You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-dashboard-insights.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.custom: admindeeplinkDEFENDER
14
14
ms.topic: conceptual
15
15
search.appverid: met150
16
-
ms.date: 03/04/2022
16
+
ms.date: 02/23/2025
17
17
---
18
18
19
19
# Microsoft Defender Vulnerability Management dashboard
@@ -39,7 +39,7 @@ You can use Defender Vulnerability Management dashboard in the Microsoft Defende
39
39
- Select exception options and track active exceptions
40
40
41
41
> [!NOTE]
42
-
> Devices that are not active in the last 30 days are not factored in on the data that reflects your organization's vulnerability management exposure score and Microsoft Secure Score for Devices.
42
+
> Devices that aren't active in the last 30 days aren't factored in on the data that reflects your organization's vulnerability management exposure score and Microsoft Secure Score for Devices.
43
43
44
44
Watch this video for a quick overview of what is in the Defender Vulnerability Management dashboard.
45
45
@@ -52,24 +52,20 @@ Watch this video for a quick overview of what is in the Defender Vulnerability M
|**Selected device groups (#/#)**|Filter the vulnerability management data you want to see in the dashboard and cards by device groups. What you select in the filter applies throughout the vulnerability management pages.|
62
58
|[**Exposure score**](tvm-exposure-score.md)|See the current state of your organization's device exposure to threats and vulnerabilities. Several factors affect your organization's exposure score: weaknesses discovered in your devices, likelihood of your devices to be breached, value of the devices to your organization, and relevant alerts discovered with your devices. The goal is to lower the exposure score of your organization to be more secure. To reduce the score, you need to remediate the related security configuration issues listed in the security recommendations.|
63
-
|[**Microsoft Secure Score for Devices**](tvm-microsoft-secure-score-devices.md)|See the security posture of the operating system, applications, network, accounts, and security controls of your organization. The goal is to remediate the related security configuration issues to increase your score for devices. Selecting the bars will take you to the **Security recommendation** page.|
59
+
|[**Microsoft Secure Score for Devices**](tvm-microsoft-secure-score-devices.md)|See the security posture of the operating system, applications, network, accounts, and security controls of your organization. The goal is to remediate the related security configuration issues to increase your score for devices. Selecting the bars take you to the **Security recommendation** page.|
64
60
|**Device exposure distribution**|See how many devices are exposed based on their exposure level. Select a section in the doughnut chart to go to the **Devices list** page and view the affected device names, exposure level, risk level, and other details such as domain, operating system platform, its health state, when it was last seen, and its tags.|
65
-
|**Expiring certificates**|See how many certificates have expired or are due to expire in the next 30, 60 or 90 days.|
61
+
|**Expiring certificates**|See how many certificates are expired or are due to expire in the next 30, 60 or 90 days.|
66
62
|**Top security recommendations**|See the collated security recommendations that are sorted and prioritized based on your organization's risk exposure and the urgency that it requires. Select **Show more** to see the rest of the security recommendations in the list. Select **Show exceptions** for the list of recommendations that have an exception.|
67
63
|**Top vulnerable software**|Get real-time visibility into your organization's software inventory with a stack-ranked list of vulnerable software installed on your network's devices and how they impact your organizational exposure score. Select an item for details or **Show more** to see the rest of the vulnerable software list in the **Software inventory** page.|
68
64
|**Top remediation activities**|Track the remediation activities generated from the security recommendations. You can select each item on the list to see the details in the **Remediation** page or select **Show more** to view the rest of the remediation activities, and active exceptions.|
69
65
|**Top exposed devices**|View exposed device names and their exposure level. Select a device name from the list to go to the device page where you can view the alerts, risks, incidents, security recommendations, installed software, and discovered vulnerabilities associated with the exposed devices. Select **Show more** to see the rest of the exposed devices list. From the devices list, you can manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate device.|
70
66
|
71
67
72
-
## Related topics
68
+
## Related articles
73
69
74
70
-[Exposure score](tvm-exposure-score.md)
75
71
-[Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md)
0 commit comments