From ed86b89ee964814d5ce72bdadc7e764212dd68ca Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 29 Oct 2019 06:21:29 -0700 Subject: [PATCH] Revised based on feedback --- .../advanced-hunting-tvm-softwarevulnerability-table.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md index 5be552b113..68260d0b2c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md @@ -26,7 +26,7 @@ ms.date: 10/27/2019 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) -The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema is a knowledgebase of metadata on the vulnerabilities we are aware of. Use this reference along with DeviceTvmSoftwareInventoryVulnerabilities to construct queries that return information on the metadata related to the vulnerabilities in your inventory. +The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains information about the vulnerabilities Threat & Vulnerability Management assesses devices for. Use this reference along with DeviceTvmSoftwareInventoryVulnerabilities to construct queries that return information on the metadata related to the vulnerabilities in your inventory. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md).