Skip to content

Commit 0036974

Browse files
committed
Update tvm-software-inventory.md
1 parent 9ced7ef commit 0036974

File tree

1 file changed

+2
-5
lines changed

1 file changed

+2
-5
lines changed

defender-vulnerability-management/tvm-software-inventory.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Software inventory
3-
description: The software inventory page for Microsoft Defender for Endpoint's Vulnerability Management shows how many weaknesses and vulnerabilities have been detected in software.
3+
description: The software inventory page for Microsoft Defender for Endpoint's Vulnerability Management shows how many weaknesses and vulnerabilities were detected in software.
44
ms.service: defender-vuln-mgmt
55
ms.author: deniseb
66
author: denisebmsft
@@ -26,10 +26,7 @@ ms.date: 03/01/2023
2626

2727
The software inventory in Defender Vulnerability Management is a list of known software in your organization. The default filter on the software inventory page displays all software with official [Common Platform Enumerations (CPE)](https://nvd.nist.gov/products/cpe). The view includes details such as the name of the vendor, number of weaknesses, threats, and number of exposed devices.
2828

29-
> [!TIP]
30-
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
31-
32-
You can remove the **CPE Available** filter, to gain further visibility and increase your search scope across all installed software in your organization. This means all software, including software without a CPE, will now display in the software inventory list.
29+
You can remove the **CPE Available** filter to gain further visibility and increase your search scope across all installed software in your organization. When you clear this filter, all software, including software without a CPE, displays in the software inventory list.
3330

3431
> [!NOTE]
3532
> As CPEs are used by vulnerability management to identify the software and any vulnerabilities, even though software products without a CPE will be shown in the software inventory page, they will not be supported by vulnerability management and information like, exploits, number of exposed devices, and weaknesses won't be available for them.

0 commit comments

Comments
 (0)