mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
Updated based on SME feedback
This commit is contained in:
parent
1aa6e8a750
commit
d3abd35fed
@ -182,18 +182,18 @@ ComputerName=any(ComputerName) by MachineId, AlertId
|
|||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## Conduct an inventory of application or application versions which have reached their end-of-life
|
## Conduct an inventory of software or software versions which have reached their end-of-life
|
||||||
End-of-life for application or application versions means that they will no longer be supported nor serviced. When you use application or application versions which have reached their end-of-life, you're exposing your organization to security vulnerabilities, legal, and financial risks.
|
End-of-life for software or software versions means that they will no longer be supported nor serviced. When you use software or software versions which have reached their end-of-life, you're exposing your organization to security vulnerabilities, legal, and financial risks.
|
||||||
|
|
||||||
It is crucial for you as Security and IT Administrators to work together and ensure that your organization's software inventory is configured for optimal results, compliance, and a healthy network ecosystem.
|
It is crucial for you as Security and IT Administrators to work together and ensure that your organization's software inventory is configured for optimal results, compliance, and a healthy network ecosystem.
|
||||||
|
|
||||||
To conduct an inventory of application or application versions which have reached their end of life:
|
To conduct an inventory of software or software versions which have reached their end of life:
|
||||||
1. From the Threat & Vulnerability Management menu, navigate to **Security recommendations**.
|
1. From the Threat & Vulnerability Management menu, navigate to **Security recommendations**.
|
||||||
2. Go to the **Filters** panel and select **Software uninstall** from **Remediation Type** options if you want to see the list of software recommendations associated with applications which have reached their end-of-life (tagged as **EOL**). Select **Software update** from **Remediation Type** options if you want to see the list of software recommendations associated with application versions which have reached their end-of-life (tagged as **EOL versions**).
|
2. Go to the **Filters** panel and select **Software uninstall** from **Remediation Type** options if you want to see the list of software recommendations associated with software which have reached their end-of-life (tagged as **EOL software**). Select **Software update** from **Remediation Type** options if you want to see the list of software recommendations associated with software versions which have reached their end-of-life (tagged as **EOL versions installed**).
|
||||||
3. Select an application that you'd like to investigate. A fly-out screen opens where you can select **Open software page**
|
3. Select a software that you'd like to investigate. A fly-out screen opens where you can select **Open software page**
|
||||||
4. In the **Software page** select the **Version distribution** tab to know which versions of the application have reached their end-of-life, and how many vulnerabilities were discovered in it.
|
4. In the **Software page** select the **Version distribution** tab to know which versions of the software have reached their end-of-life, and how many vulnerabilities were discovered in it.
|
||||||
|
|
||||||
After you have identified which applications and application versions are vulnerable due to its end-of-life status, remediate them to lower your organizations exposure to vulnerabilities and advanced persistent threats. See [Remediation and exception](tvm-remediation.md) for details.
|
After you have identified which software and software versions are vulnerable due to its end-of-life status, remediate them to lower your organizations exposure to vulnerabilities and advanced persistent threats. See [Remediation and exception](tvm-remediation.md) for details.
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
Loading…
x
Reference in New Issue
Block a user