mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
updated alt text
This commit is contained in:
parent
7e82165d0b
commit
a771ceda48
@ -95,7 +95,7 @@ The following icons show up next to events:
|
||||
-  New public exploit
|
||||
-  New vulnerability was published
|
||||
-  Exploit found in exploit kit
|
||||
-  Exploit verified
|
||||
-  Exploit verified
|
||||
|
||||
### Drill down to a specific event
|
||||
|
||||
|
@ -39,11 +39,11 @@ It's crucial for Security and IT Administrators to work together and ensure that
|
||||
1. From the threat and vulnerability management menu, navigate to [**Security recommendations**](tvm-security-recommendation.md).
|
||||
2. Go to the **Filters** panel and look for the tags section. Select one or more of the EOS tag options. Then **Apply**.
|
||||
|
||||

|
||||

|
||||
|
||||
3. You'll see a list of recommendations related to software with ended support, software versions that are end of support, or versions with upcoming end of support. These tags are also visible in the [software inventory](tvm-software-inventory.md) page.
|
||||
|
||||

|
||||

|
||||
|
||||
## List of versions and dates
|
||||
|
||||
@ -51,15 +51,15 @@ To view a list of versions that have reached end of support, or end or support s
|
||||
|
||||
1. A message will appear in the security recommendation flyout for software with versions that have reached end of support, or will reach end of support soon.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Select the **version distribution** link to go to the software drill-down page. There, you can see a filtered list of versions with tags identifying them as end of support, or upcoming end of support.
|
||||
|
||||

|
||||

|
||||
|
||||
3. Select one of the versions in the table to open. For example, version 10.0.18362.1. A flyout will appear with the end of support date.
|
||||
|
||||

|
||||

|
||||
|
||||
Once you identify which software and software versions are vulnerable due to their end-of-support status, you must decide whether to update or remove them from your organization. Doing so will lower your organizations exposure to vulnerabilities and advanced persistent threats.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user