mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 04:13:41 +00:00
Updated tvm-dashboard-insights.md
This commit is contained in:
@ -37,8 +37,8 @@ You can use the Threat & Vulnerability Management capability in [Microsoft Defen
|
|||||||
- Select remediation options, triage and track remediation tasks
|
- Select remediation options, triage and track remediation tasks
|
||||||
- File and track exceptions
|
- File and track exceptions
|
||||||
|
|
||||||
## Windows Defender Security Center
|
## Threat & Vulnerability Management in Microsoft Defender Security Center
|
||||||
When you open the portal, you’ll see the main areas of the application:
|
When you open the portal, you’ll see the main areas of the capability:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -65,7 +65,7 @@ Area | Description
|
|||||||
**Top remediation activities** | Track the remediation activities generated from the security recommendations. You can click each item on the list and it will take you to the **Remediation** page where you'll see remediation and exception activity details.
|
**Top remediation activities** | Track the remediation activities generated from the security recommendations. You can click each item on the list and it will take you to the **Remediation** page where you'll see remediation and exception activity details.
|
||||||
**Top exposed machines** | See the exposed machine names and their exposure level. You can click the machine name and it will take you to the machine page where you can view the alerts, risks, incidents, security recommendations, installed software, discovered vulnerabilities associated with the exposed machines. You can also do other EDR-related tasks in it, such as: manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate machine.
|
**Top exposed machines** | See the exposed machine names and their exposure level. You can click the machine name and it will take you to the machine page where you can view the alerts, risks, incidents, security recommendations, installed software, discovered vulnerabilities associated with the exposed machines. You can also do other EDR-related tasks in it, such as: manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate machine.
|
||||||
|
|
||||||
See [Microsoft Defender ATP icons](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection#windows-defender-atp-icons) to provide the information on the icons used throughout the portal.
|
See [Microsoft Defender ATP icons](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection#windows-defender-atp-icons) for more information on the icons used throughout the portal.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
Reference in New Issue
Block a user