Updated screenshots
Before Width: | Height: | Size: 38 KiB After Width: | Height: | Size: 30 KiB |
Before Width: | Height: | Size: 17 KiB After Width: | Height: | Size: 17 KiB |
Before Width: | Height: | Size: 97 KiB After Width: | Height: | Size: 99 KiB |
Before Width: | Height: | Size: 64 KiB After Width: | Height: | Size: 68 KiB |
Before Width: | Height: | Size: 11 KiB After Width: | Height: | Size: 6.0 KiB |
Before Width: | Height: | Size: 48 KiB After Width: | Height: | Size: 48 KiB |
Before Width: | Height: | Size: 167 KiB After Width: | Height: | Size: 169 KiB |
Before Width: | Height: | Size: 110 KiB After Width: | Height: | Size: 134 KiB |
Before Width: | Height: | Size: 135 KiB After Width: | Height: | Size: 93 KiB |
Before Width: | Height: | Size: 129 KiB After Width: | Height: | Size: 72 KiB |
Before Width: | Height: | Size: 20 KiB After Width: | Height: | Size: 24 KiB |
@ -91,9 +91,9 @@ To view a list of version that have reached end of support, or end or support so
|
||||
|
||||
 <br><br>
|
||||
|
||||
3. Select one of the versions in the table to open. For example, version 3.5.2150.0. A flyout will appear with the end of support date.
|
||||
3. Select one of the versions in the table to open. For example, version 10.0.18362.1. A flyout will appear with the end of support date.
|
||||
|
||||
<br><br>
|
||||
<br><br>
|
||||
|
||||
After you have identified which software and software versions are vulnerable due to its end-of-support status, remediate them to lower your organizations exposure to vulnerabilities and advanced persistent threats. See [Remediation and exception](tvm-remediation.md) for details.
|
||||
|
||||
|
@ -62,7 +62,7 @@ To lower your threat and vulnerability exposure, follow these steps.
|
||||
|
||||
2. The **Security recommendations** page will open, and a flyout for the recommendation you selected will open. The flyout panel will display a description of what you need to remediate, number of vulnerabilities, associated exploits in devices, number of exposed devices and their device names, business impact, and a list of CVEs. Select **Open software page** option from the flyout panel. 
|
||||
|
||||
3. The **Overview** tab of the selected software will display. Select the **Installed devices** tab and then the affected device from the list. A flyout panel will open with the relevant device details, exposure and risk levels, alert and incident activities. 
|
||||
3. Select **Installed devices** and then the affected device from the list. A flyout panel will open with the relevant device details, exposure and risk levels, alert and incident activities. 
|
||||
|
||||
4. Click **Open device page** to connect to the device and apply the selected recommendation. See [Investigate devices in the Microsoft Defender ATP Devices list](investigate-machines.md) for details. 
|
||||
|
||||
|