diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/atp-data-not-available.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-data-not-available.png index 9f868ac29e..4afde5b6f9 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/atp-data-not-available.png and b/windows/security/threat-protection/microsoft-defender-atp/images/atp-data-not-available.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/eos-upcoming-eos.png b/windows/security/threat-protection/microsoft-defender-atp/images/eos-upcoming-eos.png index 270a3502c5..d5b22d6dee 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/eos-upcoming-eos.png and b/windows/security/threat-protection/microsoft-defender-atp/images/eos-upcoming-eos.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/software-drilldown-eos.png b/windows/security/threat-protection/microsoft-defender-atp/images/software-drilldown-eos.png index b3893cd5ec..eb1940cb0f 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/software-drilldown-eos.png and b/windows/security/threat-protection/microsoft-defender-atp/images/software-drilldown-eos.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/top-security-recommendations350.png b/windows/security/threat-protection/microsoft-defender-atp/images/top-security-recommendations350.png index 1fda12a35f..ea977eacef 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/top-security-recommendations350.png and b/windows/security/threat-protection/microsoft-defender-atp/images/top-security-recommendations350.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-eos-tag.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-eos-tag.png index df675109cc..391d03a644 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-eos-tag.png and b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-eos-tag.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-eos-tags-column.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-eos-tags-column.png index 7d80bca932..c46339962e 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-eos-tags-column.png and b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-eos-tags-column.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm_dashboard.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm_dashboard.png index 580b189700..2d75f420d6 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/tvm_dashboard.png and b/windows/security/threat-protection/microsoft-defender-atp/images/tvm_dashboard.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm_machine_page_details.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm_machine_page_details.png index 4ac65fd936..2b22b3f8b3 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/tvm_machine_page_details.png and b/windows/security/threat-protection/microsoft-defender-atp/images/tvm_machine_page_details.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm_security_recommendations_page.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm_security_recommendations_page.png index d623b1348d..50736dfe6d 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/tvm_security_recommendations_page.png and b/windows/security/threat-protection/microsoft-defender-atp/images/tvm_security_recommendations_page.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm_software_page_details.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm_software_page_details.png index 43a867149f..a55fa7fdf8 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/tvm_software_page_details.png and b/windows/security/threat-protection/microsoft-defender-atp/images/tvm_software_page_details.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/version-eos-date.png b/windows/security/threat-protection/microsoft-defender-atp/images/version-eos-date.png index 731fa3bcf4..7ca85921dc 100644 Binary files a/windows/security/threat-protection/microsoft-defender-atp/images/version-eos-date.png and b/windows/security/threat-protection/microsoft-defender-atp/images/version-eos-date.png differ diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 12171045f5..b0aae19e29 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -91,9 +91,9 @@ To view a list of version that have reached end of support, or end or support so ![Screenshot of version distribution link](images/software-drilldown-eos.png)

-3. Select one of the versions in the table to open. For example, version 3.5.2150.0. A flyout will appear with the end of support date. +3. Select one of the versions in the table to open. For example, version 10.0.18362.1. A flyout will appear with the end of support date. -![Screenshot of version distribution link](images/version-eos-date.png)

+ ![Screenshot of version distribution link](images/version-eos-date.png)

After you have identified which software and software versions are vulnerable due to its end-of-support status, remediate them to lower your organizations exposure to vulnerabilities and advanced persistent threats. See [Remediation and exception](tvm-remediation.md) for details. diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md index aff0b8c951..06539ba2c4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md @@ -62,7 +62,7 @@ To lower your threat and vulnerability exposure, follow these steps. 2. The **Security recommendations** page will open, and a flyout for the recommendation you selected will open. The flyout panel will display a description of what you need to remediate, number of vulnerabilities, associated exploits in devices, number of exposed devices and their device names, business impact, and a list of CVEs. Select **Open software page** option from the flyout panel. ![Example of security recommendations page with the flyout "Update Microsoft Windows Server 2019" open.](images/tvm_security_recommendations_page.png) -3. The **Overview** tab of the selected software will display. Select the **Installed devices** tab and then the affected device from the list. A flyout panel will open with the relevant device details, exposure and risk levels, alert and incident activities. ![Example of the software page for Windows Server 2019, and a flyout open for a selected device.](images/tvm_software_page_details.png) +3. Select **Installed devices** and then the affected device from the list. A flyout panel will open with the relevant device details, exposure and risk levels, alert and incident activities. ![Example of the software page for Windows Server 2019, and a flyout open for a selected device.](images/tvm_software_page_details.png) 4. Click **Open device page** to connect to the device and apply the selected recommendation. See [Investigate devices in the Microsoft Defender ATP Devices list](investigate-machines.md) for details. ![Example of a device page.](images/tvm_machine_page_details.png)