Skip to content

Commit 03ee045

Browse files
authored
Merge branch 'main' into docs-editor/indicator-file-1741106879
2 parents ba6869d + 44a2e8e commit 03ee045

11 files changed

+19
-18
lines changed

defender-vulnerability-management/tvm-security-recommendation.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,10 @@ audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- Tier1
13-
ms.topic: conceptual
13+
ms.topic: concept-article
1414
search.appverid: met150
15-
ms.date: 02/19/2025
15+
ms.date: 03/04/2025
16+
#customer intent: Get information on how to view and act on security recommendations in Microsoft Defender Vulnerability Management.
1617
---
1718

1819
# Security recommendations
@@ -32,7 +33,7 @@ Cybersecurity weaknesses identified in your organization are mapped to actionabl
3233
Each security recommendation includes actionable remediation steps. To help with task management, the recommendation can also be sent using Microsoft Intune and Microsoft Endpoint Configuration Manager. When the threat landscape changes, the recommendation also changes as it continuously collects information from your environment.
3334

3435
> [!TIP]
35-
> To get emails about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/defender-endpoint/configure-vulnerability-email-notifications)
36+
> To get email notifications about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/defender-endpoint/configure-vulnerability-email-notifications).
3637
3738
## How it works
3839

@@ -51,15 +52,15 @@ Access the Security recommendations page a few different ways:
5152

5253
### Navigation menu
5354

54-
In the [Microsoft Defender portal](https://security.microsoft.com), go to the **Vulnerability management** navigation menu and select **Recommendations**.
55+
In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** navigation menu and select **Recommendations**.
5556

5657
The page contains a list of security recommendations for the threats and vulnerabilities found in your organization.
5758

5859
### Top security recommendations in the vulnerability management dashboard
5960

60-
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
61+
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
6162

62-
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/top-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/top-security-recommendations.png":::
63+
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/tvm-sec-recommendations-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-recommendations.png":::
6364

6465
The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation takes you to the security recommendations page with more details.
6566

@@ -72,7 +73,7 @@ The color of the **Exposed devices** graph changes as the trend changes. If the
7273
> [!NOTE]
7374
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than seven days.
7475
75-
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png":::
76+
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded.png":::
7677

7778
### Icons
7879

@@ -92,9 +93,9 @@ The impact column shows the potential impact on your exposure score and Secure S
9293

9394
### Explore security recommendation options
9495

95-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation that you want to investigate or process.
96+
1. Select the security recommendation that you want to investigate or process from the list.
9697

97-
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png" lightbox="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png":::
98+
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-flyout-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-flyout.png":::
9899

99100
2. In the flyout, you can choose any of the following options:
100101

@@ -111,21 +112,21 @@ The impact column shows the potential impact on your exposure score and Secure S
111112

112113
If there's a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
113114

114-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select a recommendation, and then select **Open software page**
115+
1. Select a recommendation, and then select **Open software page**.
115116

116-
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md)
117+
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md).
117118

118-
3. Decide how to address the increase or your organization's exposure, such as submitting a remediation request
119+
3. Decide how to address the increase or your organization's exposure, like submitting a remediation request.
119120

120121
### Recommendations on devices
121122

122123
To see the list of security recommendations that apply to a device, follow these steps:
123124

124-
1. In the [Microsoft Defender portal](https://security.microsoft.com), in the **Device inventory** page, select a device.
125+
1. Navigate to the **Device inventory** through **Assets** > **Devices** navigation menu, then select a device.
125126

126127
2. Select the **Security recommendations** tab to see a list of security recommendations for the device.
127128

128-
:::image type="content" source="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png":::
129+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-device-secreco-small.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/tvm-device-secreco.png":::
129130

130131
> [!NOTE]
131132
> If you have the [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/concept-enterprise/) integration enabled in Defender for Endpoint, recommendations for Enterprise IoT devices that appear on IoT devices tab appears on the security recommendations page. For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
@@ -136,7 +137,7 @@ The vulnerability management remediation capability bridges the gap between Secu
136137

137138
### How to request remediation
138139

139-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select a security recommendation you would like to request remediation for, and then select **Remediation options**.
140+
1. Select a security recommendation you would like to request remediation for and then select **Remediation options**.
140141

141142
2. Fill out the form and select **Submit request**.
142143

@@ -154,13 +155,13 @@ When an exception is created for a recommendation, the recommendation is no long
154155

155156
### How to create an exception
156157

157-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation you want to create an exception for, and then select **Exception options**.
158+
1. Select the security recommendation you want to create an exception for, and then select **Exception options**.
158159

159-
![Showing where the button for "exception options" is located in a security recommendation flyout.](/defender/media/defender-vulnerability-management/tvm-exception-options.png)
160+
:::image type="content" alt-text="Showing where the exception options is located in a security recommendation flyout." source="/defender/media/defender-vulnerability-management/tvm-reco-exception-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-reco-exception.png":::
160161

161162
2. Fill out the form and submit.
162163

163-
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Threat & Vulnerability Management** menu, and select the **Exceptions** tab.
164+
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Endpoints** > **Vulnerability management** navigation menu and select **Remediation**, and then select the **Exceptions** tab.
164165

165166
For more information, see [Learn more about how to create an exception](tvm-exception.md#create-an-exception).
166167

70.9 KB
Loading
244 KB
Loading
133 KB
Loading
306 KB
Loading
85.5 KB
Loading
295 KB
Loading
133 KB
Loading
306 KB
Loading
149 KB
Loading

0 commit comments

Comments
 (0)