mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-29 05:37:22 +00:00
new info
This commit is contained in:
parent
8885e673d6
commit
dbfbb444a6
@ -88,41 +88,43 @@ Examples of devices that should be marked as high value:
|
|||||||
|
|
||||||
## Vulnerable devices report
|
## Vulnerable devices report
|
||||||
|
|
||||||
The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
|
The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
|
||||||
|
|
||||||
Access the report by going to **Reports > Vulnerable devices**
|
Access the report by going to **Reports > Vulnerable devices**
|
||||||
|
|
||||||
There are two columns:
|
There are two columns:
|
||||||
- Trends (over time)
|
- Trends (over time). Can show the past 30 days, 3 months, 6 months, or a custom date range.
|
||||||
- Today (current information)
|
- Today (current information)
|
||||||
|
|
||||||
You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group.
|
**Filter**: You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group.
|
||||||
|
|
||||||
### Severity levels
|
**Drill down**: If there is an insight you want to explore further, select the relevant bar chart to view a filtered list of devices in the Device inventory page. From there, you can export the list.
|
||||||
|
|
||||||
|
### Severity level graphs
|
||||||
|
|
||||||
Each device is counted only once according to the most severe vulnerability found on that device.
|
Each device is counted only once according to the most severe vulnerability found on that device.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Exploit availability
|
### Exploit availability graphs
|
||||||
|
|
||||||
Each device is counted only once based on the highest level of known exploit.
|
Each device is counted only once based on the highest level of known exploit.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Vulnerability age
|
### Vulnerability age graphs
|
||||||
|
|
||||||
Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited.
|
Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Vulnerable devices by operating system platform
|
### Vulnerable devices by operating system platform graphs
|
||||||
|
|
||||||
The number of devices on each operating system that are exposed due to software vulnerabilities.
|
The number of devices on each operating system that are exposed due to software vulnerabilities.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Vulnerable devices by Windows 10 version
|
### Vulnerable devices by Windows 10 version graphs
|
||||||
|
|
||||||
The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS.
|
The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user