|
25 | 25 | - name: Discover devices and explore inventories |
26 | 26 | items: |
27 | 27 | - name: Device inventory |
28 | | - href: /defender-endpoint/machines-view-overview |
| 28 | + href: /defender-endpoint/machines-view-overview?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
29 | 29 | - name: Assign device value |
30 | 30 | href: tvm-assign-device-value.md |
31 | 31 | - name: Explore inventories |
|
95 | 95 | - name: Assessments of vulnerabilities and secure configurations |
96 | 96 | items: |
97 | 97 | - name: Export assessment methods and properties |
98 | | - href: /defender-endpoint/api/get-assessment-methods-properties |
| 98 | + href: /defender-endpoint/api/get-assessment-methods-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
99 | 99 | - name: Export secure configuration assessment |
100 | | - href: /defender-endpoint/get-assessment-secure-config |
| 100 | + href: /defender-endpoint/get-assessment-secure-config?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
101 | 101 | - name: Export software inventory assessment |
102 | | - href: /defender-endpoint/api/get-assessment-software-inventory |
| 102 | + href: /defender-endpoint/api/get-assessment-software-inventory?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
103 | 103 | - name: Export software vulnerabilities assessment |
104 | | - href: /defender-endpoint/api/get-assessment-software-vulnerabilities |
| 104 | + href: /defender-endpoint/api/get-assessment-software-vulnerabilities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
105 | 105 | - name: Export non-product code software inventory assessment |
106 | | - href: /defender-endpoint/api/get-assessment-non-cpe-software-inventory |
| 106 | + href: /defender-endpoint/api/get-assessment-non-cpe-software-inventory?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
107 | 107 | - name: Certificate inventory |
108 | 108 | items: |
109 | 109 | - name: Export certificate inventory assessment |
110 | | - href: /defender-endpoint/export-certificate-inventory-assessment |
| 110 | + href: /defender-endpoint/export-certificate-inventory-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
111 | 111 | - name: Authenticated scans |
112 | 112 | items: |
113 | 113 | - name: Authenticated scan methods and properties |
114 | | - href: /defender-endpoint/get-authenticated-scan-properties |
| 114 | + href: /defender-endpoint/get-authenticated-scan-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
115 | 115 | - name: Get all scan definitions |
116 | | - href: /defender-endpoint/api/get-all-scan-definitions |
| 116 | + href: /defender-endpoint/api/get-all-scan-definitions?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
117 | 117 | - name: Add, delete or update a scan definition |
118 | | - href: /defender-endpoint/api/add-a-new-scan-definition |
| 118 | + href: /defender-endpoint/api/add-a-new-scan-definition?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
119 | 119 | - name: Get all scan agents |
120 | | - href: /defender-endpoint/api/get-all-scan-agents |
| 120 | + href: /defender-endpoint/api/get-all-scan-agents?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
121 | 121 | - name: Get scan agent Id |
122 | | - href: /defender-endpoint/api/get-agent-details |
| 122 | + href: /defender-endpoint/api/get-agent-details?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
123 | 123 | - name: Get scan history by definition |
124 | | - href: /defender-endpoint/api/get-scan-history-by-definition |
| 124 | + href: /defender-endpoint/api/get-scan-history-by-definition?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
125 | 125 | - name: Get scan history by session |
126 | | - href: /defender-endpoint/api/get-scan-history-by-session |
| 126 | + href: /defender-endpoint/api/get-scan-history-by-session?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
127 | 127 | - name: Browser extensions |
128 | 128 | items: |
129 | 129 | - name: Export browser extensions assessment |
130 | | - href: /defender-endpoint/api/get-assessment-browser-extensions |
| 130 | + href: /defender-endpoint/api/get-assessment-browser-extensions?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
131 | 131 | - name: Get browser extensions permission information |
132 | | - href: /defender-endpoint/api/get-browser-extensions-permission-info |
| 132 | + href: /defender-endpoint/api/get-browser-extensions-permission-info?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
133 | 133 | - name: Information gathering |
134 | 134 | items: |
135 | 135 | - name: Export information gathering assessment |
136 | | - href: /defender-endpoint/get-assessment-information-gathering |
| 136 | + href: /defender-endpoint/get-assessment-information-gathering?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
137 | 137 | - name: Hardware and Firmware |
138 | 138 | items: |
139 | 139 | - name: Export hardware and firmware inventory assessment |
140 | | - href: /defender-endpoint/api/export-firmware-hardware-assessment |
| 140 | + href: /defender-endpoint/api/export-firmware-hardware-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
141 | 141 | - name: Machine |
142 | 142 | items: |
143 | 143 | - name: Get installed software |
144 | | - href: /defender-endpoint/get-installed-software |
| 144 | + href: /defender-endpoint/get-installed-software?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
145 | 145 | - name: Get discovered vulnerabilities |
146 | | - href: /defender-endpoint/get-discovered-vulnerabilities |
| 146 | + href: /defender-endpoint/get-discovered-vulnerabilities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
147 | 147 | - name: Get security recommendations |
148 | | - href: /defender-endpoint/get-security-recommendations |
| 148 | + href: /defender-endpoint/get-security-recommendations?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
149 | 149 | - name: Get missing KBs |
150 | | - href: /defender-endpoint/get-missing-kbs-machine |
| 150 | + href: /defender-endpoint/get-missing-kbs-machine?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
151 | 151 | - name: Remediation activity |
152 | 152 | items: |
153 | 153 | - name: Remediation activity methods and properties |
154 | | - href: /defender-endpoint/get-remediation-methods-properties |
| 154 | + href: /defender-endpoint/get-remediation-methods-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
155 | 155 | - name: Get one remediation activity by ID |
156 | | - href: /defender-endpoint/get-remediation-one-activity |
| 156 | + href: /defender-endpoint/get-remediation-one-activity?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
157 | 157 | - name: List all remediation activities |
158 | | - href: /defender-endpoint/get-remediation-all-activities |
| 158 | + href: /defender-endpoint/get-remediation-all-activities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
159 | 159 | - name: Security baselines |
160 | 160 | items: |
161 | 161 | - name: Export security baselines assessment |
162 | | - href: /defender-endpoint/export-security-baseline-assessment |
| 162 | + href: /defender-endpoint/export-security-baseline-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
163 | 163 | - name: List security baselines assessment profiles |
164 | | - href: /defender-endpoint/get-security-baselines-assessment-profiles |
| 164 | + href: /defender-endpoint/get-security-baselines-assessment-profiles?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
165 | 165 | - name: List security baselines assessment configurations |
166 | | - href: /defender-endpoint/get-security-baselines-assessment-configurations |
| 166 | + href: /defender-endpoint/get-security-baselines-assessment-configurations?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json |
167 | 167 | - name: Frequently asked questions |
168 | 168 | href: defender-vulnerability-management-faq.md |
169 | 169 | - name: Vulnerability support in Defender Vulnerability Management |
|
0 commit comments