Skip to content

Commit 26aa241

Browse files
committed
Update TOC.yml
1 parent d1ae806 commit 26aa241

File tree

1 file changed

+28
-28
lines changed
  • defender-vulnerability-management

1 file changed

+28
-28
lines changed

defender-vulnerability-management/TOC.yml

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
- name: Discover devices and explore inventories
2626
items:
2727
- name: Device inventory
28-
href: /defender-endpoint/machines-view-overview
28+
href: /defender-endpoint/machines-view-overview?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
2929
- name: Assign device value
3030
href: tvm-assign-device-value.md
3131
- name: Explore inventories
@@ -95,75 +95,75 @@
9595
- name: Assessments of vulnerabilities and secure configurations
9696
items:
9797
- name: Export assessment methods and properties
98-
href: /defender-endpoint/api/get-assessment-methods-properties
98+
href: /defender-endpoint/api/get-assessment-methods-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
9999
- name: Export secure configuration assessment
100-
href: /defender-endpoint/get-assessment-secure-config
100+
href: /defender-endpoint/get-assessment-secure-config?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
101101
- name: Export software inventory assessment
102-
href: /defender-endpoint/api/get-assessment-software-inventory
102+
href: /defender-endpoint/api/get-assessment-software-inventory?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
103103
- name: Export software vulnerabilities assessment
104-
href: /defender-endpoint/api/get-assessment-software-vulnerabilities
104+
href: /defender-endpoint/api/get-assessment-software-vulnerabilities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
105105
- name: Export non-product code software inventory assessment
106-
href: /defender-endpoint/api/get-assessment-non-cpe-software-inventory
106+
href: /defender-endpoint/api/get-assessment-non-cpe-software-inventory?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
107107
- name: Certificate inventory
108108
items:
109109
- name: Export certificate inventory assessment
110-
href: /defender-endpoint/export-certificate-inventory-assessment
110+
href: /defender-endpoint/export-certificate-inventory-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
111111
- name: Authenticated scans
112112
items:
113113
- name: Authenticated scan methods and properties
114-
href: /defender-endpoint/get-authenticated-scan-properties
114+
href: /defender-endpoint/get-authenticated-scan-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
115115
- name: Get all scan definitions
116-
href: /defender-endpoint/api/get-all-scan-definitions
116+
href: /defender-endpoint/api/get-all-scan-definitions?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
117117
- name: Add, delete or update a scan definition
118-
href: /defender-endpoint/api/add-a-new-scan-definition
118+
href: /defender-endpoint/api/add-a-new-scan-definition?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
119119
- name: Get all scan agents
120-
href: /defender-endpoint/api/get-all-scan-agents
120+
href: /defender-endpoint/api/get-all-scan-agents?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
121121
- name: Get scan agent Id
122-
href: /defender-endpoint/api/get-agent-details
122+
href: /defender-endpoint/api/get-agent-details?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
123123
- name: Get scan history by definition
124-
href: /defender-endpoint/api/get-scan-history-by-definition
124+
href: /defender-endpoint/api/get-scan-history-by-definition?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
125125
- name: Get scan history by session
126-
href: /defender-endpoint/api/get-scan-history-by-session
126+
href: /defender-endpoint/api/get-scan-history-by-session?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
127127
- name: Browser extensions
128128
items:
129129
- name: Export browser extensions assessment
130-
href: /defender-endpoint/api/get-assessment-browser-extensions
130+
href: /defender-endpoint/api/get-assessment-browser-extensions?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
131131
- name: Get browser extensions permission information
132-
href: /defender-endpoint/api/get-browser-extensions-permission-info
132+
href: /defender-endpoint/api/get-browser-extensions-permission-info?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
133133
- name: Information gathering
134134
items:
135135
- name: Export information gathering assessment
136-
href: /defender-endpoint/get-assessment-information-gathering
136+
href: /defender-endpoint/get-assessment-information-gathering?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
137137
- name: Hardware and Firmware
138138
items:
139139
- name: Export hardware and firmware inventory assessment
140-
href: /defender-endpoint/api/export-firmware-hardware-assessment
140+
href: /defender-endpoint/api/export-firmware-hardware-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
141141
- name: Machine
142142
items:
143143
- name: Get installed software
144-
href: /defender-endpoint/get-installed-software
144+
href: /defender-endpoint/get-installed-software?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
145145
- name: Get discovered vulnerabilities
146-
href: /defender-endpoint/get-discovered-vulnerabilities
146+
href: /defender-endpoint/get-discovered-vulnerabilities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
147147
- name: Get security recommendations
148-
href: /defender-endpoint/get-security-recommendations
148+
href: /defender-endpoint/get-security-recommendations?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
149149
- name: Get missing KBs
150-
href: /defender-endpoint/get-missing-kbs-machine
150+
href: /defender-endpoint/get-missing-kbs-machine?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
151151
- name: Remediation activity
152152
items:
153153
- name: Remediation activity methods and properties
154-
href: /defender-endpoint/get-remediation-methods-properties
154+
href: /defender-endpoint/get-remediation-methods-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
155155
- name: Get one remediation activity by ID
156-
href: /defender-endpoint/get-remediation-one-activity
156+
href: /defender-endpoint/get-remediation-one-activity?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
157157
- name: List all remediation activities
158-
href: /defender-endpoint/get-remediation-all-activities
158+
href: /defender-endpoint/get-remediation-all-activities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
159159
- name: Security baselines
160160
items:
161161
- name: Export security baselines assessment
162-
href: /defender-endpoint/export-security-baseline-assessment
162+
href: /defender-endpoint/export-security-baseline-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
163163
- name: List security baselines assessment profiles
164-
href: /defender-endpoint/get-security-baselines-assessment-profiles
164+
href: /defender-endpoint/get-security-baselines-assessment-profiles?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
165165
- name: List security baselines assessment configurations
166-
href: /defender-endpoint/get-security-baselines-assessment-configurations
166+
href: /defender-endpoint/get-security-baselines-assessment-configurations?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
167167
- name: Frequently asked questions
168168
href: defender-vulnerability-management-faq.md
169169
- name: Vulnerability support in Defender Vulnerability Management

0 commit comments

Comments
 (0)