mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-28 13:17:23 +00:00
updated details
This commit is contained in:
parent
851c458c5f
commit
49b4a9cf0b
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Configure vulnerability email notifications in Microsoft Defender for Endpoint
|
||||
description: You can use Microsoft Defender Advanced Threat Protection to configure email notification settings for security alerts, based on severity and other criteria.
|
||||
description: Use Microsoft Defender for Endpoint to configure email notification settings for vulnerability events.
|
||||
keywords: email notifications, configure alert notifications, microsoft defender atp notifications, microsoft defender atp alerts, windows 10 enterprise, windows 10 education
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
@ -36,7 +36,7 @@ The notification rules allow you to set the vulnerability events that trigger no
|
||||
If you're using role-based access control (RBAC), recipients will only receive notifications based on the device groups that were configured in the notification rule.
|
||||
Users with the proper permission can only create, edit, or delete notifications that are limited to their device group management scope. Only users assigned to the Global administrator role can manage notification rules that are configured for all device groups.
|
||||
|
||||
The email notification includes basic information about the vulnerability event. There are also links to filtered views in the threat and vulnerability management [Security recommendations](tvm-security-recommendation.md) and [Weaknesses](tvm-weaknesses.md) pages in the portal so you can do further investigation.
|
||||
The email notification includes basic information about the vulnerability event. There are also links to filtered views in the threat and vulnerability management [Security recommendations](tvm-security-recommendation.md) and [Weaknesses](tvm-weaknesses.md) pages in the portal so you can further investigate. For example, you could get a list of all exposed devices or get additional details about the vulnerability.
|
||||
|
||||
## Create rules for alert notifications
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user