mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-20 17:27:23 +00:00
updated text
This commit is contained in:
parent
500cb3164f
commit
c0629c12c2
Binary file not shown.
After Width: | Height: | Size: 84 KiB |
Binary file not shown.
Before Width: | Height: | Size: 70 KiB |
Binary file not shown.
After Width: | Height: | Size: 67 KiB |
Binary file not shown.
Before Width: | Height: | Size: 145 KiB After Width: | Height: | Size: 80 KiB |
@ -60,20 +60,17 @@ Select **Custom range** to change the date range to another custom one, or a pre
|
|||||||
|
|
||||||
## Event timeline overview
|
## Event timeline overview
|
||||||
|
|
||||||
On the Event timeline page, you can view the date, event, related software component, number of impacted machines for when the event occurred, and type. You can also customize columns and filter by type or percent of impacted machines.
|
On the Event timeline page, you can view the all the necesssary info related to an event.
|
||||||
|
|
||||||
|
Features:
|
||||||
|
|
||||||
|
- Customize columns
|
||||||
|
- Filter by event type or percent of impacted machines
|
||||||
|
- View 30, 50, or 100 items per page
|
||||||
|
|
||||||
The two large numbers at the top of the page show the number of new vulnerabilities and exploitable vulnerabilities, not events. Some events can have multiple vulnerabilities, and some vulnerabilities can have multiple events.
|
The two large numbers at the top of the page show the number of new vulnerabilities and exploitable vulnerabilities, not events. Some events can have multiple vulnerabilities, and some vulnerabilities can have multiple events.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Icons
|
|
||||||
|
|
||||||
The following icons show up next to events:
|
|
||||||
|
|
||||||
-  New public exploit
|
|
||||||
-  New vulnerability was published
|
|
||||||
-  Exploit found in exploit kit
|
|
||||||
-  Exploit verified
|
|
||||||
|
|
||||||
### Columns
|
### Columns
|
||||||
|
|
||||||
@ -89,6 +86,15 @@ The following icons show up next to events:
|
|||||||
- New vulnerability
|
- New vulnerability
|
||||||
- **Score trend**: exposure score trend
|
- **Score trend**: exposure score trend
|
||||||
|
|
||||||
|
### Icons
|
||||||
|
|
||||||
|
The following icons show up next to events:
|
||||||
|
|
||||||
|
-  New public exploit
|
||||||
|
-  New vulnerability was published
|
||||||
|
-  Exploit found in exploit kit
|
||||||
|
-  Exploit verified
|
||||||
|
|
||||||
### Drill down to a specific event
|
### Drill down to a specific event
|
||||||
|
|
||||||
Once you select an event, a flyout will appear listing the details and current CVEs that affect your machines. You can show more CVEs or view the related recommendation.
|
Once you select an event, a flyout will appear listing the details and current CVEs that affect your machines. You can show more CVEs or view the related recommendation.
|
||||||
@ -101,7 +107,11 @@ From there, select **Go to related security recommendation** to go to the [secur
|
|||||||
|
|
||||||
## View Event timelines in software pages
|
## View Event timelines in software pages
|
||||||
|
|
||||||
tvm-software-inventory#software-pages
|
To open a software page, select an event > select the hyperlinked software name (like Visual Studio 2017) in the section called "Related component" in the flyout. [Learn more about software pages](tvm-software-inventory.md#software-pages)
|
||||||
|
|
||||||
|
A full page will appear with all the details of a specific software, including an event timeline tab. From there you can view all the events related to that software, along with security recommendations, discovered vulnerabilities, installed machines, and version distribution.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
@ -54,9 +54,9 @@ You can view software pages a few different ways:
|
|||||||
|
|
||||||
- Software inventory page > Select a software name > Select **Open software page** in the flyout
|
- Software inventory page > Select a software name > Select **Open software page** in the flyout
|
||||||
- [Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
|
- [Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
|
||||||
-
|
- [Event timeline page](threat-and-vuln-mgt-event-timeline) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the section called "Related component" in the flyout
|
||||||
|
|
||||||
Once you are in the Software inventory page and have opened the flyout panel by selecting a software to investigate, select **Open software page** (see image in the previous section). A full page will appear with all the details of a specific software and the following information:
|
A full page will appear with all the details of a specific software and the following information:
|
||||||
|
|
||||||
- Side panel with vendor information, prevalence of the software in the organization (including number of machines it is installed on, and exposed machines that are not patched), whether and exploit is available, and impact to your exposure score
|
- Side panel with vendor information, prevalence of the software in the organization (including number of machines it is installed on, and exposed machines that are not patched), whether and exploit is available, and impact to your exposure score
|
||||||
- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs of the number of exposed machines
|
- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs of the number of exposed machines
|
||||||
|
Loading…
x
Reference in New Issue
Block a user