mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
adding new alt text
This commit is contained in:
parent
c445b553fd
commit
aa25eb2aa4
@ -27,7 +27,7 @@
|
|||||||
### [Threat & Vulnerability Management]()
|
### [Threat & Vulnerability Management]()
|
||||||
#### [Overview of Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)
|
#### [Overview of Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)
|
||||||
#### [Supported operating systems and platforms](microsoft-defender-atp/tvm-supported-os.md)
|
#### [Supported operating systems and platforms](microsoft-defender-atp/tvm-supported-os.md)
|
||||||
#### [What's in the dashboard and what it means for my organization](microsoft-defender-atp/tvm-dashboard-insights.md)
|
#### [Dashboard insights](microsoft-defender-atp/tvm-dashboard-insights.md)
|
||||||
#### [Exposure score](microsoft-defender-atp/tvm-exposure-score.md)
|
#### [Exposure score](microsoft-defender-atp/tvm-exposure-score.md)
|
||||||
#### [Configuration score](microsoft-defender-atp/configuration-score.md)
|
#### [Configuration score](microsoft-defender-atp/configuration-score.md)
|
||||||
#### [Security recommendations](microsoft-defender-atp/tvm-security-recommendation.md)
|
#### [Security recommendations](microsoft-defender-atp/tvm-security-recommendation.md)
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 116 KiB After Width: | Height: | Size: 115 KiB |
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Threat & Vulnerability Management dashboard overview
|
title: Threat & Vulnerability Management dashboard insights
|
||||||
description: The Threat & Vulnerability Management dashboard can help SecOps and security admins address cybersecurity threats and build their organization's security resilience.
|
description: The Threat & Vulnerability Management dashboard can help SecOps and security admins address cybersecurity threats and build their organization's security resilience.
|
||||||
keywords: mdatp-tvm, mdatp-tvm dashboard, threat & vulnerability management, risk-based threat & vulnerability management, security configuration, configuration score, exposure score
|
keywords: mdatp-tvm, mdatp-tvm dashboard, threat & vulnerability management, risk-based threat & vulnerability management, security configuration, configuration score, exposure score
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
@ -16,7 +16,7 @@ audience: ITPro
|
|||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
---
|
---
|
||||||
# Threat & Vulnerability Management dashboard overview
|
# Threat & Vulnerability Management dashboard insights
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
|
@ -61,7 +61,7 @@ Go to the Threat & Vulnerability Management navigation menu and select **Securit
|
|||||||
|
|
||||||
In a given day as a Security Administrator, you can take a look at the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side-by-side with your [configuration score](configuration-score.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's security configuration to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
|
In a given day as a Security Administrator, you can take a look at the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side-by-side with your [configuration score](configuration-score.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's security configuration to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
The top security recommendations lists the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation will take you to the security recommendations page with more details about the recommendation.
|
The top security recommendations lists the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation will take you to the security recommendations page with more details about the recommendation.
|
||||||
|
|
||||||
@ -71,11 +71,11 @@ View recommendations, the number of weaknesses found, related components, threat
|
|||||||
|
|
||||||
The color of the **Exposed machines** graph changes as the trend changes. If the number of exposed machines is on the rise, the color changes into red. If there's a decrease in the number of exposed machines, the color of the graph will change into green.
|
The color of the **Exposed machines** graph changes as the trend changes. If the number of exposed machines is on the rise, the color changes into red. If there's a decrease in the number of exposed machines, the color of the graph will change into green.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Icons
|
### Icons
|
||||||
|
|
||||||
Useful icons also quickly calls your attention to: <ul><li>  possible active alerts</li><li> associated public exploits</li><li> recommendation insights</li></ul><br>
|
Useful icons also quickly calls your attention to: <ul><li>  possible active alerts</li><li> associated public exploits</li><li> recommendation insights</li></ul><br>
|
||||||
|
|
||||||
### Investigate
|
### Investigate
|
||||||
|
|
||||||
|
@ -42,11 +42,11 @@ View software on specific machines in the individual machines pages from the [ma
|
|||||||
## Software inventory overview
|
## Software inventory overview
|
||||||
|
|
||||||
The **Software inventory** page opens with a list of software installed in your network, vendor name, weaknesses found, threats associated with them, exposed machines, impact to exposure score, and tags. You can also filter the software inventory list view based on weaknesses found in the software, threats associated with them, and whether the software or software versions have reached end-of-support.
|
The **Software inventory** page opens with a list of software installed in your network, vendor name, weaknesses found, threats associated with them, exposed machines, impact to exposure score, and tags. You can also filter the software inventory list view based on weaknesses found in the software, threats associated with them, and whether the software or software versions have reached end-of-support.
|
||||||

|

|
||||||
|
|
||||||
Select the software that you want to investigate and a flyout panel opens up with a more compact view of the information on the page. You can either dive deeper into the investigation and select **Open software page**, or flag any technical inconsistencies by selecting **Report inaccuracy**.
|
Select the software that you want to investigate and a flyout panel opens up with a more compact view of the information on the page. You can either dive deeper into the investigation and select **Open software page**, or flag any technical inconsistencies by selecting **Report inaccuracy**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Software pages
|
## Software pages
|
||||||
|
|
||||||
@ -56,7 +56,7 @@ Once you are in the Software inventory page and have opened the flyout panel by
|
|||||||
- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs of the number of exposed machines
|
- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs of the number of exposed machines
|
||||||
- Tabs with lists of the corresponding security recommendations for the weaknesses and vulnerabilities identified, the named CVEs of discovered vulnerabilities, the names of the machines that the software is installed on, and the specific versions of the software with the number of machines that have each version installed and number of vulnerabilities.
|
- Tabs with lists of the corresponding security recommendations for the weaknesses and vulnerabilities identified, the named CVEs of discovered vulnerabilities, the names of the machines that the software is installed on, and the specific versions of the software with the number of machines that have each version installed and number of vulnerabilities.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Software evidence
|
## Software evidence
|
||||||
|
|
||||||
@ -65,7 +65,7 @@ You can find it on any machines found in the [machines list](machines-view-overv
|
|||||||
|
|
||||||
From the Microsoft Defender Security Center navigation panel, go to **Machines list** > select the name of a machine to open the machine page (like Computer1) > select the **Software inventory** tab > select the software name to open the flyout and view software evidence.
|
From the Microsoft Defender Security Center navigation panel, go to **Machines list** > select the name of a machine to open the machine page (like Computer1) > select the **Software inventory** tab > select the software name to open the flyout and view software evidence.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Report inaccuracy
|
## Report inaccuracy
|
||||||
|
|
||||||
|
@ -41,7 +41,7 @@ Windows Server 2019 | Operating System (OS) vulnerabilities<br/>Software product
|
|||||||
MacOS | Not supported (planned)
|
MacOS | Not supported (planned)
|
||||||
Linux | Not supported (planned)
|
Linux | Not supported (planned)
|
||||||
|
|
||||||
Some of the above prerequisites might be different from the [Minimum requirements for Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements) list.
|
Some of the above prerequisites might be different from the [Minimum requirements for Microsoft Defender ATP](minimum-requirements.md) list.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
@ -51,7 +51,7 @@ Go to the Threat & Vulnerability Management navigation menu and select **Weaknes
|
|||||||
|
|
||||||
1. Go to the global search drop-down menu.
|
1. Go to the global search drop-down menu.
|
||||||
2. Select **Vulnerability** and key-in the Common Vulnerabilities and Exposures (CVE) ID that you are looking for, then select the search icon. The **Weaknesses** page opens with the CVE information that you are looking for.
|
2. Select **Vulnerability** and key-in the Common Vulnerabilities and Exposures (CVE) ID that you are looking for, then select the search icon. The **Weaknesses** page opens with the CVE information that you are looking for.
|
||||||

|

|
||||||
3. Select the CVE and a flyout panel opens up with more information - the vulnerability description, exploits available, severity level, CVSS v3 rating, publishing and update dates.
|
3. Select the CVE and a flyout panel opens up with more information - the vulnerability description, exploits available, severity level, CVSS v3 rating, publishing and update dates.
|
||||||
|
|
||||||
To see the rest of the vulnerabilities in the **Weaknesses** page, type CVE, then click search.
|
To see the rest of the vulnerabilities in the **Weaknesses** page, type CVE, then click search.
|
||||||
@ -67,26 +67,26 @@ If the **Exposed Machines** column shows 0, that means you are not at risk. If e
|
|||||||
You can view the related breach and threat insights in the **Threat** column when the icons are colored red.
|
You can view the related breach and threat insights in the **Threat** column when the icons are colored red.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight  icon and breach insight  icon.
|
> Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight icon  and breach insight icon .
|
||||||
|
|
||||||
The breach insights icon is highlighted if there is a vulnerability found in your organization.
|
The breach insights icon is highlighted if there is a vulnerability found in your organization.
|
||||||

|

|
||||||
|
|
||||||
The threat insights icon is highlighted if there are associated exploits in the vulnerability found in your organization. It also shows whether the threat is a part of an exploit kit or connected to specific advanced persistent campaigns or activity groups. Threat Analytics report links are provided that you can read with zero-day exploitation news, disclosures, or related security advisories.
|
The threat insights icon is highlighted if there are associated exploits in the vulnerability found in your organization. It also shows whether the threat is a part of an exploit kit or connected to specific advanced persistent campaigns or activity groups. Threat Analytics report links are provided that you can read with zero-day exploitation news, disclosures, or related security advisories.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## View Common Vulnerabilities and Exposures (CVE) entries in other places
|
## View Common Vulnerabilities and Exposures (CVE) entries in other places
|
||||||
|
|
||||||
### Top vulnerable software in the dashboard
|
### Top vulnerable software in the dashboard
|
||||||
|
|
||||||
1. Go to the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You will see the number of vulnerabilities found in each software along with threat information and a high-level view of the device exposure trend over time.
|
1. Go to the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You will see the number of vulnerabilities found in each software along with threat information and a high-level view of the device exposure trend over time.
|
||||||

|

|
||||||
2. Select the software that you want to investigate to go a drill down page.
|
2. Select the software that you want to investigate to go a drill down page.
|
||||||
3. Select the **Discovered vulnerabilities** tab.
|
3. Select the **Discovered vulnerabilities** tab.
|
||||||
4. Select the vulnerability that you want to investigate. A flyout panel will appear with the vulnerability details, such as: CVE description, CVE ID, exploits available, CVSS V3 rating, severity, publish, and update dates.
|
4. Select the vulnerability that you want to investigate. A flyout panel will appear with the vulnerability details, such as: CVE description, CVE ID, exploits available, CVSS V3 rating, severity, publish, and update dates.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Discover vulnerabilities in the machine page
|
### Discover vulnerabilities in the machine page
|
||||||
|
|
||||||
@ -104,7 +104,7 @@ View related weaknesses information in the machine page.
|
|||||||
|
|
||||||
Similar to the software evidence, we now show the detection logic we applied on a machine in order to state that it's vulnerable. This is a new section called "Detection Logic" (in any discovered vulnerability in the machine page) that shows the detection logic and source.
|
Similar to the software evidence, we now show the detection logic we applied on a machine in order to state that it's vulnerable. This is a new section called "Detection Logic" (in any discovered vulnerability in the machine page) that shows the detection logic and source.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Report inaccuracy
|
## Report inaccuracy
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user