mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
updating text
This commit is contained in:
parent
09a702191d
commit
2d764e231e
@ -25,7 +25,7 @@ ms.topic: conceptual
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> Secure score is now part of Threat & Vulnerability Management as Configuration score.
|
> Secure score is now part of Threat & Vulnerability Management as Configuration score.
|
||||||
|
|
||||||
Your Configuration score is visible in the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) of the Microsoft Defender Security Center. It reflects the collective security configuration state of your machines across the following categories:
|
Your Configuration score is visible in the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) of the Microsoft Defender Security Center. A higher configuration score means your endpoints are more resilient from cybersecurity threat attacks. It reflects the collective security configuration state of your machines across the following categories:
|
||||||
|
|
||||||
- Application
|
- Application
|
||||||
- Operating system
|
- Operating system
|
||||||
@ -33,7 +33,7 @@ Your Configuration score is visible in the [Threat & Vulnerability Management da
|
|||||||
- Accounts
|
- Accounts
|
||||||
- Security controls
|
- Security controls
|
||||||
|
|
||||||
A higher configuration score means your endpoints are more resilient from cybersecurity threat attacks.
|
Select a category to go to the [**Security recommendations**](tvm-security-recommendation.md) page and view the relevant recommendations.
|
||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
|
|
||||||
@ -43,35 +43,31 @@ A higher configuration score means your endpoints are more resilient from cybers
|
|||||||
The data in the configuration score card is the product of meticulous and ongoing vulnerability discovery process aggregated with configuration discovery assessments that continuously:
|
The data in the configuration score card is the product of meticulous and ongoing vulnerability discovery process aggregated with configuration discovery assessments that continuously:
|
||||||
|
|
||||||
- Compare collected configurations to the collected benchmarks to discover misconfigured assets
|
- Compare collected configurations to the collected benchmarks to discover misconfigured assets
|
||||||
- Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction) by remediating the misconfiguration
|
- Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction)
|
||||||
- Collect and maintain best practice configuration benchmarks (vendors, security feeds, internal research teams)
|
- Collect and maintain best practice configuration benchmarks (vendors, security feeds, internal research teams)
|
||||||
- Collect and monitor changes of security control configuration state from all assets
|
- Collect and monitor changes of security control configuration state from all assets
|
||||||
|
|
||||||
From the widget, you'd be able to see which security aspect requires attention. You can click the configuration score categories and it will take you to the **Security recommendations** page to see more details and understand the context of the issue. From there, you can act on them based on security benchmarks.
|
|
||||||
|
|
||||||
## Improve your security configuration
|
## Improve your security configuration
|
||||||
|
|
||||||
You can improve your security configuration when you remediate issues from the security recommendations list. As you do so, your configuration score improves, which means your organization becomes more resilient against cybersecurity threats and vulnerabilities.
|
You can improve your security configuration when you remediate issues from the security recommendations list. As you do so, your Configuration score improves, which means your organization becomes more resilient against cybersecurity threats and vulnerabilities.
|
||||||
|
|
||||||
1. From the Configuration score card in the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md), select **Security controls**. The [**Security recommendations**](tvm-security-recommendation.md) page opens to shows the list of recommendations related to security controls.
|
1. From the Configuration score card in the Threat & Vulnerability Management dashboard, select the one of the categories to view the list of recommendations related to that category. It will take you to the [**Security recommendations**](tvm-security-recommendation.md) page. If you want to see all security recommendations, once you get to the Security recommendations page, clear the search field.
|
||||||
|
|
||||||
2. Select an item on the list. The flyout panel will open with details related to the recommendation. Select **Remediation options**.
|
2. Select an item on the list. The flyout panel will open with details related to the recommendation. Select **Remediation options**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to the email that you can send to your IT Administrator for follow-up.
|
3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
|
||||||
|
|
||||||
>.
|
4. **Submit request**. You will see a confirmation message that the remediation task has been created.
|
||||||
|
|
||||||
You will see a confirmation message that the remediation task has been created.
|
|
||||||
>
|
>
|
||||||
|
|
||||||
4. Save your CSV file.
|
5. Save your CSV file.
|
||||||

|

|
||||||
|
|
||||||
5. Send a follow-up email to your IT Administrator and allow the time that you have allotted for the remediation to propagate in the system.
|
6. Send a follow-up email to your IT Administrator and allow the time that you have allotted for the remediation to propagate in the system.
|
||||||
|
|
||||||
6. Review the machine **Configuration score** card again on the dashboard. The number of security controls recommendations will decrease. When you select **Security controls** to go back to the **Security recommendations** page, the item that you have addressed will not be listed there anymore, and your configuration score should increase.
|
7. Review the **Configuration score** card again on the dashboard. The number of security controls recommendations will decrease. When you select **Security controls** to go back to the **Security recommendations** page, the item that you have addressed will not be listed there anymore, and your configuration score should increase.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>To boost your vulnerability assessment detection rates, download the following mandatory security updates and deploy them in your network:
|
>To boost your vulnerability assessment detection rates, download the following mandatory security updates and deploy them in your network:
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 47 KiB |
Loading…
x
Reference in New Issue
Block a user