diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 6f340c91ec..5e03b94532 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -88,41 +88,43 @@ Examples of devices that should be marked as high value: ## Vulnerable devices report -The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. +The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. Access the report by going to **Reports > Vulnerable devices** There are two columns: -- Trends (over time) +- Trends (over time). Can show the past 30 days, 3 months, 6 months, or a custom date range. - Today (current information) -You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group. +**Filter**: You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group. -### Severity levels +**Drill down**: If there is an insight you want to explore further, select the relevant bar chart to view a filtered list of devices in the Device inventory page. From there, you can export the list. + +### Severity level graphs Each device is counted only once according to the most severe vulnerability found on that device. ![One graph of current device vulnerability severity levels, and one graph showing levels over time](images/tvm-report-severity.png) -### Exploit availability +### Exploit availability graphs Each device is counted only once based on the highest level of known exploit. ![One graph of current device exploit availability, and one graph showing availability over time](images/tvm-report-exploit-availability.png) -### Vulnerability age +### Vulnerability age graphs Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited. ![One graph of current device vulnerability age, and one graph showing age over time.](images/tvm-report-age.png) -### Vulnerable devices by operating system platform +### Vulnerable devices by operating system platform graphs The number of devices on each operating system that are exposed due to software vulnerabilities. ![One graph of current vulnerable devices by operating system platform, and one graph showing vulnerable devices by OS platforms over time.](images/tvm-report-os.png) -### Vulnerable devices by Windows 10 version +### Vulnerable devices by Windows 10 version graphs The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS.