From 1e4b5ccb9067f8795f99162d479b48ceb878af00 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 3 Dec 2019 23:30:39 -0800 Subject: [PATCH] Updated EOL scenario flow --- .../threat-and-vuln-mgt-scenarios.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index d80a801256..09cff013d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -183,17 +183,17 @@ ComputerName=any(ComputerName) by MachineId, AlertId ``` ## Conduct an inventory of application or application versions which have reached their end-of-life -End-of-life for applications or application versions means that they will no longer be supported nor serviced. When you use application or application versions which have reached their end of life, you're exposing your organization to security vulnerabilities, legal, and financial risks. +End-of-life for applications or application versions means that they will no longer be supported nor serviced. When you use application or application versions which have reached their end-of-life, you're exposing your organization to security vulnerabilities, legal, and financial risks. It is crucial for you as Security and IT Administrators to work together and ensure that your organization's software inventory is configured for optimal results, compliance, and a healthy network ecosystem. -To conduct an inventoy of application versions which have reached their end of life: +To conduct an inventory of applications or application versions which have reached their end of life: 1. From the Threat & Vulnerability Management menu, navigate to **Security recommendations*. -2. Go to the **Filters** panel and select **Software update** from **Remediation Type** options. Doing so will show your list of software recommendations associated with applications which have reached their end-of-life tagged with **Has EOL versions**. -3. Select an application that you'd like to investigate. A fly-out screen opens. Select **Open software page** +2. Go to the **Filters** panel and select **Software uninstall** from **Remediation Type** options if you want to see the list of software recommendations associated with applications which have reached their end-of-life (tagged as **EOL**). Select **Software update** from **Remediation Type** options if you want to see the list of software recommendations associated with application versions which have reached their end-of-life (tagged as **EOL versions**). +3. Select an application that you'd like to investigate. A fly-out screen opens where you can select **Open software page** 4. In the **Software page** select the **Version distribution** tab to know which versions of the application have reached their end-of-life, and how many vulnerabilities were discovered in it. -After you have identified which application and application versions are vulnerable due to its end-of-life status, prioritize remediation to lower your organizations exposure to vulnerabilities and advanced persistent threats. +After you have identified which applications and application versions are vulnerable due to its end-of-life status, prioritize remediation to lower your organizations exposure to vulnerabilities and advanced persistent threats. ## Related topics