Skip to content

Commit 0111033

Browse files
committed
Update tvm-software-inventory.md
1 parent cc63f96 commit 0111033

File tree

1 file changed

+23
-25
lines changed

1 file changed

+23
-25
lines changed

defender-vulnerability-management/tvm-software-inventory.md

Lines changed: 23 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,7 @@ In the [Microsoft Defender portal](https://security.microsoft.com), in the navig
4747
4848
## Software inventory overview
4949

50-
The **Software inventory** page opens with a list of software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags.
51-
52-
The data is updated every three to four hours. There's currently no way to force a sync.
50+
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
5351

5452
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
5553

@@ -74,7 +72,7 @@ Here's how to tell whether software isn't supported:
7472

7573
## Software inventory on devices
7674

77-
1. Sign in to the Microsoft Defender portal. Navigate to **Assets** > **Devices** to open the **Device inventory** page.
75+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Assets** > **Devices** to open the **Device inventory** page.
7876

7977
2. Select the name of a device to open its device page.
8078

@@ -86,33 +84,33 @@ Software might be visible at the device level, even if it's currently not suppor
8684

8785
### Software evidence
8886

89-
See evidence of where we detected a specific software on a device from the registry, disk, or both. You can find it on any device in the device software inventory.
87+
See evidence of where specific software was detected a device in the registry, on the disk, or both. You can find this information on any device in the device software inventory.
9088

91-
Select a software name to open the flyout, and look for the section called **Software Evidence**.
89+
Select a software name to open its flyout, and look for the section called **Software Evidence**.
9290

9391
:::image type="content" alt-text="Software evidence example of Microsoft Edge showing evidence registry path as seen on a device page" source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence.png":::
9492

9593
## Software pages
9694

97-
You can view software pages a few different ways:
95+
You can view software pages in the [Microsoft Defender portal](https://security.microosft.com) a few different ways:
9896

99-
- **Endpoints** > **Vulnerability management** > **Inventories** > Select a software name > Select **Open software page** in the flyout
100-
- [Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
101-
- [Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the **Related component** section in the flyout
97+
- Go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab. Select a software name, and then, in the flyout, select **Open software page**.
98+
- Go to **Endpoints** > **Vulnerability management** > **Recommendations**. Select a recommendation, and in the flyout, select **Open software page**. (See [Security recommendations page](tvm-security-recommendation.md).)
99+
- Go to **Endpoints** > **Vulnerability management** > **Event timeline**. Select an event, and then, in the **Related components** section, select the link for the software name. (See [Event timeline page](threat-and-vuln-mgt-event-timeline.md).)
102100

103-
A full page appears with all the details of a specific software and the following information:
101+
The software page providies details about specific software with the following information:
104102

105103
- Overview with vendor information, exploits available, and impact rating
106104
- Data visualizations showing the number of and severity of discovered weaknesses, exposed devices, software's usage in the past 30 days, and the top events in the last seven days.
107-
- Tabs showing information such as:
108-
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
109-
- Named CVEs of discovered vulnerabilities.
110-
- Devices that have the software installed (along with device name, domain, OS, and more).
111-
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
112-
- Event timeline
113-
- Browser extensions (if applicable)
105+
- Tabs showing information, such as:
106+
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
107+
- Named CVEs of discovered vulnerabilities.
108+
- Devices that have the software installed (along with device name, domain, OS, and more).
109+
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
110+
- Event timeline
111+
- Browser extensions (if applicable)
114112

115-
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
113+
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
116114

117115
## Normalized software versions
118116

@@ -124,15 +122,15 @@ Defender Vulnerability Management applies version normalization rules to ensure
124122

125123
Report an inaccuracy when you see vulnerability information and assessment results that are incorrect.
126124

127-
1. Open the software flyout on the Software inventory page.
125+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab.
128126

129-
2. Select **Report inaccuracy**.
127+
2. Select a software name to open its flyout, and then select **Report inaccuracy**.
130128

131-
3. From the flyout pane, choose an issue to report from:
129+
3. From the flyout pane, choose an issue. Examples include:
132130

133-
- a software detail is wrong
134-
- the software isn't installed on any device in my org
135-
- the number of installed or exposed devices is wrong
131+
- A software detail is wrong
132+
- The software isn't installed on any device in my org
133+
- The number of installed or exposed devices is wrong
136134

137135
4. Fill in the requested details about the inaccuracy.
138136

0 commit comments

Comments
 (0)