mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
new images
This commit is contained in:
Binary file not shown.
After Width: | Height: | Size: 106 KiB |
Binary file not shown.
After Width: | Height: | Size: 66 KiB |
@ -32,15 +32,17 @@ ms.topic: article
|
|||||||
|
|
||||||
A zero-day vulnerability is a publicly disclosed vulnerability for which no official patches or security updates have been released. Zero-day vulnerabilities often have high severity levels and are actively exploited.
|
A zero-day vulnerability is a publicly disclosed vulnerability for which no official patches or security updates have been released. Zero-day vulnerabilities often have high severity levels and are actively exploited.
|
||||||
|
|
||||||
Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender Security Center:
|
## Find information about zero-day vulnerabilities
|
||||||
|
|
||||||
## Threat and vulnerability management dashboard
|
Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender Security Center.
|
||||||
|
|
||||||
|
### Threat and vulnerability management dashboard
|
||||||
|
|
||||||
Find recommendations with a zero-day tag in the “Top security recommendation” card.
|
Find recommendations with a zero-day tag in the “Top security recommendation” card.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Weaknesses page
|
### Weaknesses page
|
||||||
|
|
||||||
Find the named zero-day vulnerability along with a description and details.
|
Find the named zero-day vulnerability along with a description and details.
|
||||||
|
|
||||||
@ -50,19 +52,7 @@ Find the named zero-day vulnerability along with a description and details.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Software inventory page
|
### Security recommendations page
|
||||||
|
|
||||||
Find software with the zero-day tag.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Software page
|
|
||||||
|
|
||||||
Find a zero-day tag for each software that has been affected by the zero–day vulnerability.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Security recommendations page
|
|
||||||
|
|
||||||
Clear suggestions regarding remediation and mitigation options, including workarounds if exist.
|
Clear suggestions regarding remediation and mitigation options, including workarounds if exist.
|
||||||
|
|
||||||
@ -70,8 +60,30 @@ When there is an application with associated zero-day vulnerability and addition
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
## Addressing the zero-day vulnerability
|
||||||
|
|
||||||
|
Go to the security recommendation page
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Patching the zero-day vulnerability
|
||||||
|
|
||||||
When a patch is released for the zero-day, the recommendation will be changed to “Update” and a blue label next to it that says “New security update for zero day.”
|
When a patch is released for the zero-day, the recommendation will be changed to “Update” and a blue label next to it that says “New security update for zero day.”
|
||||||
|
|
||||||
|
## Other places to find vulnerable software
|
||||||
|
|
||||||
|
### Software inventory page
|
||||||
|
|
||||||
|
Find software with the zero-day tag.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Software page
|
||||||
|
|
||||||
|
Find a zero-day tag for each software that has been affected by the zero–day vulnerability.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
Reference in New Issue
Block a user