You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-end-of-support-software.md
+6-10Lines changed: 6 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,7 @@
1
1
---
2
2
title: Plan for end-of-support software and software versions
3
3
description: Discover and plan for software and software versions that are no longer supported and won't receive security updates.
4
-
keywords: threat and vulnerability management, Microsoft Defender for Endpoint tvm security recommendation, cybersecurity recommendation, actionable security recommendation, Microsoft Defender Vulnerability Management
5
4
ms.service: defender-vuln-mgmt
6
-
ms.mktglfcycl: deploy
7
-
ms.sitesec: library
8
-
ms.pagetype: security
9
5
ms.author: siosulli
10
6
author: siosulli
11
7
ms.localizationpriority: medium
@@ -28,7 +24,7 @@ ms.date: 03/04/2022
28
24
-[Microsoft Defender XDR](/defender-xdr)
29
25
-[Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
30
26
31
-
End-of-support (EOS), otherwise known as end-of-life (EOL), for software or software versions means that they will no longer be supported or serviced, and will not receive security updates. When you use software or software versions with ended support, you're exposing your organization to security vulnerabilities, legal, and financial risks.
27
+
End-of-support (EOS), otherwise known as end-of-life (EOL), for software or software versions means that they'll no longer be supported or serviced, and won't receive security updates. When you use software or software versions with ended support, you're exposing your organization to security vulnerabilities, legal, and financial risks.
32
28
33
29
It's crucial for Security and IT Administrators to work together and ensure that the organization's software inventory is configured for optimal results, compliance, and a healthy network ecosystem. They should examine the options to remove or replace apps that have reached end-of-support and update versions that are no longer supported. It's best to create and implement a plan **before** the end of support dates.
34
30
@@ -45,7 +41,7 @@ It's crucial for Security and IT Administrators to work together and ensure that
45
41
46
42
:::image type="content" alt-text="tags that say EOS software, EOS versions, and Upcoming EOS versions." source="/defender/media/defender-vulnerability-management/tvm-eos-tag.png" lightbox="/defender/media/defender-vulnerability-management/tvm-eos-tag.png":::
47
43
48
-
3. You'll see a list of recommendations related to software with ended support, software versions that are end of support, or versions with upcoming end of support. These tags are also visible in the [software inventory](tvm-software-inventory.md) page. Tags for versions with upcoming end of support will display up to 6 months in advance.
44
+
3. You see a list of recommendations related to software with ended support, software versions that are end of support, or versions with upcoming end of support. These tags are also visible in the [software inventory](tvm-software-inventory.md) page. Tags for versions with upcoming end of support displays up to six months in advance.
49
45
50
46
:::image type="content" alt-text="image of recommendations with EOS tag." source="/defender/media/defender-vulnerability-management/tvm-eos-tags-column.png" lightbox="/defender/media/defender-vulnerability-management/tvm-eos-tags-column.png":::
51
47
@@ -54,21 +50,21 @@ It's crucial for Security and IT Administrators to work together and ensure that
54
50
55
51
To view a list of versions that have reached end of support, or end or support soon, and those dates, follow the below steps:
56
52
57
-
1. A message will appear in the security recommendation flyout for software with versions that have reached end of support, or will reach end of support soon.
53
+
1. A message appears in the security recommendation flyout for software with versions that have reached end of support, or will reach end of support soon.
58
54
59
55
:::image type="content" alt-text="image of version distribution link." source="/defender/media/defender-vulnerability-management/eos-upcoming-eos.png" lightbox="/defender/media/defender-vulnerability-management/eos-upcoming-eos.png":::
60
56
61
57
2. Select the **version distribution** link to go to the software drill-down page. There, you can see a filtered list of versions with tags identifying them as end of support, or upcoming end of support.
62
58
63
59
:::image type="content" alt-text="image of software drilldown page with end of support software." source="/defender/media/defender-vulnerability-management/software-drilldown-eos.png" lightbox="/defender/media/defender-vulnerability-management/software-drilldown-eos.png":::
64
60
65
-
3. Select one of the versions in the table to open. For example, version 10.0.18362.1. A flyout will appear with the end of support date.
61
+
3. Select one of the versions in the table to open. For example, version 10.0.18362.1. A flyout appears with the end of support date.
66
62
67
63
:::image type="content" alt-text="image of end of support date." source="/defender/media/defender-vulnerability-management/version-eos-date.png" lightbox="/defender/media/defender-vulnerability-management/version-eos-date.png":::
68
64
69
-
Once you identify which software and software versions are vulnerable due to their end-of-support status, you must decide whether to update or remove them from your organization. Doing so will lower your organizations exposure to vulnerabilities and advanced persistent threats.
65
+
Once you identify which software and software versions are vulnerable due to their end-of-support status, you must decide whether to update or remove them from your organization. Doing so lowers your organizations exposure to vulnerabilities and advanced persistent threats.
0 commit comments