|
25 | 25 | - name: Discover devices and explore inventories
|
26 | 26 | items:
|
27 | 27 | - name: Device inventory
|
28 |
| - href: /defender-endpoint/machines-view-overview |
| 28 | + href: /defender-endpoint/machines-view-overview?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
29 | 29 | - name: Assign device value
|
30 | 30 | href: tvm-assign-device-value.md
|
31 | 31 | - name: Explore inventories
|
|
95 | 95 | - name: Assessments of vulnerabilities and secure configurations
|
96 | 96 | items:
|
97 | 97 | - name: Export assessment methods and properties
|
98 |
| - href: /defender-endpoint/api/get-assessment-methods-properties |
| 98 | + href: /defender-endpoint/api/get-assessment-methods-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
99 | 99 | - name: Export secure configuration assessment
|
100 |
| - href: /defender-endpoint/get-assessment-secure-config |
| 100 | + href: /defender-endpoint/get-assessment-secure-config?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
101 | 101 | - name: Export software inventory assessment
|
102 |
| - href: /defender-endpoint/api/get-assessment-software-inventory |
| 102 | + href: /defender-endpoint/api/get-assessment-software-inventory?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
103 | 103 | - name: Export software vulnerabilities assessment
|
104 |
| - href: /defender-endpoint/api/get-assessment-software-vulnerabilities |
| 104 | + href: /defender-endpoint/api/get-assessment-software-vulnerabilities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
105 | 105 | - name: Export non-product code software inventory assessment
|
106 |
| - href: /defender-endpoint/api/get-assessment-non-cpe-software-inventory |
| 106 | + href: /defender-endpoint/api/get-assessment-non-cpe-software-inventory?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
107 | 107 | - name: Certificate inventory
|
108 | 108 | items:
|
109 | 109 | - name: Export certificate inventory assessment
|
110 |
| - href: /defender-endpoint/export-certificate-inventory-assessment |
| 110 | + href: /defender-endpoint/export-certificate-inventory-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
111 | 111 | - name: Authenticated scans
|
112 | 112 | items:
|
113 | 113 | - name: Authenticated scan methods and properties
|
114 |
| - href: /defender-endpoint/get-authenticated-scan-properties |
| 114 | + href: /defender-endpoint/get-authenticated-scan-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
115 | 115 | - name: Get all scan definitions
|
116 |
| - href: /defender-endpoint/api/get-all-scan-definitions |
| 116 | + href: /defender-endpoint/api/get-all-scan-definitions?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
117 | 117 | - name: Add, delete or update a scan definition
|
118 |
| - href: /defender-endpoint/api/add-a-new-scan-definition |
| 118 | + href: /defender-endpoint/api/add-a-new-scan-definition?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
119 | 119 | - name: Get all scan agents
|
120 |
| - href: /defender-endpoint/api/get-all-scan-agents |
| 120 | + href: /defender-endpoint/api/get-all-scan-agents?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
121 | 121 | - name: Get scan agent Id
|
122 |
| - href: /defender-endpoint/api/get-agent-details |
| 122 | + href: /defender-endpoint/api/get-agent-details?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
123 | 123 | - name: Get scan history by definition
|
124 |
| - href: /defender-endpoint/api/get-scan-history-by-definition |
| 124 | + href: /defender-endpoint/api/get-scan-history-by-definition?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
125 | 125 | - name: Get scan history by session
|
126 |
| - href: /defender-endpoint/api/get-scan-history-by-session |
| 126 | + href: /defender-endpoint/api/get-scan-history-by-session?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
127 | 127 | - name: Browser extensions
|
128 | 128 | items:
|
129 | 129 | - name: Export browser extensions assessment
|
130 |
| - href: /defender-endpoint/api/get-assessment-browser-extensions |
| 130 | + href: /defender-endpoint/api/get-assessment-browser-extensions?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
131 | 131 | - name: Get browser extensions permission information
|
132 |
| - href: /defender-endpoint/api/get-browser-extensions-permission-info |
| 132 | + href: /defender-endpoint/api/get-browser-extensions-permission-info?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
133 | 133 | - name: Information gathering
|
134 | 134 | items:
|
135 | 135 | - name: Export information gathering assessment
|
136 |
| - href: /defender-endpoint/get-assessment-information-gathering |
| 136 | + href: /defender-endpoint/get-assessment-information-gathering?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
137 | 137 | - name: Hardware and Firmware
|
138 | 138 | items:
|
139 | 139 | - name: Export hardware and firmware inventory assessment
|
140 |
| - href: /defender-endpoint/api/export-firmware-hardware-assessment |
| 140 | + href: /defender-endpoint/api/export-firmware-hardware-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
141 | 141 | - name: Machine
|
142 | 142 | items:
|
143 | 143 | - name: Get installed software
|
144 |
| - href: /defender-endpoint/get-installed-software |
| 144 | + href: /defender-endpoint/get-installed-software?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
145 | 145 | - name: Get discovered vulnerabilities
|
146 |
| - href: /defender-endpoint/get-discovered-vulnerabilities |
| 146 | + href: /defender-endpoint/get-discovered-vulnerabilities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
147 | 147 | - name: Get security recommendations
|
148 |
| - href: /defender-endpoint/get-security-recommendations |
| 148 | + href: /defender-endpoint/get-security-recommendations?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
149 | 149 | - name: Get missing KBs
|
150 |
| - href: /defender-endpoint/get-missing-kbs-machine |
| 150 | + href: /defender-endpoint/get-missing-kbs-machine?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
151 | 151 | - name: Remediation activity
|
152 | 152 | items:
|
153 | 153 | - name: Remediation activity methods and properties
|
154 |
| - href: /defender-endpoint/get-remediation-methods-properties |
| 154 | + href: /defender-endpoint/get-remediation-methods-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
155 | 155 | - name: Get one remediation activity by ID
|
156 |
| - href: /defender-endpoint/get-remediation-one-activity |
| 156 | + href: /defender-endpoint/get-remediation-one-activity?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
157 | 157 | - name: List all remediation activities
|
158 |
| - href: /defender-endpoint/get-remediation-all-activities |
| 158 | + href: /defender-endpoint/get-remediation-all-activities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
159 | 159 | - name: Security baselines
|
160 | 160 | items:
|
161 | 161 | - name: Export security baselines assessment
|
162 |
| - href: /defender-endpoint/export-security-baseline-assessment |
| 162 | + href: /defender-endpoint/export-security-baseline-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
163 | 163 | - name: List security baselines assessment profiles
|
164 |
| - href: /defender-endpoint/get-security-baselines-assessment-profiles |
| 164 | + href: /defender-endpoint/get-security-baselines-assessment-profiles?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
165 | 165 | - name: List security baselines assessment configurations
|
166 |
| - href: /defender-endpoint/get-security-baselines-assessment-configurations |
| 166 | + href: /defender-endpoint/get-security-baselines-assessment-configurations?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
167 | 167 | - name: Frequently asked questions
|
168 | 168 | href: defender-vulnerability-management-faq.md
|
169 | 169 | - name: Vulnerability support in Defender Vulnerability Management
|
|
0 commit comments