mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 05:13:40 +00:00
new images
This commit is contained in:
Binary file not shown.
After Width: | Height: | Size: 106 KiB |
Binary file not shown.
After Width: | Height: | Size: 66 KiB |
@ -32,15 +32,17 @@ ms.topic: article
|
||||
|
||||
A zero-day vulnerability is a publicly disclosed vulnerability for which no official patches or security updates have been released. Zero-day vulnerabilities often have high severity levels and are actively exploited.
|
||||
|
||||
Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender Security Center:
|
||||
## Find information about zero-day vulnerabilities
|
||||
|
||||
## Threat and vulnerability management dashboard
|
||||
Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender Security Center.
|
||||
|
||||
### Threat and vulnerability management dashboard
|
||||
|
||||
Find recommendations with a zero-day tag in the “Top security recommendation” card.
|
||||
|
||||

|
||||
|
||||
## Weaknesses page
|
||||
### Weaknesses page
|
||||
|
||||
Find the named zero-day vulnerability along with a description and details.
|
||||
|
||||
@ -50,28 +52,38 @@ Find the named zero-day vulnerability along with a description and details.
|
||||
|
||||

|
||||
|
||||
## Software inventory page
|
||||
### Security recommendations page
|
||||
|
||||
Clear suggestions regarding remediation and mitigation options, including workarounds if exist.
|
||||
|
||||
When there is an application with associated zero-day vulnerability and additional vulnerabilities to address, you will get one recommendation regarding both.
|
||||
|
||||

|
||||
|
||||
## Addressing the zero-day vulnerability
|
||||
|
||||
Go to the security recommendation page
|
||||
|
||||

|
||||
|
||||
## Patching the zero-day vulnerability
|
||||
|
||||
When a patch is released for the zero-day, the recommendation will be changed to “Update” and a blue label next to it that says “New security update for zero day.”
|
||||
|
||||
## Other places to find vulnerable software
|
||||
|
||||
### Software inventory page
|
||||
|
||||
Find software with the zero-day tag.
|
||||
|
||||

|
||||
|
||||
## Software page
|
||||
### Software page
|
||||
|
||||
Find a zero-day tag for each software that has been affected by the zero–day vulnerability.
|
||||
|
||||

|
||||
|
||||
## Security recommendations page
|
||||
|
||||
Clear suggestions regarding remediation and mitigation options, including workarounds if exist.
|
||||
|
||||
When there is an application with associated zero-day vulnerability and additional vulnerabilities to address , you will get one recommendation regarding both.
|
||||
|
||||

|
||||
|
||||
When a patch is released for the zero-day, the recommendation will be changed to “Update” and a blue label next to it that says “New security update for zero day.”
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md)
|
||||
|
Reference in New Issue
Block a user