mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-20 01:07:23 +00:00
images and files
This commit is contained in:
parent
d3510de291
commit
2b3003cb9d
@ -1,95 +0,0 @@
|
|||||||
---
|
|
||||||
title: Overview of Configuration score in Microsoft Defender Security Center
|
|
||||||
description: Your configuration score shows the collective security configuration state of your machines across application, operating system, network, accounts, and security controls
|
|
||||||
keywords: configuration score, mdatp configuration score, secure score, security controls, improvement opportunities, security configuration score over time, security posture, baseline
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: ellevin
|
|
||||||
author: levinec
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: conceptual
|
|
||||||
---
|
|
||||||
# Configuration score
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
> Secure score is now part of Threat & Vulnerability Management as Configuration score.
|
|
||||||
|
|
||||||
Your Configuration score is visible in the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) of the Microsoft Defender Security Center. A higher configuration score means your endpoints are more resilient from cybersecurity threat attacks. It reflects the collective security configuration state of your machines across the following categories:
|
|
||||||
|
|
||||||
- Application
|
|
||||||
- Operating system
|
|
||||||
- Network
|
|
||||||
- Accounts
|
|
||||||
- Security controls
|
|
||||||
|
|
||||||
Select a category to go to the [**Security recommendations**](tvm-security-recommendation.md) page and view the relevant recommendations.
|
|
||||||
|
|
||||||
## How it works
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
> Configuration score currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management.
|
|
||||||
|
|
||||||
The data in the configuration score card is the product of meticulous and ongoing vulnerability discovery process aggregated with configuration discovery assessments that continuously:
|
|
||||||
|
|
||||||
- Compare collected configurations to the collected benchmarks to discover misconfigured assets
|
|
||||||
- Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction)
|
|
||||||
- Collect and maintain best practice configuration benchmarks (vendors, security feeds, internal research teams)
|
|
||||||
- Collect and monitor changes of security control configuration state from all assets
|
|
||||||
|
|
||||||
## Improve your security configuration
|
|
||||||
|
|
||||||
You can improve your security configuration when you remediate issues from the security recommendations list. As you do so, your Configuration score improves, which means your organization becomes more resilient against cybersecurity threats and vulnerabilities.
|
|
||||||
|
|
||||||
1. From the Configuration score card in the Threat & Vulnerability Management dashboard, select the one of the categories to view the list of recommendations related to that category. It will take you to the [**Security recommendations**](tvm-security-recommendation.md) page. If you want to see all security recommendations, once you get to the Security recommendations page, clear the search field.
|
|
||||||
|
|
||||||
2. Select an item on the list. The flyout panel will open with details related to the recommendation. Select **Remediation options**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
|
|
||||||
|
|
||||||
4. **Submit request**. You will see a confirmation message that the remediation task has been created.
|
|
||||||
>
|
|
||||||
|
|
||||||
5. Save your CSV file.
|
|
||||||

|
|
||||||
|
|
||||||
6. Send a follow-up email to your IT Administrator and allow the time that you have allotted for the remediation to propagate in the system.
|
|
||||||
|
|
||||||
7. Review the **Configuration score** card again on the dashboard. The number of security controls recommendations will decrease. When you select **Security controls** to go back to the **Security recommendations** page, the item that you have addressed will not be listed there anymore, and your configuration score should increase.
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>To boost your vulnerability assessment detection rates, download the following mandatory security updates and deploy them in your network:
|
|
||||||
>- 19H1 customers | [KB 4512941](https://support.microsoft.com/help/4512941/windows-10-update-kb4512941)
|
|
||||||
>- RS5 customers | [KB 4516077](https://support.microsoft.com/help/4516077/windows-10-update-kb4516077)
|
|
||||||
>- RS4 customers | [KB 4516045](https://support.microsoft.com/help/4516045/windows-10-update-kb4516045)
|
|
||||||
>- RS3 customers | [KB 4516071](https://support.microsoft.com/help/4516071/windows-10-update-kb4516071)
|
|
||||||
>
|
|
||||||
>To download the security updates:
|
|
||||||
>1. Go to [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/home.aspx).
|
|
||||||
>2. Key-in the security update KB number that you need to download, then click **Search**.
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
- [Threat & Vulnerability Management overview](next-gen-threat-and-vuln-mgt.md)
|
|
||||||
- [Supported operating systems and platforms](tvm-supported-os.md)
|
|
||||||
- [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md)
|
|
||||||
- [Exposure score](tvm-exposure-score.md)
|
|
||||||
- [Security recommendations](tvm-security-recommendation.md)
|
|
||||||
- [Remediation and exception](tvm-remediation.md)
|
|
||||||
- [Software inventory](tvm-software-inventory.md)
|
|
||||||
- [Weaknesses](tvm-weaknesses.md)
|
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
|
||||||
- [APIs](threat-and-vuln-mgt-scenarios.md#apis)
|
|
||||||
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
|
Binary file not shown.
After Width: | Height: | Size: 194 KiB |
Binary file not shown.
After Width: | Height: | Size: 196 KiB |
Binary file not shown.
Before Width: | Height: | Size: 198 KiB |
Binary file not shown.
Before Width: | Height: | Size: 167 KiB |
@ -46,13 +46,7 @@ Watch this video for a quick overview of what is in the Threat & Vulnerability M
|
|||||||
|
|
||||||
## Threat & Vulnerability Management in Microsoft Defender Security Center
|
## Threat & Vulnerability Management in Microsoft Defender Security Center
|
||||||
|
|
||||||
When you open the portal, you'll see the main areas of the capability:
|

|
||||||
|
|
||||||
- (1) Menu to open the navigation pane
|
|
||||||
- (2) Threat & Vulnerability Management navigation pane
|
|
||||||
- (3) Threat & Vulnerability Management dashboard
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
You can navigate through the portal using the menu options available in all sections. Refer to the following tables for a description of each section.
|
You can navigate through the portal using the menu options available in all sections. Refer to the following tables for a description of each section.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user