Skip to content

Commit 2b0b45d

Browse files
authored
Merge branch 'main' into siosulli-mdvm-updates
2 parents 3f547aa + 2f5a799 commit 2b0b45d

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

defender-endpoint/endpoint-attack-notifications.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 09/23/2022
17+
ms.date: 08/15/2024
1818
---
1919

2020
# Endpoint Attack Notifications
@@ -31,7 +31,7 @@ ms.date: 09/23/2022
3131
> This covers threat hunting on your Microsoft Defender for Endpoint service. However, if you're interested to explore the service beyond your current license, and proactively hunt threats not just on endpoints but also across Office 365, cloud applications, and identity, refer to [Microsoft Defender Experts for Hunting](/defender-xdr/defender-experts-for-hunting).
3232
3333
> [!NOTE]
34-
> Customers who signed up for Experts on Demand prior to sunset will have access to Ask Defender Experts until the expiration of their current contract.
34+
> The intake of new customers to the Endpoint Attack Notifications service is currently on pause. For customers interested in a managed service, sign up the [Defender Experts service request form](https://aka.ms/IWantDefenderExperts).
3535
3636
Endpoint Attack Notifications (previously referred to as Microsoft Threat Experts - Targeted Attack Notification) provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyber-espionage. These notifications show up as a new alert. The managed hunting service includes:
3737

defender-vulnerability-management/tvm-weaknesses.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The **Exposed Devices** column shows how many devices are currently exposed to a
7575

7676
## Gain vulnerability insights
7777

78-
If you select a CVE from the weaknesses page, a flyout panel opens with more information such as the vulnerability description, details, and threat insights. The AI generated vulnerability description provides detailed information on the vulnerability, its affect, recommended remediation steps, and any additional information, if available.
78+
If you select a CVE from the weaknesses page, a flyout panel opens with more information such as the vulnerability description, details, and threat insights. The AI generated vulnerability description provides detailed information on the vulnerability, its effect, recommended remediation steps, and any additional information, if available.
7979

8080
:::image type="content" source="/defender/media/defender-vulnerability-management/weaknesses-cve-description.png" alt-text="Screenshot of the weaknesses weaknesses-flyout pane" lightbox="/defender/media/defender-vulnerability-management/weaknesses-cve-description.png":::
8181

@@ -89,11 +89,11 @@ EPSS is designed to help enrich your knowledge of weaknesses and their exploit p
8989

9090
To see the EPSS score select a CVE from the [Weaknesses](tvm-weaknesses.md) page in the Microsoft Defender portal:
9191

92-
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss.png" alt-text="Screenshot of the weaknesses epss score" lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss.png":::
92+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss.png" alt-text="Screenshot of the weaknesses epss score." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss.png":::
9393

9494
When the EPSS is greater than 0.9, the **Threats** column tooltip is updated with the value to convey the urgency of mitigation:
9595

96-
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png" alt-text="Screenshot of the weaknesses epss score in the threat tooltip" lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png":::
96+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png" alt-text="Screenshot of the weaknesses epss score in the threat tooltip." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png":::
9797

9898
> [!NOTE]
9999
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.

exposure-management/classify-critical-assets.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,8 +124,8 @@ To help prioritize security recommendations, and remediation steps to focus on c
124124

125125
To see the sum of exposed critical assets go to the [Security recommendations](/defender-vulnerability-management/tvm-security-recommendation) page:
126126

127-
:::image type="content" source=" ./media/critical-asset-management/security-recommendations-critical-assets.png" alt-text="Screenshot of the critical assets column on the security recommendations page" lightbox="./media/critical-asset-management/security-recommendations-critical-assets.png":::
127+
:::image type="content" source=" ./media/critical-asset-management/security-recommendations-critical-assets.png" alt-text="Screenshot of the critical assets column on the security recommendations page." lightbox="./media/critical-asset-management/security-recommendations-critical-assets.png":::
128128

129129
## Next steps
130130

131-
Learn about simulating [attack paths](work-attack-paths-overview.md).
131+
Learn about simulating [attack paths](work-attack-paths-overview.md).

0 commit comments

Comments
 (0)