Updated based on SME feedback

This commit is contained in:
Dulce Montemayor 2019-12-05 08:48:09 -08:00 committed by GitHub
parent 1aa6e8a750
commit d3abd35fed
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -182,18 +182,18 @@ ComputerName=any(ComputerName) by MachineId, AlertId
``` ```
## Conduct an inventory of application or application versions which have reached their end-of-life ## Conduct an inventory of software or software versions which have reached their end-of-life
End-of-life for application or application versions means that they will no longer be supported nor serviced. When you use application or application versions which have reached their end-of-life, you're exposing your organization to security vulnerabilities, legal, and financial risks. End-of-life for software or software versions means that they will no longer be supported nor serviced. When you use software or software versions which have reached their end-of-life, you're exposing your organization to security vulnerabilities, legal, and financial risks.
It is crucial for you as Security and IT Administrators to work together and ensure that your organization's software inventory is configured for optimal results, compliance, and a healthy network ecosystem. It is crucial for you as Security and IT Administrators to work together and ensure that your organization's software inventory is configured for optimal results, compliance, and a healthy network ecosystem.
To conduct an inventory of application or application versions which have reached their end of life: To conduct an inventory of software or software versions which have reached their end of life:
1. From the Threat & Vulnerability Management menu, navigate to **Security recommendations**. 1. From the Threat & Vulnerability Management menu, navigate to **Security recommendations**.
2. Go to the **Filters** panel and select **Software uninstall** from **Remediation Type** options if you want to see the list of software recommendations associated with applications which have reached their end-of-life (tagged as **EOL**). Select **Software update** from **Remediation Type** options if you want to see the list of software recommendations associated with application versions which have reached their end-of-life (tagged as **EOL versions**). 2. Go to the **Filters** panel and select **Software uninstall** from **Remediation Type** options if you want to see the list of software recommendations associated with software which have reached their end-of-life (tagged as **EOL software**). Select **Software update** from **Remediation Type** options if you want to see the list of software recommendations associated with software versions which have reached their end-of-life (tagged as **EOL versions installed**).
3. Select an application that you'd like to investigate. A fly-out screen opens where you can select **Open software page** 3. Select a software that you'd like to investigate. A fly-out screen opens where you can select **Open software page**
4. In the **Software page** select the **Version distribution** tab to know which versions of the application have reached their end-of-life, and how many vulnerabilities were discovered in it. 4. In the **Software page** select the **Version distribution** tab to know which versions of the software have reached their end-of-life, and how many vulnerabilities were discovered in it.
After you have identified which applications and application versions are vulnerable due to its end-of-life status, remediate them to lower your organizations exposure to vulnerabilities and advanced persistent threats. See [Remediation and exception](tvm-remediation.md) for details. After you have identified which software and software versions are vulnerable due to its end-of-life status, remediate them to lower your organizations exposure to vulnerabilities and advanced persistent threats. See [Remediation and exception](tvm-remediation.md) for details.
## Related topics ## Related topics