You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-software-inventory.md
+23-25Lines changed: 23 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,9 +47,7 @@ In the [Microsoft Defender portal](https://security.microsoft.com), in the navig
47
47
48
48
## Software inventory overview
49
49
50
-
The **Software inventory** page opens with a list of software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags.
51
-
52
-
The data is updated every three to four hours. There's currently no way to force a sync.
50
+
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
53
51
54
52
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
55
53
@@ -74,7 +72,7 @@ Here's how to tell whether software isn't supported:
74
72
75
73
## Software inventory on devices
76
74
77
-
1.Sign in to the Microsoft Defender portal. Navigate to **Assets** > **Devices** to open the **Device inventory** page.
75
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), go to **Assets** > **Devices** to open the **Device inventory** page.
78
76
79
77
2. Select the name of a device to open its device page.
80
78
@@ -86,33 +84,33 @@ Software might be visible at the device level, even if it's currently not suppor
86
84
87
85
### Software evidence
88
86
89
-
See evidence of where we detected a specific software on a device from the registry, disk, or both. You can find it on any device in the device software inventory.
87
+
See evidence of where specific software was detected a device in the registry, on the disk, or both. You can find this information on any device in the device software inventory.
90
88
91
-
Select a software name to open the flyout, and look for the section called **Software Evidence**.
89
+
Select a software name to open its flyout, and look for the section called **Software Evidence**.
92
90
93
91
:::image type="content" alt-text="Software evidence example of Microsoft Edge showing evidence registry path as seen on a device page" source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence.png":::
94
92
95
93
## Software pages
96
94
97
-
You can view software pages a few different ways:
95
+
You can view software pages in the [Microsoft Defender portal](https://security.microosft.com)a few different ways:
98
96
99
-
-**Endpoints** > **Vulnerability management** > **Inventories** > Select a software name > Select **Open software page** in the flyout
100
-
-[Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
101
-
-[Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the **Related component** section in the flyout
97
+
-Go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab. Select a software name, and then, in the flyout, select **Open software page**.
98
+
-Go to **Endpoints** > **Vulnerability management** > **Recommendations**. Select a recommendation, and in the flyout, select **Open software page**. (See [Security recommendations page](tvm-security-recommendation.md).)
99
+
-Go to **Endpoints** > **Vulnerability management** > **Event timeline**. Select an event, and then, in the **Related components** section, select the link for the software name. (See [Event timeline page](threat-and-vuln-mgt-event-timeline.md).)
102
100
103
-
A full page appears with all the details of a specific software and the following information:
101
+
The software page providies details about specific software with the following information:
104
102
105
103
- Overview with vendor information, exploits available, and impact rating
106
104
- Data visualizations showing the number of and severity of discovered weaknesses, exposed devices, software's usage in the past 30 days, and the top events in the last seven days.
107
-
- Tabs showing information such as:
108
-
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
109
-
- Named CVEs of discovered vulnerabilities.
110
-
- Devices that have the software installed (along with device name, domain, OS, and more).
111
-
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
112
-
- Event timeline
113
-
- Browser extensions (if applicable)
105
+
- Tabs showing information, such as:
106
+
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
107
+
- Named CVEs of discovered vulnerabilities.
108
+
- Devices that have the software installed (along with device name, domain, OS, and more).
109
+
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
110
+
- Event timeline
111
+
- Browser extensions (if applicable)
114
112
115
-
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
113
+
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
116
114
117
115
## Normalized software versions
118
116
@@ -124,15 +122,15 @@ Defender Vulnerability Management applies version normalization rules to ensure
124
122
125
123
Report an inaccuracy when you see vulnerability information and assessment results that are incorrect.
126
124
127
-
1.Open the software flyout on the Software inventory page.
125
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab.
128
126
129
-
2. Select **Report inaccuracy**.
127
+
2. Select a software name to open its flyout, and then select **Report inaccuracy**.
130
128
131
-
3. From the flyout pane, choose an issue to report from:
129
+
3. From the flyout pane, choose an issue. Examples include:
132
130
133
-
- a software detail is wrong
134
-
- the software isn't installed on any device in my org
135
-
- the number of installed or exposed devices is wrong
131
+
- A software detail is wrong
132
+
- The software isn't installed on any device in my org
133
+
- The number of installed or exposed devices is wrong
136
134
137
135
4. Fill in the requested details about the inaccuracy.
0 commit comments