mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
Merging changes synced from https://github.com/MicrosoftDocs/windows-docs-pr (branch live)
This commit is contained in:
@ -1,5 +1,4 @@
|
|||||||
# [HoloLens overview](index.md)
|
# [HoloLens overview](index.md)
|
||||||
# [Hololens status](hololens-status.md)
|
|
||||||
|
|
||||||
# Get Started with HoloLens 2
|
# Get Started with HoloLens 2
|
||||||
## [HoloLens 2 hardware](hololens2-hardware.md)
|
## [HoloLens 2 hardware](hololens2-hardware.md)
|
||||||
@ -60,5 +59,7 @@
|
|||||||
## [Known issues](hololens-known-issues.md)
|
## [Known issues](hololens-known-issues.md)
|
||||||
## [Frequently asked questions](hololens-faq.md)
|
## [Frequently asked questions](hololens-faq.md)
|
||||||
|
|
||||||
|
# [Release Notes](hololens-release-notes.md)
|
||||||
|
# [Hololens status](hololens-status.md)
|
||||||
# [Give us feedback](hololens-feedback.md)
|
# [Give us feedback](hololens-feedback.md)
|
||||||
# [Change history for Microsoft HoloLens documentation](change-history-hololens.md)
|
# [Change history for Microsoft HoloLens documentation](change-history-hololens.md)
|
||||||
|
95
devices/hololens/hololens-release-notes.md
Normal file
95
devices/hololens/hololens-release-notes.md
Normal file
@ -0,0 +1,95 @@
|
|||||||
|
---
|
||||||
|
title: What's new in Microsoft HoloLens
|
||||||
|
description: Learn about updates in each new HoloLens release.
|
||||||
|
author: scooley
|
||||||
|
ms.author: scooley
|
||||||
|
manager: dansimp
|
||||||
|
ms.prod: hololens
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.topic: article
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 10/14/2019
|
||||||
|
audience: ITPro
|
||||||
|
appliesto:
|
||||||
|
- HoloLens 1
|
||||||
|
- HoloLens 2
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
# HoloLens Release Notes
|
||||||
|
|
||||||
|
## HoloLens 2
|
||||||
|
|
||||||
|
### November Update - build 18362.1039
|
||||||
|
|
||||||
|
- Fixes for **"Select"** voice commands during initial set-up for en-CA and en-AU.
|
||||||
|
- Improvements in visual quality of objects placed far away in latest Unity and MRTK versions.
|
||||||
|
- Fixes addressing issues with holographic applications being stuck in a paused state on launch until the pins panel is brought up and dismissed again.
|
||||||
|
- OpenXR runtime conformance fixes and improvements for HoloLens 2 and the emulator.
|
||||||
|
|
||||||
|
## HoloLens (1st gen)
|
||||||
|
|
||||||
|
### Windows 10 Holographic, version 1809
|
||||||
|
|
||||||
|
> **Applies to:** Hololens (1st gen)
|
||||||
|
|
||||||
|
| Feature | Details |
|
||||||
|
|---|---|
|
||||||
|
| **Quick actions menu** | When you're in an app, the Bloom gesture will now open a Quick actions menu to give you quick access to commonly used system features without having to leave the app. <br> See [Set up HoloLens in kiosk mode](hololens-kiosk.md) for information about the Quick actions menu in kiosk mode.<br><br> |
|
||||||
|
| **Stop video capture from the Start or quick actions menu** | If you start video capture from the Start menu or quick actions menu, you’ll be able to stop recording from the same place. (Don’t forget, you can always do this with voice commands too.) |
|
||||||
|
| **Project to a Miracast-enabled device** | Project your HoloLens content to a nearby Surface device or TV/Monitor if using Microsoft Display adapter. On **Start**, select **Connect**, and then select the device you want to project to. **Note:** You can deploy HoloLens to use Miracast projection without enabling developer mode. |
|
||||||
|
| **New notifications** | View and respond to notification toasts on HoloLens, just like you do on a PC. Gaze to respond to or dismiss them (or if you’re in an immersive experience, use the bloom gesture). |
|
||||||
|
| **HoloLens overlays**<br>(file picker, keyboard, dialogs, etc.) | You’ll now see overlays such as the keyboard, dialogs, file picker, etc. when using immersive apps. |
|
||||||
|
| **Visual feedback overlay UI for volume change** | When you use the volume up/down buttons on your HoloLens you’ll see a visual display of the volume level. |
|
||||||
|
| **New UI for device boot** | A loading indicator was added during the boot process to provide visual feedback that the system is loading. Reboot your device to see the new loading indicator—it’s between the "Hello" message and the Windows boot logo. |
|
||||||
|
| **Nearby sharing** | Addition of the Windows Nearby Sharing experience, allowing you to share a capture with a nearby Windows device. When you capture a photo or video on HoloLens (or use the share button from an app such as Microsoft Edge), select a nearby Windows device to share with. |
|
||||||
|
| **Share from Microsoft Edge** | Share button is now available on Microsoft Edge windows on HoloLens. In Microsoft Edge, select **Share**. Use the HoloLens share picker to share web content. |
|
||||||
|
|
||||||
|
#### For international customers
|
||||||
|
|
||||||
|
| Feature | Details |
|
||||||
|
| --- | --- |
|
||||||
|
| Localized Chinese and Japanese builds | Use HoloLens with localized user interface for Simplified Chinese or Japanese, including localized Pinyin keyboard, dictation, and voice commands.<br>[Learn how to install the Chinese and Japanese versions of HoloLens.](hololens1-install-localized.md) |
|
||||||
|
| Speech Synthesis (TTS) | Speech synthesis feature now supports Chinese, Japanese, and English. |
|
||||||
|
|
||||||
|
#### For administrators
|
||||||
|
|
||||||
|
| Feature | Details |
|
||||||
|
|---|----|
|
||||||
|
| [Enable post-setup provisioning](hololens-provisioning.md) | You can now apply a runtime provisioning package at any time using **Settings**. |
|
||||||
|
| Assigned access with Azure AD groups | You can now use Azure AD groups for configuration of Windows assigned access to set up single or multi-app kiosk configuration. |
|
||||||
|
| PIN sign-in on profile switch from sign-in screen | PIN sign-in is now available for **Other User**. |
|
||||||
|
| Sign in with Web Credential Provider using password | You can now select the Globe sign-in option to launch web sign-in with your password. From the sign-in screen, select **Sign-In options** and select the Globe option to launch web sign-in. Enter your user name if needed, then your password. <br>**Note:** You can choose to bypass any PIN/Smartcard options when prompted during web sign-in. |
|
||||||
|
| Read device hardware info through MDM so devices can be tracked by serial number | IT administrators can see and track HoloLens by device serial number in their MDM console. Refer to your MDM documentation for feature availability and instructions. |
|
||||||
|
| Set HoloLens device name through MDM (rename) | IT administrators can see and rename HoloLens devices in their MDM console. Refer to your MDM documentation for feature availability and instructions. |
|
||||||
|
|
||||||
|
### Windows 10, version 1803 for Microsoft HoloLens
|
||||||
|
|
||||||
|
> **Applies to:** Hololens (1st gen)
|
||||||
|
|
||||||
|
Windows 10, version 1803, is the first feature update to Windows Holographic for Business since its release in Windows 10, version 1607. This update introduces the following changes:
|
||||||
|
|
||||||
|
- Previously, you could only verify that upgrade license for Commercial Suite had been applied to your HoloLens device by checking to see if VPN was an available option on the device. Now, **Settings** > **System** will display **Windows Holographic for Business** after the upgrade license is applied. [Learn how to unlock Windows Holographic for Business features](hololens1-upgrade-enterprise.md).
|
||||||
|
|
||||||
|
- You can view the operating system build number in device properties in the File Explorer app and in the [Windows Device Recovery Tool (WDRT)](https://support.microsoft.com/help/12379/windows-10-mobile-device-recovery-tool-faq).
|
||||||
|
- Provisioning a HoloLens device is now easier with the new **Provision HoloLens devices** wizard in the Windows Configuration Designer tool. In the wizard, you can configure the setup experience and network connections, set developer mode, and obtain bulk Azure AD tokens. [Learn how to use the simple provisioning wizard for HoloLens](hololens-provisioning.md#wizard).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- When you create a local account in a provisioning package, the password no longer expires every 42 days.
|
||||||
|
|
||||||
|
- You can [configure HoloLens as a single-app or multi-app kiosk](hololens-kiosk.md). Multi-app kiosk mode lets you set up a HoloLens to only run the apps that you specify, and prevents users from making changes.
|
||||||
|
|
||||||
|
- Media Transfer Protocol (MTP) is enabled so that you can connect the HoloLens device to a PC by USB and transfer files between HoloLens and the PC. You can also use the File Explorer app to move and delete files from within HoloLens.
|
||||||
|
|
||||||
|
- Previously, after you signed in to the device with an Azure Active Directory (Azure AD) account, you then had to **Add work access** in **Settings** to get access to corporate resources. Now, you sign in with an Azure AD account and enrollment happens automatically.
|
||||||
|
|
||||||
|
- Before you sign in, you can choose the network icon below the password field to choose a different Wi-Fi network to connect to. You can also connect to a guest network, such as at a hotel, conference center, or business.
|
||||||
|
|
||||||
|
- You can now easily [share HoloLens with multiple people](hololens-multiple-users.md) using Azure AD accounts.
|
||||||
|
|
||||||
|
- When setup or sign-in fails, choose the new **Collect info** option to get diagnostic logs for troubleshooting.
|
||||||
|
|
||||||
|
- Individual users can sync their corporate email without enrolling their device in mobile device management (MDM). You can use the device with a Microsoft Account, download and install the Mail app, and add an email account directly.
|
||||||
|
|
||||||
|
- You can check the MDM sync status for a device in **Settings** > **Accounts** > **Access Work or School** > **Info**. In the **Device sync status** section, you can start a sync, see areas managed by MDM, and create and export an advanced diagnostics report.
|
@ -13,7 +13,7 @@ ms.author: dansimp
|
|||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
ms.date: 10/21/2019
|
ms.date: 11/26/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot and Surface devices
|
# Windows Autopilot and Surface devices
|
||||||
@ -35,10 +35,17 @@ Enrolling Surface devices in Windows Autopilot at the time of purchase is a capa
|
|||||||
|
|
||||||
When you purchase Surface devices from a Surface partner enabled for Windows Autopilot, your new devices can be enrolled in your Windows Autopilot deployment for you by the partner. Surface partners enabled for Windows Autopilot include:
|
When you purchase Surface devices from a Surface partner enabled for Windows Autopilot, your new devices can be enrolled in your Windows Autopilot deployment for you by the partner. Surface partners enabled for Windows Autopilot include:
|
||||||
|
|
||||||
|
- [ALSO](https://www.also.com/ec/cms5/de_1010/1010_anbieter/microsoft/windows-autopilot/index.jsp)
|
||||||
- [Atea](https://www.atea.com/)
|
- [Atea](https://www.atea.com/)
|
||||||
|
- [Bechtle](https://www.bechtle.com/de-en)
|
||||||
|
- [Cancom](https://www.cancom.de/)
|
||||||
|
- [CDW](https://www.cdw.com/)
|
||||||
|
- [Computacenter](https://www.computacenter.com/uk)
|
||||||
- [Connection](https://www.connection.com/brand/microsoft/microsoft-surface)
|
- [Connection](https://www.connection.com/brand/microsoft/microsoft-surface)
|
||||||
- [Insight](https://www.insight.com/en_US/buy/partner/microsoft/surface/windows-autopilot.html)
|
- [Insight](https://www.insight.com/en_US/buy/partner/microsoft/surface/windows-autopilot.html)
|
||||||
- [SHI](https://www.shi.com/Surface)
|
- [SHI](https://www.shi.com/Surface)
|
||||||
|
- [Synnex](https://www.synnexcorp.com/us/microsoft/surface-autopilot/)
|
||||||
|
- [Techdata](https://www.techdata.com/)
|
||||||
|
|
||||||
## Learn more
|
## Learn more
|
||||||
For more information about Windows Autopilot, refer to:
|
For more information about Windows Autopilot, refer to:
|
||||||
|
@ -34,7 +34,7 @@ Section | Description
|
|||||||
2 | Machine summary (current day)
|
2 | Machine summary (current day)
|
||||||
|
|
||||||
|
|
||||||
|
## Machine trends
|
||||||
By default, the machine trends displays machine information from the 30-day period ending in the latest full day. To gain better perspective on trends occurring in your organization, you can fine-tune the reporting period by adjusting the time period shown. To adjust the time period, select a time range from the drop-down options:
|
By default, the machine trends displays machine information from the 30-day period ending in the latest full day. To gain better perspective on trends occurring in your organization, you can fine-tune the reporting period by adjusting the time period shown. To adjust the time period, select a time range from the drop-down options:
|
||||||
|
|
||||||
- 30 days
|
- 30 days
|
||||||
@ -42,10 +42,17 @@ By default, the machine trends displays machine information from the 30-day peri
|
|||||||
- 6 months
|
- 6 months
|
||||||
- Custom
|
- Custom
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>These filters are only applied on the machine trends section. It doesn't affect the machine summary section.
|
||||||
|
|
||||||
|
## Machine summary
|
||||||
While the machines trends shows trending machine information, the machine summary shows machine information scoped to the current day.
|
While the machines trends shows trending machine information, the machine summary shows machine information scoped to the current day.
|
||||||
|
|
||||||
The machine trends section allows you to drill down to the machines list with the corresponding filter applied to it. For example, clicking on the Inactive bar in the Sensor health state card will bring you the machines list with results showing only machines whose sensor status is inactive.
|
>[!NOTE]
|
||||||
|
>The data reflected in the summary section is scoped to 180 days prior to the current date. For example if today's date is March 27, 2019, the data on the summary section will reflect numbers starting from September 28, 2018 to March 27, 2019.<br>
|
||||||
|
> The filter applied on the trends section is not applied on the summary section.
|
||||||
|
|
||||||
|
The machine trends section allows you to drill down to the machines list with the corresponding filter applied to it. For example, clicking on the Inactive bar in the Sensor health state card will bring you the machines list with results showing only machines whose sensor status is inactive.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -34,7 +34,7 @@ Section | Description
|
|||||||
1 | Alerts trends
|
1 | Alerts trends
|
||||||
2 | Alert summary
|
2 | Alert summary
|
||||||
|
|
||||||
|
## Alert trends
|
||||||
By default, the alert trends display alert information from the 30-day period ending in the latest full day. To gain better perspective on trends occurring in your organization, you can fine-tune the reporting period by adjusting the time period shown. To adjust the time period, select a time range from the drop-down options:
|
By default, the alert trends display alert information from the 30-day period ending in the latest full day. To gain better perspective on trends occurring in your organization, you can fine-tune the reporting period by adjusting the time period shown. To adjust the time period, select a time range from the drop-down options:
|
||||||
|
|
||||||
- 30 days
|
- 30 days
|
||||||
@ -42,11 +42,18 @@ By default, the alert trends display alert information from the 30-day period en
|
|||||||
- 6 months
|
- 6 months
|
||||||
- Custom
|
- Custom
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>These filters are only applied on the alert trends section. It doesn't affect the alert summary section.
|
||||||
|
|
||||||
|
|
||||||
|
## Alert summary
|
||||||
While the alert trends shows trending alert information, the alert summary shows alert information scoped to the current day.
|
While the alert trends shows trending alert information, the alert summary shows alert information scoped to the current day.
|
||||||
|
|
||||||
The alert summary allows you to drill down to a particular alert queue with the corresponding filter applied to it. For example, clicking on the EDR bar in the Detection sources card will bring you the alerts queue with results showing only alerts generated from EDR detections.
|
The alert summary allows you to drill down to a particular alert queue with the corresponding filter applied to it. For example, clicking on the EDR bar in the Detection sources card will bring you the alerts queue with results showing only alerts generated from EDR detections.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The data reflected in the summary section is scoped to 180 days prior to the current date. For example if today's date is November 5, 2019, the data on the summary section will reflect numbers starting from May 5, 2019 to November 5, 2019.<br>
|
||||||
|
> The filter applied on the trends section is not applied on the summary section.
|
||||||
|
|
||||||
## Alert attributes
|
## Alert attributes
|
||||||
The report is made up of cards that display the following alert attributes:
|
The report is made up of cards that display the following alert attributes:
|
||||||
|
@ -52,9 +52,9 @@ Area | Description
|
|||||||
(1) Menu | Select menu to expand the navigation pane and see the names of the Threat & Vulnerability Management capabilities.
|
(1) Menu | Select menu to expand the navigation pane and see the names of the Threat & Vulnerability Management capabilities.
|
||||||
(2) Threat & Vulnerability Management navigation pane | Use the navigation pane to move across the **Threat and Vulnerability Management Dashboard**, **Security recommendations**, **Remediation**, **Software inventory**, and **Weaknesses**.
|
(2) Threat & Vulnerability Management navigation pane | Use the navigation pane to move across the **Threat and Vulnerability Management Dashboard**, **Security recommendations**, **Remediation**, **Software inventory**, and **Weaknesses**.
|
||||||
**Dashboards** | Get a high-level view of the organization exposure score, organization configuration score, machine exposure distribution, top security recommendations, top vulnerable software, top remediation activities, and top exposed machines data.
|
**Dashboards** | Get a high-level view of the organization exposure score, organization configuration score, machine exposure distribution, top security recommendations, top vulnerable software, top remediation activities, and top exposed machines data.
|
||||||
**Security recommendations** | See the list of security recommendations, their related components, insights, number or exposed devices, impact, and request for remediation. You can click each item on the list, a flyout panel opens with vulnerability details, open the software page, see the remediation, and exception options. You can also open a ticket in Intune if your machines are joined through Azure Active Directory and you have enabled your Intune connections in Microsoft Defender ATP. See [Security recommendations](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) for more information.
|
**Security recommendations** | See the list of security recommendations, their related components, whether applications in your network have reached their end-of-life, insights, number or exposed devices, impact, and request for remediation. You can click each item on the list, a flyout panel opens with vulnerability details, open the software page, see the remediation, and exception options. You can also open a ticket in Intune if your machines are joined through Azure Active Directory and you have enabled your Intune connections in Microsoft Defender ATP. See [Security recommendations](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) for more information.
|
||||||
**Remediation** | See the remediation activity, related component, remediation type, status, due date, option to export the remediation and process data to CSV, and active exceptions. See [Remediation and exception](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation) for more information.
|
**Remediation** | See the remediation activity, related component, remediation type, status, due date, option to export the remediation and process data to CSV, and active exceptions. See [Remediation and exception](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation) for more information.
|
||||||
**Software inventory** | See the list of applications, versions, weaknesses, whether there’s an exploit found on the application, prevalence in the organization, how many were installed, how many exposed devices are there, and the numerical value of the impact. You can select each item in the list and opt to open the software page which shows the associated vulnerabilities, misconfigurations, affected machine, version distribution details, and missing KBs or security updates. See [Software inventory](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory) for more information.
|
**Software inventory** | See the list of applications, versions, weaknesses, whether there’s an exploit found on the application, whether the application has reached its end-of-life, prevalence in the organization, how many were installed, how many exposed devices are there, and the numerical value of the impact. You can select each item in the list and opt to open the software page which shows the associated vulnerabilities, misconfigurations, affected machine, version distribution details, and missing KBs or security updates. See [Software inventory](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory) for more information.
|
||||||
**Weaknesses** | See the list of common vulnerabilities and exposures, the severity, its common vulnerability scoring system (CVSS) V3 score, related software, age, when it was published, related threat alerts, and how many exposed machines are there. You can select each item in the list and it opens a flyout panel with the vulnerability description and other details. See [Weaknesses](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses) for more information.
|
**Weaknesses** | See the list of common vulnerabilities and exposures, the severity, its common vulnerability scoring system (CVSS) V3 score, related software, age, when it was published, related threat alerts, and how many exposed machines are there. You can select each item in the list and it opens a flyout panel with the vulnerability description and other details. See [Weaknesses](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses) for more information.
|
||||||
(3) Threat & Vulnerability Management dashboard | Access the **Exposure score**, **Configuration score**, **Exposure distribution**, **Top security recommendations**, **Top vulnerable software**, **Top remediation activities**, and **Top exposed machines**.
|
(3) Threat & Vulnerability Management dashboard | Access the **Exposure score**, **Configuration score**, **Exposure distribution**, **Top security recommendations**, **Top vulnerable software**, **Top remediation activities**, and **Top exposed machines**.
|
||||||
**Selected machine groups (#/#)** | Filter the Threat & Vulnerability Management data that you want to see in the dashboard and widgets by machine groups. What you select in the filter applies throughout the Threat & Vulnerability management pages only.
|
**Selected machine groups (#/#)** | Filter the Threat & Vulnerability Management data that you want to see in the dashboard and widgets by machine groups. What you select in the filter applies throughout the Threat & Vulnerability management pages only.
|
||||||
|
@ -31,7 +31,13 @@ After your organization's cybersecurity weaknesses are identified and mapped to
|
|||||||
You can lower down your organization's exposure from vulnerabilities and increase your security configuration by remediating the security recommendations.
|
You can lower down your organization's exposure from vulnerabilities and increase your security configuration by remediating the security recommendations.
|
||||||
|
|
||||||
## Navigate through your remediation options
|
## Navigate through your remediation options
|
||||||
You'll see your remediation options when you select one of the security recommendation blocks from your **Top security recommendations** widget in the dashboard.
|
You can access the remediation page in a few places in the portal:
|
||||||
|
- Security recommendation flyout panel
|
||||||
|
- Remediation in the navigation menu
|
||||||
|
- Top remediation activities widget in the dashboard
|
||||||
|
|
||||||
|
*Security recommendation flyout page*
|
||||||
|
<br>You'll see your remediation options when you select one of the security recommendation blocks from your **Top security recommendations** widget in the dashboard.
|
||||||
1. From the flyout panel, you'll see the security recommendation details including your next steps. Click **Remediation options**.
|
1. From the flyout panel, you'll see the security recommendation details including your next steps. Click **Remediation options**.
|
||||||
2. In the **Remediation options** page, select **Open a ticket in Intune (for AAD joined devices)**.
|
2. In the **Remediation options** page, select **Open a ticket in Intune (for AAD joined devices)**.
|
||||||
|
|
||||||
@ -43,13 +49,20 @@ You'll see your remediation options when you select one of the security recommen
|
|||||||
|
|
||||||
If you want to check how the ticket shows up in Intune, see [Use Intune to remediate vulnerabilities identified by Microsoft Defender ATP](https://docs.microsoft.com/intune/atp-manage-vulnerabilities) for details.
|
If you want to check how the ticket shows up in Intune, see [Use Intune to remediate vulnerabilities identified by Microsoft Defender ATP](https://docs.microsoft.com/intune/atp-manage-vulnerabilities) for details.
|
||||||
|
|
||||||
|
*Remediation in the navigation menu*
|
||||||
|
1. Go to the Threat & Vulnerability Management navigation menu and select **Remediation** to open up the list of remediation activities and exceptions found in your organization. You can filter your view based on remediation type, machine remediation progress, and exception justification. If you want to see the remediation activities of applications which have reached their end-of-life, select **Software uninstall** from the **Remediation type** filter.
|
||||||
|
2. Select the remediation activity that you need to see or process.
|
||||||
|
|
||||||
|
*Top remediation activities widget in the dashboard*
|
||||||
|
1. Go to the Threat & Vulnerability Management dashboard and scroll down to the **Top remediation activities** widget. The list is sorted and prioritized based on what is listed in the **Top security recommendations**.
|
||||||
|
2. Select the remediation activity that you need to see or process.
|
||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
|
|
||||||
When you submit a remediation request from Threat & Vulnerability Management, it kicks-off a remediation activity.
|
When you submit a remediation request from Threat & Vulnerability Management, it kicks-off a remediation activity.
|
||||||
|
|
||||||
It creates a security task which will be tracked in Threat & Vulnerability Management **Remediation** page, and it also creates a remediation ticket in Microsoft Intune.
|
It creates a security task which will be tracked in Threat & Vulnerability Management **Remediation** page, and it also creates a remediation ticket in Microsoft Intune.
|
||||||
|
|
||||||
|
|
||||||
The dashboard will show that status of your top remediation activities. Click any of the entries and it will take you to the **Remediation** page. You can mark the remediation activity as completed after the IT administration team remediates the task.
|
The dashboard will show that status of your top remediation activities. Click any of the entries and it will take you to the **Remediation** page. You can mark the remediation activity as completed after the IT administration team remediates the task.
|
||||||
|
|
||||||
## When to file for exception instead of remediating issues
|
## When to file for exception instead of remediating issues
|
||||||
|
@ -53,7 +53,7 @@ You can click on each one of them and see the details, the description, the pote
|
|||||||
|
|
||||||
From that page, you can do any of the following depending on what you need to do:
|
From that page, you can do any of the following depending on what you need to do:
|
||||||
|
|
||||||
- Open software page - Drill down and open the software page to get more context of the software details, prevalence in the organization, weaknesses discovered, version distribution, and charts so you can see the exposure trend over time.
|
- Open software page - Drill down and open the software page to get more context of the software details, prevalence in the organization, weaknesses discovered, version distribution, application end-of-life, and charts so you can see the exposure trend over time.
|
||||||
|
|
||||||
- Choose from remediation options - Submit a remediation request to open a ticket in Microsoft Intune for your IT Administrator to pick up and address.
|
- Choose from remediation options - Submit a remediation request to open a ticket in Microsoft Intune for your IT Administrator to pick up and address.
|
||||||
|
|
||||||
|
@ -28,9 +28,9 @@ ms.date: 04/11/2019
|
|||||||
Microsoft Defender ATP Threat & Vulnerability management's discovery capability shows in the **Software inventory** page. The software inventory includes the name of the product or vendor, the latest version it is in, and the number of weaknesses and vulnerabilities detected with it.
|
Microsoft Defender ATP Threat & Vulnerability management's discovery capability shows in the **Software inventory** page. The software inventory includes the name of the product or vendor, the latest version it is in, and the number of weaknesses and vulnerabilities detected with it.
|
||||||
|
|
||||||
## Navigate through your software inventory
|
## Navigate through your software inventory
|
||||||
1. Select **Software inventory** from the Threat & Vulnerability management navigation menu.
|
1. Select **Software inventory** from the Threat & Vulnerability management navigation menu. The **Software inventory** page opens with a list of applications installed in your network, vendor name, weaknesses found, threats associated with them, exposed machines, impact, tags. You can also filter the software inventory list view based on weaknesses found in the applications, threats associated with them, and whether the applications have reached their end-of-life.
|
||||||
2. In the **Software inventory** page, select the application that you want to investigate and a flyout panel opens up with the software details, vendor information, prevalence in the organization, exposed machines, threat context, and its impact to your organization's exposure score.
|
2. In the **Software inventory** page, select the application that you want to investigate and a flyout panel opens up with the same details mentioned above but in a more compact view. You can either dive deeper into the investigation and select **Open software page** or flag any technical inconsistencies by selecting **Report inaccuracy**.
|
||||||
3. In the flyout panel, select **Open software page** to dive deeper into your software inventory. You will see how many weaknesses are discovered with the application, devices exposed, installed machines, version distribution, and the corresponding security recommendations for the weaknesses and vulnerabilities identified.
|
3. Select **Open software page** to dive deeper into your software inventory to see how many weaknesses are discovered in the application, devices exposed, installed machines, version distribution, and the corresponding security recommendations for the weaknesses and vulnerabilities identified.
|
||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
In the field of discovery, we are leveraging the same set of signals in Microsoft Defender ATP's endpoint detection and response that's responsible for detection, for vulnerability assessment.
|
In the field of discovery, we are leveraging the same set of signals in Microsoft Defender ATP's endpoint detection and response that's responsible for detection, for vulnerability assessment.
|
||||||
|
@ -31,6 +31,8 @@ For more information preview features, see [Preview features](https://docs.micro
|
|||||||
|
|
||||||
- [Microsoft Defender ATP for Mac](microsoft-defender-atp-mac.md) <BR> Microsoft Defender ATP for Mac brings the next-generation protection to Mac devices. Core components of the unified endpoint security platform will now be available for Mac devices. ([Endpoint detection and response is currently in preview](preview.md).)
|
- [Microsoft Defender ATP for Mac](microsoft-defender-atp-mac.md) <BR> Microsoft Defender ATP for Mac brings the next-generation protection to Mac devices. Core components of the unified endpoint security platform will now be available for Mac devices. ([Endpoint detection and response is currently in preview](preview.md).)
|
||||||
|
|
||||||
|
- [Threat & Vulnerability Management application end-of-life notification](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) <BR>Applications which have reached their end-of-life are labeled as such so you are aware that they will no longer be supported, and can take action to either uninstall or replace. Doing so will help lessen the risks related to various vulnerability exposures due to unpatched applications.
|
||||||
|
|
||||||
## October 2019
|
## October 2019
|
||||||
|
|
||||||
- [Indicators for IP addresses, URLs/Domains](manage-indicators.md) <BR> You can now allow or block URLs/domains using your own threat intelligence.
|
- [Indicators for IP addresses, URLs/Domains](manage-indicators.md) <BR> You can now allow or block URLs/domains using your own threat intelligence.
|
||||||
|
Reference in New Issue
Block a user