mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
updated alt text
This commit is contained in:
parent
262bb8c6ef
commit
c7ca777f50
@ -51,20 +51,20 @@ You can remediate the issues based on prioritized [security recommendations](tvm
|
||||
|
||||
To lower your threat and vulnerability exposure, follow these steps.
|
||||
|
||||
1. Review the **Top security recommendations** from your [**Threat & Vulnerability Management dashboard**](tvm-dashboard-insights.md) , and select the first item on the list. The **Security recommendation** page opens.
|
||||
1. Review the **Top security recommendations** from your [**Threat & Vulnerability Management dashboard**](tvm-dashboard-insights.md) and select an item on the list.
|
||||
|
||||
Always prioritize recommendations that are associated with ongoing threats:
|
||||

|
||||
|
||||
-  Threat insight icon
|
||||
-  Active alert icon
|
||||
Always prioritize recommendations that are associated with ongoing threats:
|
||||
|
||||

|
||||
-  Threat insight icon
|
||||
-  Active alert icon
|
||||
|
||||
2. The **Security recommendations** page shows the list of items to remediate. Select the security recommendation that you need to investigate. When you select a recommendation from the list, a fly-out panel will display a description of what you need to remediate, number of vulnerabilities, associated exploits in machines, number of exposed machines and their machine names, business impact, and a list of CVEs. Click **Open software page** option from the flyout panel. 
|
||||
2. The **Security recommendations** page will open, and a flyout for the recommendation you selected will open. The flyout panel will display a description of what you need to remediate, number of vulnerabilities, associated exploits in machines, number of exposed machines and their machine names, business impact, and a list of CVEs. Select **Open software page** option from the flyout panel. 
|
||||
|
||||
3. Select **Installed machines** and then the affected machine from the list. A flyout panel will open with the relevant machine details, exposure and risk levels, alert and incident activities. 
|
||||
3. Select **Installed machines** and then the affected machine from the list. A flyout panel will open with the relevant machine details, exposure and risk levels, alert and incident activities. 
|
||||
|
||||
4. Click **Open machine page** to connect to the machine and apply the selected recommendation. See [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) for details. 
|
||||
4. Click **Open machine page** to connect to the machine and apply the selected recommendation. See [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) for details. 
|
||||
|
||||
5. Allow a few hours for the changes to propagate in the system.
|
||||
|
||||
|
@ -91,7 +91,7 @@ The exception impact shows on both the Security recommendations page column and
|
||||
|
||||
Select **Show exceptions** at the bottom of the **Top security recommendations** card in the dashboard to open a filtered view in the **Security recommendations** page of recommendations with an "Exception" status.
|
||||
|
||||

|
||||

|
||||
|
||||
## Related topics
|
||||
|
||||
|
@ -75,7 +75,7 @@ The color of the **Exposed machines** graph changes as the trend changes. If the
|
||||
|
||||
### Icons
|
||||
|
||||
Useful icons also quickly calls your attention to: <ul><li>  possible active alerts</li><li> associated public exploits</li><li> recommendation insights</li></ul><br>
|
||||
Useful icons also quickly calls your attention to: <ul><li>  possible active alerts</li><li> associated public exploits</li><li> recommendation insights</li></ul><br>
|
||||
|
||||
### Investigate
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user