mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 22:33:41 +00:00
Indent 2 notes in procedures
This commit is contained in:
@ -50,8 +50,8 @@ You can access the list of vulnerabilities in a few places in the portal:
|
|||||||

|

|
||||||
3. Select the CVE and a flyout panel opens up with more information - the vulnerability description, exploits available, severity level, CVSS v3 rating, publishing and update dates.
|
3. Select the CVE and a flyout panel opens up with more information - the vulnerability description, exploits available, severity level, CVSS v3 rating, publishing and update dates.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>To see the rest of the vulnerabilities in the **Weaknesses** page, type CVE, then click search.
|
> To see the rest of the vulnerabilities in the **Weaknesses** page, type CVE, then click search.
|
||||||
|
|
||||||
*Weaknesses page in the menu*
|
*Weaknesses page in the menu*
|
||||||
1. Go to the Threat & Vulnerability Management navigation menu and select **Weaknesses** to open up the list of vulnerabilities found in your organization.
|
1. Go to the Threat & Vulnerability Management navigation menu and select **Weaknesses** to open up the list of vulnerabilities found in your organization.
|
||||||
@ -116,8 +116,8 @@ You can report a false positive when you see any vague, inaccurate, missing, or
|
|||||||
|
|
||||||
5. Include your machine name for investigation context.
|
5. Include your machine name for investigation context.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
||||||
|
|
||||||
6. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
6. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user