You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
33
-
34
31
## Request remediation
35
32
36
33
Vulnerability management capabilities bridges the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the **Recommendation** pages to Intune.
@@ -39,18 +36,20 @@ Vulnerability management capabilities bridges the gap between Security and IT ad
39
36
40
37
To use this capability, enable your Microsoft Intune connections. In the Microsoft Defender portal, navigate to **Settings**\>**Endpoints**\>**General**\>**Advanced features**. Scroll down and look for **Microsoft Intune connection**. By default, the toggle is turned off. Turn your **Microsoft Intune connection** toggle **On**.
41
38
42
-
**Note**: If you have the Intune connection enabled, you get an option to create an Intune security task when creating a remediation request. This option doesn't appear if the connection isn't set.
39
+
> [!NOTE]
40
+
> If you have the Intune connection enabled, you get an option to create an Intune security task when creating a remediation request. This option doesn't appear if the connection isn't set.
43
41
44
42
See [Use Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint](/mem/intune/protect/atp-manage-vulnerabilities) for details.
45
43
46
44
### Remediation request steps
47
45
48
-
1.Go to the **Vulnerability management** navigation menu in the Microsoft Defender portal, and select [**Recommendations**](tvm-security-recommendation.md).
46
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), go to the **Vulnerability management**, and then select [**Recommendations**](tvm-security-recommendation.md).
49
47
50
48
2. Select a security recommendation you would like to request remediation for, and then select **Remediation options**.
51
49
52
50
3. Fill out the form, including what you are requesting remediation for, applicable device groups, priority, due date, and optional notes.
53
-
1. If you choose the "attention required" remediation option, selecting a due date won't be available since there's no specific action.
51
+
52
+
If you choose the "attention required" remediation option, selecting a due date won't be available since there's no specific action.
54
53
55
54
4. Select **Submit request**. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. This won't trigger a remediation or apply any changes to devices.
0 commit comments