From 6b7d959b125f90c4d5fa11182bdb3f2475b5b455 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Fri, 10 Jan 2020 13:10:36 -0800 Subject: [PATCH] Update tvm-security-recommendation.md --- .../microsoft-defender-atp/tvm-security-recommendation.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md index fefd7cb969..c5eba9e967 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md @@ -47,18 +47,16 @@ You can access the security recommendation from the Microsoft Defender ATP Threa *Security recommendations option from the left navigation menu* 1. Go to the Threat & Vulnerability Management navigation menu and select **Security recommendations** to open up the list of security recommendations found in your organization. It gives you an overview of the security recommendation context: weaknesses found, related components, application, operating system, network, accounts, and security controls, associated breach, threats, and recommendation insights, exposed machine trends, status, remediation type and activities. - -

![Screenshot of Security recommendations page](images/tvm_securityrecommendation-graph.png) +>

![Screenshot of Security recommendations page](images/tvm_securityrecommendation-graph.png) >[!NOTE] > The color of the **Exposed machines** graph changes as the trend changes. If the number of exposed machines is on the rise, the color changes into red. If there's a decrease in the amount of exposed machines, the color of the graph will change into green. This happens when the numbers on the right hand side is greater than what’s on the left, which means an increase or decrease at the end of even a single machine will change the graph's color. -You can filter your view based on related components, status, and remediation type. If you want to see the remediation activities of software and software versions which have reached their end-of-life, select **Active**, then select **Software update** from the **Remediation Type** filter, and click **Apply*. - +You can filter your view based on related components, status, and remediation type. If you want to see the remediation activities of software and software versions which have reached their end-of-life, select **Active**, then select **Software update** from the **Remediation Type** filter, and click **Apply**.

![Screenshot of the remediation type filters for software update and uninstall](images/remediationtype_swupdatefilter.png) 2. Select the security recommendation that you need to investigate or process. -![Screenshot of the security recommendation page flyout for a software which reached its end-of-life](images/secrec_flyouteolsw.png) +

![Screenshot of the security recommendation page flyout for a software which reached its end-of-life](images/secrec_flyouteolsw.png) *Top security recommendations from the dashboard*