You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-security-baselines.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,14 +49,14 @@ Security baselines provide support for Center for Internet Security (**CIS)** be
49
49
4. On the **Baseline profile scope** page set the profile settings such as software, base benchmark (CIS or STIG), and the compliance level and select **Next**.
50
50
5. Select the configurations you want to include in the profile.
51
51
52
-
:::image type="content" source="/defender/media/defender-vulnerability-management/add_configuration_settings.png" alt-text="Screenshot of the add configuration settings page" lightbox="/defender/media/defender-vulnerability-management/add_configuration_settings.png":::
52
+
:::image type="content" source="/defender/media/defender-vulnerability-management/add_configuration_settings.png" alt-text="Screenshot of the add configuration settings page" lightbox="/defender/media/defender-vulnerability-management/add_configuration_settings.png":::
53
53
54
-
> [!NOTE]
55
-
> Some configurations might not be included in the baseline assessment due to manual checking requirement or the configurations are unsupported. These configurations are marked as needing **Manual check** in the list.
54
+
> [!NOTE]
55
+
> Some configurations might not be included in the baseline assessment due to manual checking requirement or the configurations are unsupported. These configurations are marked as needing **Manual check** in the list.
56
56
57
-
Select **Customize** if you want to change the threshold configuration value for your organization.
57
+
Select **Customize** if you want to change the threshold configuration value for your organization.
58
58
59
-
:::image type="content" source="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png" alt-text="Screenshot of the customize configuration settings page" lightbox="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png":::
59
+
:::image type="content" source="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png" alt-text="Screenshot of the customize configuration settings page" lightbox="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png":::
60
60
61
61
6. Select **Next** to choose the device groups and device tags you want to include in the baseline profile. The profile will be automatically applied to devices added to these groups in the future.
0 commit comments