Skip to content

Commit 4e6c68e

Browse files
authored
Merge pull request #2426 from MicrosoftDocs/diannegali-updatesecbaselines
added note for security baseline steps
2 parents 0363dca + e712e02 commit 4e6c68e

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

defender-vulnerability-management/tvm-security-baselines.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 11/19/2024
15+
ms.date: 01/21/2025
1616
---
1717

1818
# Security baselines assessment
@@ -49,18 +49,21 @@ Security baselines provide support for Center for Internet Security (**CIS)** be
4949
4. On the **Baseline profile scope** page set the profile settings such as software, base benchmark (CIS or STIG), and the compliance level and select **Next**.
5050
5. Select the configurations you want to include in the profile.
5151

52-
:::image type="content" source="/defender/media/defender-vulnerability-management/add_configuration_settings.png" alt-text="Screenshot of the add configuration settings page" lightbox="/defender/media/defender-vulnerability-management/add_configuration_settings.png":::
52+
:::image type="content" source="/defender/media/defender-vulnerability-management/add_configuration_settings.png" alt-text="Screenshot of the add configuration settings page" lightbox="/defender/media/defender-vulnerability-management/add_configuration_settings.png":::
5353

54-
Select **Customize** if you want to change the threshold configuration value for your organization.
54+
> [!NOTE]
55+
> Some configurations might not be included in the baseline assessment due to manual checking requirement or the configurations are unsupported. These configurations are marked as needing **Manual check** in the list and these will not be automatically assessed for compliance.
5556
56-
:::image type="content" source="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png" alt-text="Screenshot of the customize configuration settings page" lightbox="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png":::
57+
Select **Customize** if you want to change the threshold configuration value for your organization.
5758

59+
:::image type="content" source="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png" alt-text="Screenshot of the customize configuration settings page" lightbox="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png":::
60+
5861
6. Select **Next** to choose the device groups and device tags you want to include in the baseline profile. The profile will be automatically applied to devices added to these groups in the future.
5962
7. Select **Next** to review the profile.
6063
8. Select **Submit** to create your profile.
6164
9. On the final page, select **View profile page** to see the assessment results.
6265

63-
> [!NOTE]
66+
> [!TIP]
6467
> You can create multiple profiles for the same operating system with various customizations.
6568
6669
When you customize a configuration an icon will appear beside it to indicate that it has been customized and is no longer using the recommended value. Select the **reset** button to revert to the recommended value.

0 commit comments

Comments
 (0)