mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Update threat-and-vuln-mgt-scenarios.md
This commit is contained in:
parent
0acd233dec
commit
c25b93c34e
@ -53,13 +53,13 @@ You can reduce the exposure score by remediating issues based on prioritized sec
|
|||||||
To lower down your threat and vulnerability exposure:
|
To lower down your threat and vulnerability exposure:
|
||||||
|
|
||||||
1. Review the **Top security recommendations** from your **Threat & Vulnerability Management dashboard**, and select the first item on the list. This opens the **Security recommendation** page.
|
1. Review the **Top security recommendations** from your **Threat & Vulnerability Management dashboard**, and select the first item on the list. This opens the **Security recommendation** page.
|
||||||
 icon.
|

|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> There are two types of recommendations:
|
> There are two types of recommendations:
|
||||||
> - <i>Security update</i> which refers to recommendations that require a package installation
|
> - <i>Security update</i> which refers to recommendations that require a package installation
|
||||||
> - <i>Configuration</i> change which refers to recommendations that require a registry or GPO modification
|
> - <i>Configuration</i> change which refers to recommendations that require a registry or GPO modification
|
||||||
> Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight 
|
> Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight  icon.
|
||||||
|
|
||||||
2. In the **Security recommendations** page, you will see the description of what needs to be done and why. It shows the vulnerability details, such as the associated exploits affecting what machines and its business impact. Click **Open software page** option from the flyout menu. 
|
2. In the **Security recommendations** page, you will see the description of what needs to be done and why. It shows the vulnerability details, such as the associated exploits affecting what machines and its business impact. Click **Open software page** option from the flyout menu. 
|
||||||
|
|
||||||
@ -78,14 +78,12 @@ To lower down your threat and vulnerability exposure:
|
|||||||
Remediating issues in the security recommendations list will improve your configuration. As you do so, your configuration score improves, which means building your organization's resilience against cybersecurity threats and vulnerabilities stronger.
|
Remediating issues in the security recommendations list will improve your configuration. As you do so, your configuration score improves, which means building your organization's resilience against cybersecurity threats and vulnerabilities stronger.
|
||||||
|
|
||||||
1. From the Configuration score widget, select **Security controls**. This opens the **Security recommendations** page showing the list of issues related to security controls.
|
1. From the Configuration score widget, select **Security controls**. This opens the **Security recommendations** page showing the list of issues related to security controls.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select the first item on the list. This opens the flyout menu with the description of the security controls issue, a short description of the potential risk, insights, configuration ID, exposed machines, and business impact. Click **Remediation options**.
|
2. Select the first item on the list. This opens the flyout menu with the description of the security controls issue, a short description of the potential risk, insights, configuration ID, exposed machines, and business impact. Click **Remediation options**.
|
||||||

|

|
||||||
|
|
||||||
3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to the email that you can send to your IT Administrator for follow-up.
|
3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to the email that you can send to your IT Administrator for follow-up.
|
||||||
|
|
||||||
.
|
.
|
||||||
|
|
||||||
You will see a confirmation message that the remediation task has been created.
|
You will see a confirmation message that the remediation task has been created.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user