File tree Expand file tree Collapse file tree 2 files changed +5
-3
lines changed Expand file tree Collapse file tree 2 files changed +5
-3
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ ms.collection:
14
14
ms.custom : admindeeplinkDEFENDER
15
15
ms.topic : conceptual
16
16
search.appverid : met150
17
- ms.date : 04/03/2024
17
+ ms.date : 01/02/2025
18
18
---
19
19
20
20
# Network device discovery and vulnerability management
@@ -85,7 +85,6 @@ Your first step is to select a device that performs the authenticated network sc
85
85
86
86
8 . To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
87
87
88
- - login.windows.net
89
88
- \* .security.microsoft.com
90
89
- login.microsoftonline.com
91
90
- \* .blob.core.windows.net/networkscannerstable/\*
Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
ms.topic : conceptual
14
14
search.appverid : met150
15
- ms.date : 09/04/2024
15
+ ms.date : 01/02/2025
16
16
---
17
17
18
18
# Asset rule management - Dynamic rules for devices
@@ -67,6 +67,9 @@ The following steps guide you on how to create a new dynamic rule in Microsoft D
67
67
68
68
You can see the dynamic tags assigned in the Device Inventory view.
69
69
70
+ > [ !NOTE]
71
+ > Dynamic tags are not supported by [ security baseline assessments] ( /defender-vulnerability-management/tvm-security-baselines ) .
72
+
70
73
To see tags on individual devices:
71
74
72
75
1 . Select ** Devices** from the ** Assets** navigation menu in the [ Microsoft Defender portal] ( https://security.microsoft.com ) .
You can’t perform that action at this time.
0 commit comments