mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
updated alt text
This commit is contained in:
parent
7e82165d0b
commit
a771ceda48
@ -95,7 +95,7 @@ The following icons show up next to events:
|
|||||||
-  New public exploit
|
-  New public exploit
|
||||||
-  New vulnerability was published
|
-  New vulnerability was published
|
||||||
-  Exploit found in exploit kit
|
-  Exploit found in exploit kit
|
||||||
-  Exploit verified
|
-  Exploit verified
|
||||||
|
|
||||||
### Drill down to a specific event
|
### Drill down to a specific event
|
||||||
|
|
||||||
|
@ -39,11 +39,11 @@ It's crucial for Security and IT Administrators to work together and ensure that
|
|||||||
1. From the threat and vulnerability management menu, navigate to [**Security recommendations**](tvm-security-recommendation.md).
|
1. From the threat and vulnerability management menu, navigate to [**Security recommendations**](tvm-security-recommendation.md).
|
||||||
2. Go to the **Filters** panel and look for the tags section. Select one or more of the EOS tag options. Then **Apply**.
|
2. Go to the **Filters** panel and look for the tags section. Select one or more of the EOS tag options. Then **Apply**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. You'll see a list of recommendations related to software with ended support, software versions that are end of support, or versions with upcoming end of support. These tags are also visible in the [software inventory](tvm-software-inventory.md) page.
|
3. You'll see a list of recommendations related to software with ended support, software versions that are end of support, or versions with upcoming end of support. These tags are also visible in the [software inventory](tvm-software-inventory.md) page.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## List of versions and dates
|
## List of versions and dates
|
||||||
|
|
||||||
@ -51,15 +51,15 @@ To view a list of versions that have reached end of support, or end or support s
|
|||||||
|
|
||||||
1. A message will appear in the security recommendation flyout for software with versions that have reached end of support, or will reach end of support soon.
|
1. A message will appear in the security recommendation flyout for software with versions that have reached end of support, or will reach end of support soon.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select the **version distribution** link to go to the software drill-down page. There, you can see a filtered list of versions with tags identifying them as end of support, or upcoming end of support.
|
2. Select the **version distribution** link to go to the software drill-down page. There, you can see a filtered list of versions with tags identifying them as end of support, or upcoming end of support.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Select one of the versions in the table to open. For example, version 10.0.18362.1. A flyout will appear with the end of support date.
|
3. Select one of the versions in the table to open. For example, version 10.0.18362.1. A flyout will appear with the end of support date.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Once you identify which software and software versions are vulnerable due to their end-of-support status, you must decide whether to update or remove them from your organization. Doing so will lower your organizations exposure to vulnerabilities and advanced persistent threats.
|
Once you identify which software and software versions are vulnerable due to their end-of-support status, you must decide whether to update or remove them from your organization. Doing so will lower your organizations exposure to vulnerabilities and advanced persistent threats.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user