From a9ca9b621e2ad5e59391f9acb1321f7710531952 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Fri, 30 Aug 2019 12:55:59 -0700 Subject: [PATCH] Added report inaccuracy bit --- .../tvm-software-inventory.md | 21 +++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md index 6954b3f5d6..9ee635f020 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md @@ -33,6 +33,27 @@ In the field of discovery, we are leveraging the same set of signals in Microsof Since it is real-time, in a matter of minutes, you will see vulnerability information as they get discovered. The engine automatically grabs information from multiple security feeds. In fact, you'll will see if a particular application is connected to a live campaign. It also provides a link to a Threat Analytics report soon as it's available. +## Report inaccuracy + +You can report a false positive when you see any vague, inaccurate version information, incomplete, or already remediated information in the machine page. + +1. Select the **Software inventory** tab. Click **:** beside software that you want to report about, and then select **Report inaccuracy**. A flyout pane opens. +![Screenshot of Report inaccuracy control from the machine page under the Software inventory column](images/tvm_report_inaccuracy_software.png) +![Screenshot of Report inaccuracy flyout pane](images/tvm_report_inaccuracy_softwareflyout.png) + +2. From the flyout pane, select the inaccuracy category from the drop-down menu. +
![Screenshot of Report inaccuracy categories drop-down menu](images/tvm_report_inaccuracy_softwareoptions.png)
+ +3. Include your email address so Microsoft can send you feedback regarding the inaccuracy you reported. + +4. Include your machine name for investigation context. + +>[!NOTE] +> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context. + +5. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context. + + ## Related topics - [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) - [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md)