mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 23:37:22 +00:00
Tweaks
This commit is contained in:
parent
344a99b056
commit
b716303fa1
@ -46,7 +46,7 @@ Each section of the analyst report is designed to provide actionable information
|
||||
| Change log | The time the report was published and when significant changes were made to the report. |
|
||||
|
||||
## Apply additional mitigations
|
||||
Threat analytics dynamically tracks the [status of security updates and secure configurations](threat-analytics.md#review-list-of-mitigations-and-the-status-of-your-devices). This information is available as charts and tables in the **Mitigations** tab.
|
||||
Threat analytics dynamically tracks the [status of security updates and secure configurations](threat-analytics.md#mitigations-review-list-of-mitigations-and-the-status-of-your-devices). This information is available as charts and tables in the **Mitigations** tab.
|
||||
|
||||
In addition to these tracked mitigations, the analyst report also discusses mitigations that are _not_ dynamically monitored. Here are some examples of important mitigations that are not dynamically tracked:
|
||||
|
||||
|
@ -82,7 +82,9 @@ Each report includes charts that provide an overview of how resilient your organ
|
||||
- **Vulnerability patching status**—shows the number of devices that have applied security updates or patches that address vulnerabilities exploited by the threat.
|
||||
|
||||
### Analyst report: Get expert insight from Microsoft security researchers
|
||||
Go to the [**Analyst report** section](threat-analytics-analyst-reports.md) to read through the detailed expert write-up. Most reports provide detailed descriptions of attack chains, including tactics and techniques mapped to the MITRE ATT&CK framework, exhaustive lists of recommendations, and powerful [threat hunting](advanced-hunting-overview.md) guidance.
|
||||
Go to the **Analyst report** section to read through the detailed expert write-up. Most reports provide detailed descriptions of attack chains, including tactics and techniques mapped to the MITRE ATT&CK framework, exhaustive lists of recommendations, and powerful [threat hunting](advanced-hunting-overview.md) guidance.
|
||||
|
||||
[Learn more about the analyst report](threat-analytics-analyst-reports.md)
|
||||
|
||||
### Mitigations: Review list of mitigations and the status of your devices
|
||||
In the **Mitigations** section, review the list of specific actionable recommendations that can help you increase your organizational resilience against the threat. The list of tracked mitigations includes:
|
||||
|
Loading…
x
Reference in New Issue
Block a user