You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-security-recommendation.md
+19-18Lines changed: 19 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,10 @@ audience: ITPro
10
10
ms.collection:
11
11
- m365-security
12
12
- Tier1
13
-
ms.topic: conceptual
13
+
ms.topic: concept-article
14
14
search.appverid: met150
15
-
ms.date: 02/19/2025
15
+
ms.date: 03/04/2025
16
+
#customer intent: Get information on how to view and act on security recommendations in Microsoft Defender Vulnerability Management.
16
17
---
17
18
18
19
# Security recommendations
@@ -32,7 +33,7 @@ Cybersecurity weaknesses identified in your organization are mapped to actionabl
32
33
Each security recommendation includes actionable remediation steps. To help with task management, the recommendation can also be sent using Microsoft Intune and Microsoft Endpoint Configuration Manager. When the threat landscape changes, the recommendation also changes as it continuously collects information from your environment.
33
34
34
35
> [!TIP]
35
-
> To get emails about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/defender-endpoint/configure-vulnerability-email-notifications)
36
+
> To get email notifications about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/defender-endpoint/configure-vulnerability-email-notifications).
36
37
37
38
## How it works
38
39
@@ -51,15 +52,15 @@ Access the Security recommendations page a few different ways:
51
52
52
53
### Navigation menu
53
54
54
-
In the [Microsoft Defender portal](https://security.microsoft.com), go to the **Vulnerability management** navigation menu and select **Recommendations**.
55
+
In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** navigation menu and select **Recommendations**.
55
56
56
57
The page contains a list of security recommendations for the threats and vulnerabilities found in your organization.
57
58
58
59
### Top security recommendations in the vulnerability management dashboard
59
60
60
-
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
61
+
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
61
62
62
-
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/top-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/top-security-recommendations.png":::
63
+
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/tvm-sec-recommendations-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-recommendations.png":::
63
64
64
65
The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation takes you to the security recommendations page with more details.
65
66
@@ -72,7 +73,7 @@ The color of the **Exposed devices** graph changes as the trend changes. If the
72
73
> [!NOTE]
73
74
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than seven days.
74
75
75
-
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png":::
76
+
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded.png":::
76
77
77
78
### Icons
78
79
@@ -92,9 +93,9 @@ The impact column shows the potential impact on your exposure score and Secure S
92
93
93
94
### Explore security recommendation options
94
95
95
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation that you want to investigate or process.
96
+
1.Select the securityrecommendation that you want to investigate or process from the list.
96
97
97
-
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png" lightbox="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png":::
98
+
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-flyout-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-flyout.png":::
98
99
99
100
2. In the flyout, you can choose any of the following options:
100
101
@@ -111,21 +112,21 @@ The impact column shows the potential impact on your exposure score and Secure S
111
112
112
113
If there's a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
113
114
114
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), select a recommendation, and then select **Open software page**
115
+
1.Select a recommendation, and then select **Open software page**.
115
116
116
-
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md)
117
+
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md).
117
118
118
-
3. Decide how to address the increase or your organization's exposure, such as submitting a remediation request
119
+
3. Decide how to address the increase or your organization's exposure, like submitting a remediation request.
119
120
120
121
### Recommendations on devices
121
122
122
123
To see the list of security recommendations that apply to a device, follow these steps:
123
124
124
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), in the**Device inventory**page, select a device.
125
+
1.Navigate to the **Device inventory** through **Assets** >**Devices**navigation menu, then select a device.
125
126
126
127
2. Select the **Security recommendations** tab to see a list of security recommendations for the device.
127
128
128
-
:::image type="content" source="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png":::
129
+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-device-secreco-small.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/tvm-device-secreco.png":::
129
130
130
131
> [!NOTE]
131
132
> If you have the [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/concept-enterprise/) integration enabled in Defender for Endpoint, recommendations for Enterprise IoT devices that appear on IoT devices tab appears on the security recommendations page. For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
@@ -136,7 +137,7 @@ The vulnerability management remediation capability bridges the gap between Secu
136
137
137
138
### How to request remediation
138
139
139
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), select a security recommendation you would like to request remediation for, and then select **Remediation options**.
140
+
1.Select a security recommendation you would like to request remediation for and then select **Remediation options**.
140
141
141
142
2. Fill out the form and select **Submit request**.
142
143
@@ -154,13 +155,13 @@ When an exception is created for a recommendation, the recommendation is no long
154
155
155
156
### How to create an exception
156
157
157
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation you want to create an exception for, and then select **Exception options**.
158
+
1.Select the security recommendation you want to create an exception for, and then select **Exception options**.
158
159
159
-

160
+
:::image type="content" alt-text="Showing where the exception options is located in a security recommendation flyout." source="/defender/media/defender-vulnerability-management/tvm-reco-exception-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-reco-exception.png":::
160
161
161
162
2. Fill out the form and submit.
162
163
163
-
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Threat & Vulnerability Management** menu, and select the **Exceptions** tab.
164
+
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Endpoints** > **Vulnerability management**navigation menu and select **Remediation**, and then select the **Exceptions** tab.
164
165
165
166
For more information, see [Learn more about how to create an exception](tvm-exception.md#create-an-exception).
0 commit comments