Skip to content

Commit 5e1c58e

Browse files
authored
Merge pull request #5832 from DebLanger/recommendations
udpates
2 parents fb6517d + 68705e7 commit 5e1c58e

File tree

2 files changed

+4
-18
lines changed

2 files changed

+4
-18
lines changed

exposure-management/exposure-insights-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,8 +103,6 @@ Security Exposure Management ingests security recommendations from multiple sour
103103
- **New unified Recommendations page**: All recommendations from various sources (Secure Score, Defender for Cloud, Defender for Endpoint, etc.) are now consolidated into one catalog view in the Defender portal
104104
- **Organized by attack surface**: Recommendations are organized by tabs for different domains - Devices, Cloud, Identity, SaaS, and Data
105105
- **Categorized by issue type**: Recommendations are separated by type - misconfigurations vs vulnerabilities vs secrets. For example, on the Devices tab, you'll find separate views for Misconfigurations and Vulnerabilities, aligning with different remediation workflows
106-
- **Risk-based prioritization**: Combines vulnerability data from endpoints and cloud environments into a unified, actionable view, including contextual risk-based Secure Score.
107-
- **Unified remediation flow**: Side-by-side visibility into device and cloud weaknesses enabling security teams to efficiently track posture improvements, remediate vulnerabilities, and understand attack paths in real time through a streamlined interface.
108106

109107
### Recommendation management
110108

exposure-management/security-recommendations.md

Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ This article describes how to work with security recommendations in the new unif
1717

1818
- Learn about the [unified recommendations catalog](exposure-insights-overview.md#working-with-recommendations) before you start.
1919
- [Review permissions and prerequisites needed](prerequisites.md) for working with Security Exposure Management.
20-
- Understand that all recommendations from various sources (Secure Score, Defender for Cloud, Defender for Endpoint, etc.) are now consolidated into one unified view in the Defender portal.
2120

2221
## Overview of the unified recommendations catalog
2322

@@ -58,7 +57,7 @@ Apply advanced filtering using the **Add filter** option to narrow down recommen
5857

5958
#### Devices
6059

61-
The Devices tab provides a unified view of device-related security recommendations, combining misconfigurations and vulnerabilities into a single location for easier management.
60+
The Devices tab provides a unified view of device-related security recommendations.
6261

6362
There are separate views for issue types:
6463

@@ -69,7 +68,7 @@ This separation recognizes that misconfigurations and vulnerabilities often repr
6968

7069
## Cloud assets
7170

72-
This tab provides a prioritized list of security actions designed to improve your cloud security posture by addressing vulnerabilities and misconfigurations. These recommendations are ranked by effective risk, helping security teams focus on the most critical threats first.
71+
This tab provides a prioritized list of security actions designed to improve your cloud security posture by addressing vulnerabilities, misconfigurations, and exposed secrets. These recommendations are ranked by effective risk, helping security teams focus on the most critical threats first.
7372

7473
Apply filters and filter sets such as **Exposed asset**, **Asset risk factors**, **Environment**, **Workload**, **Recommendation maturity** and others.
7574

@@ -111,29 +110,18 @@ These tabs provide recommendations specific to SaaS applications, identity secur
111110

112111
The recommendations summary on these tabs includes:
113112

114-
- Their unique secure score
113+
- Their unique Microsoft Secure Score
115114
- Score history
116115
- Recommendation by status
117116
- Score comparison
118117

119-
1. Select a recommendation to view and review details.
120-
121-
You can also review recommendations on the **Recommendations** tab in a specific security initiative page in **Initiatives** to access [Microsoft Exposure Recommendations](https://security.microsoft.com/exposure-recommendations) in the [Microsoft Defender portal](https://security.microsoft.com/).
122-
123118
## Remediate recommendations
124119

125120
1. To remediate a recommendation, select a specific recommendation and browse to the **Remediation steps** tab.
126121

127122
1. Review the remediation steps and select **Manage** to follow the steps in the originating workload. The unified experience directs you to the appropriate service:
128-
- Microsoft Defender for Cloud for cloud recommendations
129-
- Microsoft Defender Vulnerability Management for device vulnerabilities
130-
- Microsoft Secure Score for Microsoft 365 recommendations
131-
- Other Microsoft workloads as appropriate
132-
133-
1. **Note on unified workflow**: All recommendations, including those from Azure security center, are now visible in Exposure Management, so you can manage your entire security posture from the unified portal without needing to navigate to separate Azure portals for cloud recommendations.
134123

135124
## Next steps
136125

137126
- Review other ways to [improve security insights with exposure insights](exposure-insights-overview.md)
138-
- Learn how to [Explore security events](security-events.md)
139-
- [Investigate initiative metrics](security-metrics.md)
127+
- [Investigate initiatives and metrics](security-metrics.md)

0 commit comments

Comments
 (0)