After Width: | Height: | Size: 37 KiB |
After Width: | Height: | Size: 90 KiB |
After Width: | Height: | Size: 51 KiB |
After Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 105 KiB After Width: | Height: | Size: 121 KiB |
After Width: | Height: | Size: 98 KiB |
After Width: | Height: | Size: 104 KiB |
After Width: | Height: | Size: 24 KiB |
After Width: | Height: | Size: 7.5 KiB |
After Width: | Height: | Size: 23 KiB |
After Width: | Height: | Size: 24 KiB |
After Width: | Height: | Size: 7.6 KiB |
Before Width: | Height: | Size: 24 KiB After Width: | Height: | Size: 24 KiB |
Before Width: | Height: | Size: 8.3 KiB After Width: | Height: | Size: 7.8 KiB |
After Width: | Height: | Size: 82 KiB |
@ -56,23 +56,26 @@ From that page, you can do any of the following depending on what you need to do
|
||||
|
||||
## Report inaccuracy
|
||||
|
||||
You can report a false positive when you see any vague, inaccurate, incomplete, or already remediated information in the machine page, under **Security recommendation** column.
|
||||
You can report a false positive when you see any vague, inaccurate, incomplete, or already remediated security recommendation information in the machine page.
|
||||
|
||||
1. Click **:** then select **Report inaccuracy**. A flyout pane opens.
|
||||
1. Select the **Security recommendation** tab.
|
||||
|
||||
2. Click **:** beside the security recommendation that you want to report about, then select **Report inaccuracy**.
|
||||

|
||||
<br>A flyout pane opens.</br>
|
||||

|
||||
|
||||
2. From the flyout pane, select the inaccuracy category from the drop-down menu.
|
||||

|
||||
3. From the flyout pane, select the inaccuracy category from the drop-down menu.
|
||||
<br></br>
|
||||
|
||||
3. Include your email address so Microsoft can send you feedback regarding the inaccuracy you reported.
|
||||
4. Include your email address so Microsoft can send you feedback regarding the inaccuracy you reported.
|
||||
|
||||
4. Include your machine name for investigation context.
|
||||
5. Include your machine name for investigation context.
|
||||
|
||||
>[!NOTE]
|
||||
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
||||
|
||||
5. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
||||
6. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
||||
|
||||
|
||||
|
||||
|
@ -33,6 +33,30 @@ In the field of discovery, we are leveraging the same set of signals in Microsof
|
||||
|
||||
Since it is real-time, in a matter of minutes, you will see vulnerability information as they get discovered. The engine automatically grabs information from multiple security feeds. In fact, you'll will see if a particular application is connected to a live campaign. It also provides a link to a Threat Analytics report soon as it's available.
|
||||
|
||||
## Report inaccuracy
|
||||
|
||||
You can report a false positive when you see any vague, inaccurate version, incomplete, or already remediated software inventory information in the machine page.
|
||||
|
||||
1. Select the **Software inventory** tab.
|
||||
|
||||
2. Click **:** beside the software that you want to report about, and then select **Report inaccuracy**.
|
||||

|
||||
<br>A flyout pane opens.</br>
|
||||

|
||||
|
||||
3. From the flyout pane, select the inaccuracy category from the **Software inventory inaccuracy reason** drop-down menu.
|
||||
<br></br>
|
||||
|
||||
4. Include your email address so Microsoft can send you feedback regarding the inaccuracy you reported.
|
||||
|
||||
5. Include your machine name for investigation context.
|
||||
|
||||
>[!NOTE]
|
||||
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
||||
|
||||
6. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
||||
|
||||
|
||||
## Related topics
|
||||
- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
|
||||
- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md)
|
||||
|
@ -26,7 +26,7 @@ Threat & Vulnerability Management leverages the same signals in Microsoft Defend
|
||||
The **Weaknesses** page lists down the vulnerabilities found in the infected software running in your organization, their severity, Common Vulnerability Scoring System (CVSS) rating, its prevalence in your organization, corresponding breach, and threat insights.
|
||||
|
||||
## Navigate through your organization's weaknesses page
|
||||
You can see the list of vulnerabilities in three ways:
|
||||
You can see the list of vulnerabilities in four ways:
|
||||
|
||||
*Vulnerabilities in global search*
|
||||
1. Click the global search drop-down menu.
|
||||
@ -48,6 +48,18 @@ You can see the list of vulnerabilities in three ways:
|
||||
3. Select the **Discovered vulnerabilities** tab.
|
||||
4. Select the vulnerability that you want to investigate to open up a flyout panel with the vulnerability details, such as: CVE description, CVE ID, exploits available, CVSS V3 rating, severity, publish, and update dates.
|
||||
|
||||
*Discovered vulnerabilities in the machine page*
|
||||
1. Go to the left-hand navigation menu bar, then select the machine icon. The **Machines list** page opens.
|
||||
<br></br>
|
||||
2. In the **Machines list** page, select the machine that you want to investigate.
|
||||
<br></br>
|
||||
<br>A flyout pane opens with machine details and response action options.</br>
|
||||

|
||||
3. In the flyout pane, select **Open machine page**. A page opens with details and response options for the machine you want to investigate.
|
||||
<br></br>
|
||||
4. Select **Discovered vulnerabilities**.
|
||||
5. Select the vulnerability that you want to investigate to open up a flyout panel with the vulnerability details, such as: CVE description, CVE ID, exploits available, CVSS V3 rating, severity, publish, and update dates.
|
||||
|
||||
## How it works
|
||||
When new vulnerabilities are released, you would want know how many of your assets are exposed. You can see the list of vulnerabilities and the details in the **Weaknesses** page.
|
||||
|
||||
@ -66,6 +78,29 @@ The threat insights icons are highlighted if there are associated exploits in th
|
||||
>[!NOTE]
|
||||
> Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight  icon and possible active alert  icon.
|
||||
|
||||
## Report inaccuracy
|
||||
|
||||
You can report a false positive when you see any vague, inaccurate, missing, or already remediated vulnerability information in the machine page.
|
||||
|
||||
1. Select the **Discovered vulnerabilities** tab.
|
||||
|
||||
2. Click **:** beside the vulnerability that you want to report about, and then select **Report inaccuracy**.
|
||||

|
||||
<br>A flyout pane opens.</br>
|
||||

|
||||
|
||||
3. From the flyout pane, select the inaccuracy category from the **Discovered vulnerability inaccuracy reason** drop-down menu.
|
||||
<br></br>
|
||||
|
||||
4. Include your email address so Microsoft can send you feedback regarding the inaccuracy you reported.
|
||||
|
||||
5. Include your machine name for investigation context.
|
||||
|
||||
>[!NOTE]
|
||||
> You can also provide details regarding the inaccuracy you reported in the **Tell us more (optional)** field to give the threat and vulnerability management investigators context.
|
||||
|
||||
6. Click **Submit**. Your feedback is immediately sent to the Threat & Vulnerability Management experts with its context.
|
||||
|
||||
|
||||
## Related topics
|
||||
- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
|
||||
|