File tree Expand file tree Collapse file tree 2 files changed +5
-3
lines changed Expand file tree Collapse file tree 2 files changed +5
-3
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ ms.collection:
1414ms.custom : admindeeplinkDEFENDER
1515ms.topic : conceptual
1616search.appverid : met150
17- ms.date : 04/03/2024
17+ ms.date : 01/02/2025
1818---
1919
2020# Network device discovery and vulnerability management
@@ -85,7 +85,6 @@ Your first step is to select a device that performs the authenticated network sc
8585
86868 . To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
8787
88- - login.windows.net
8988 - \* .security.microsoft.com
9089 - login.microsoftonline.com
9190 - \* .blob.core.windows.net/networkscannerstable/\*
Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ ms.collection:
1212- tier2
1313ms.topic : conceptual
1414search.appverid : met150
15- ms.date : 09/04/2024
15+ ms.date : 01/02/2025
1616---
1717
1818# Asset rule management - Dynamic rules for devices
@@ -67,6 +67,9 @@ The following steps guide you on how to create a new dynamic rule in Microsoft D
6767
6868You can see the dynamic tags assigned in the Device Inventory view.
6969
70+ > [ !NOTE]
71+ > Dynamic tags are not supported by [ security baseline assessments] ( /defender-vulnerability-management/tvm-security-baselines ) .
72+
7073To see tags on individual devices:
7174
72751 . Select ** Devices** from the ** Assets** navigation menu in the [ Microsoft Defender portal] ( https://security.microsoft.com ) .
You can’t perform that action at this time.
0 commit comments