the machine page.
|
You can report a false positive when you see any vague, inaccurate version information, incomplete, or already remediated information in the machine page.
|
||||||
|
|
||||||
1. Select the **Software inventory** tab. Click **:** beside software that you want to report about, and then select **Report inaccuracy**. A flyout pane opens.
|
1. Select the **Software inventory** tab.
|
||||||
|
|
||||||
|
2. Click **:** beside software that you want to report about, and then select **Report inaccuracy**. A flyout pane opens.
|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
2. From the flyout pane, select the inaccuracy category from the drop-down menu.
|
3. From the flyout pane, select the inaccuracy category from the drop-down menu.
|
||||||
<br></br>
|
<br></br>
|
||||||
|
|
||||||
3. Include your email address so Microsoft can send you feedback regarding the inaccuracy you reported.
|
4. Include your email address so Microsoft can send you feedback regarding the inaccuracy you reported.
|
||||||
|
|
||||||
4. Include your machine name for investigation context.
|
5. Include your machine name for investigation context.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
||||||
|
|
||||||
5. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
6. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
Reference in New Issue
Block a user