mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-07 10:07:21 +00:00
updated text
This commit is contained in:
parent
bbc189caed
commit
d6914eec35
@ -64,8 +64,8 @@
|
|||||||
##### [Address security recommendations](microsoft-defender-atp/tvm-security-recommendation.md)
|
##### [Address security recommendations](microsoft-defender-atp/tvm-security-recommendation.md)
|
||||||
##### [Remediate vulnerabilities](microsoft-defender-atp/tvm-remediation.md)
|
##### [Remediate vulnerabilities](microsoft-defender-atp/tvm-remediation.md)
|
||||||
##### [Exceptions for security recommendations](microsoft-defender-atp/tvm-exception.md)
|
##### [Exceptions for security recommendations](microsoft-defender-atp/tvm-exception.md)
|
||||||
##### [Mitigate zero-day vulnerabilities](microsoft-defender-atp/tvm-zero-day-vulnerabilities.md)
|
|
||||||
##### [Plan for end-of-support software](microsoft-defender-atp/tvm-end-of-support-software.md)
|
##### [Plan for end-of-support software](microsoft-defender-atp/tvm-end-of-support-software.md)
|
||||||
|
##### [Mitigate zero-day vulnerabilities](microsoft-defender-atp/tvm-zero-day-vulnerabilities.md)
|
||||||
#### [Understand vulnerabilities on your devices]()
|
#### [Understand vulnerabilities on your devices]()
|
||||||
##### [Software inventory](microsoft-defender-atp/tvm-software-inventory.md)
|
##### [Software inventory](microsoft-defender-atp/tvm-software-inventory.md)
|
||||||
##### [Vulnerabilities in my organization](microsoft-defender-atp/tvm-weaknesses.md)
|
##### [Vulnerabilities in my organization](microsoft-defender-atp/tvm-weaknesses.md)
|
||||||
|
@ -32,6 +32,8 @@ ms.topic: article
|
|||||||
|
|
||||||
A zero-day vulnerability is a publicly disclosed vulnerability for which no official patches or security updates have been released. Zero-day vulnerabilities often have high severity levels and are actively exploited.
|
A zero-day vulnerability is a publicly disclosed vulnerability for which no official patches or security updates have been released. Zero-day vulnerabilities often have high severity levels and are actively exploited.
|
||||||
|
|
||||||
|
Threat and vulnerability management will only display zero-day vulnerabilities it has information about.
|
||||||
|
|
||||||
## Find information about zero-day vulnerabilities
|
## Find information about zero-day vulnerabilities
|
||||||
|
|
||||||
Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender Security Center.
|
Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender Security Center.
|
||||||
@ -62,7 +64,11 @@ When there is an application with associated zero-day vulnerability and addition
|
|||||||
|
|
||||||
## Addressing the zero-day vulnerability
|
## Addressing the zero-day vulnerability
|
||||||
|
|
||||||
Go to the security recommendation page
|
Go to the security recommendation page and select the zero-day vulnerability. A flyout will open with information about the zero-day and other vulnerabilities for that software.
|
||||||
|
|
||||||
|
There will be a link to mitigation options and workarounds if they are available. Workarounds may help reduce the risk posed by this zero-day vulnerability until a patch or security update can be deployed.
|
||||||
|
|
||||||
|
Open remediation options and choose the attention type.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user