From 79f6d15e164c3e3b19e856fdc8f1f938682153aa Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 3 Dec 2019 23:32:49 -0800 Subject: [PATCH] Update threat-and-vuln-mgt-scenarios.md --- .../microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 09cff013d3..a8c2629c62 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -193,7 +193,7 @@ To conduct an inventory of applications or application versions which have reach 3. Select an application that you'd like to investigate. A fly-out screen opens where you can select **Open software page** 4. In the **Software page** select the **Version distribution** tab to know which versions of the application have reached their end-of-life, and how many vulnerabilities were discovered in it. -After you have identified which applications and application versions are vulnerable due to its end-of-life status, prioritize remediation to lower your organizations exposure to vulnerabilities and advanced persistent threats. +After you have identified which applications and application versions are vulnerable due to its end-of-life status, remediate them to lower your organizations exposure to vulnerabilities and advanced persistent threats. See [Remediation and exception](tvm-remediation.md) for details. ## Related topics