You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-security-recommendation.md
+37-25Lines changed: 37 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,12 +46,14 @@ Each device in the organization is scored based on three important factors to he
46
46
47
47
Access the Security recommendations page a few different ways:
48
48
49
-
- Vulnerability management navigation menu in the Microsoft Defender portal
49
+
- Vulnerability management navigation menu in the [Microsoft Defender portal](https://security.microsoft.com)
50
50
- Top security recommendations in the [vulnerability management dashboard](tvm-dashboard-insights.md)
51
51
52
52
### Navigation menu
53
53
54
-
Go to the **Vulnerability management** navigation menu and select **Recommendations**. The page contains a list of security recommendations for the threats and vulnerabilities found in your organization.
54
+
In the [Microsoft Defender portal](https://security.microsoft.com), go to the **Vulnerability management** navigation menu and select **Recommendations**.
55
+
56
+
The page contains a list of security recommendations for the threats and vulnerabilities found in your organization.
55
57
56
58
### Top security recommendations in the vulnerability management dashboard
57
59
@@ -65,7 +67,7 @@ The top security recommendations list the improvement opportunities prioritized
65
67
66
68
Security recommendations enable you to view your organization's security recommendations, the number of weaknesses found, related components, threat insights, number of exposed devices, device status, remediation type, remediation activities, and associated tags. You can also see how your exposure score and Secure Score for devices would change when recommendations are implemented.
67
69
68
-
The color of the **Exposed devices** graph changes as the trend changes. If the number of exposed devices is on the rise, the color changes to red. If there's a decrease in the number of exposed devices, the color of the graph will change to green.
70
+
The color of the **Exposed devices** graph changes as the trend changes. If the number of exposed devices is on the rise, the color changes to red. If there's a decrease in the number of exposed devices, the color of the graph changes to green.
69
71
70
72
> [!NOTE]
71
73
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than seven days.
@@ -82,85 +84,95 @@ Useful icons also quickly call your attention to:
82
84
83
85
### Impact
84
86
85
-
The impact column shows the potential impact on your exposure score and Secure Score for Devices once a recommendation is implemented. You should prioritize items that will lower your exposure score and raise your Secure Score for Devices.
87
+
The impact column shows the potential impact on your exposure score and Secure Score for Devices once a recommendation is implemented. You should prioritize items that lower your exposure score and raise your Secure Score for Devices.
86
88
87
-
- The potential reduction in your exposure score is displayed as: :::image type="icon" source="/defender/media/defender-vulnerability-management/reduce-exposure-score.png" border="false":::. A lower exposure score means devices are less vulnerable to exploitation. Since the exposure score is based on a combination of factors, including new remediations or newly discovered vulnerabilities, the actual score reduction may be lower.
89
+
- The potential reduction in your exposure score is displayed as: :::image type="icon" source="/defender/media/defender-vulnerability-management/reduce-exposure-score.png" border="false":::. A lower exposure score means devices are less vulnerable to exploitation. Since the exposure score is based on a combination of factors, including new remediations or newly discovered vulnerabilities, the actual score reduction might be lower.
88
90
89
91
- The projected increase to your Secure Score for Devices is displayed as: :::image type="icon" source="/defender/media/defender-vulnerability-management/increase-secure-score.png" border="false":::. A higher Secure Score for Devices means your endpoints are more resilient against cybersecurity attacks.
90
92
91
93
### Explore security recommendation options
92
94
93
-
Select the security recommendation that you want to investigate or process.
95
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation that you want to investigate or process.
94
96
95
-
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png" lightbox="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png":::
97
+
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png" lightbox="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png":::
96
98
97
-
From the flyout, you can choose any of the following options:
99
+
2. In the flyout, you can choose any of the following options:
98
100
99
-
-**Open software page** - Open the software page to get more context on the software and how it's distributed. The information can include threat context, associated recommendations, weaknesses discovered, number of exposed devices, discovered vulnerabilities, names and detailed of devices with the software installed, and version distribution.
101
+
-**Open software page** - Open the software page to get more context on the software and how it's distributed. The information can include threat context, associated recommendations, weaknesses discovered, number of exposed devices, discovered vulnerabilities, names and detailed of devices with the software installed, and version distribution.
100
102
101
-
-[**Remediation options**](tvm-remediation.md) - Submit a remediation request to open a ticket in Microsoft Intune for your IT administrator to pick up and address. Track the remediation activity in the Remediation page.
103
+
-[**Remediation options**](tvm-remediation.md) - Submit a remediation request to open a ticket in Microsoft Intune for your IT administrator to pick up and address. Track the remediation activity in the Remediation page.
102
104
103
-
-[**Exception options**](tvm-exception.md) - Submit an exception, provide justification, and set exception duration if you can't remediate the issue yet.
105
+
-[**Exception options**](tvm-exception.md) - Submit an exception, provide justification, and set exception duration if you can't remediate the issue yet.
104
106
105
107
> [!NOTE]
106
108
> When a software change is made on a device, it typically takes 2 hours for the data to be reflected in the security portal. However, it may sometimes take longer. Configuration changes can take anywhere from 4 to 24 hours.
107
109
108
110
### Investigate changes in device exposure or impact
109
111
110
-
If there is a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
112
+
If there's a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
111
113
112
-
1.Select the recommendation and **Open software page**
114
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), select a recommendation, and then select**Open software page**
113
115
114
116
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md)
115
117
116
118
3. Decide how to address the increase or your organization's exposure, such as submitting a remediation request
117
119
118
120
### Recommendations on devices
119
121
120
-
To see the list of security recommendations that apply to a device you can:
122
+
To see the list of security recommendations that apply to a device, follow these steps:
121
123
122
-
1.Select the device from the **Exposed devices** tab in the recommendation flyout panel or select the device directly from the **Device inventory** page.
124
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), in the **Device inventory** page, select a device.
123
125
124
-
2. Select the **Security recommendations** tab to see a list of security recommendations for this device.
126
+
2. Select the **Security recommendations** tab to see a list of security recommendations for the device.
125
127
126
128
:::image type="content" source="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png":::
127
129
128
130
> [!NOTE]
129
-
> If you have the [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/concept-enterprise/) integration enabled in Defender for Endpoint, recommendations for Enterprise IoT devices that appear on IoT devices tab will appear on the security recommendations page. For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
131
+
> If you have the [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/concept-enterprise/) integration enabled in Defender for Endpoint, recommendations for Enterprise IoT devices that appear on IoT devices tab appears on the security recommendations page. For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
130
132
131
133
## Request remediation
132
134
133
135
The vulnerability management remediation capability bridges the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the **Security recommendation** page to Intune. [Learn more about remediation options](tvm-remediation.md)
134
136
135
137
### How to request remediation
136
138
137
-
Select a security recommendation you would like to request remediation for, and then select **Remediation options**. Fill out the form and select **Submit request**. Go to the [**Remediation**](tvm-remediation.md) page to view the status of your remediation request. [Learn more about how to request remediation](tvm-remediation.md#request-remediation)
139
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), select a security recommendation you would like to request remediation for, and then select **Remediation options**.
140
+
141
+
2. Fill out the form and select **Submit request**.
142
+
143
+
3. To view the status of your remediation request, go to the [**Remediation**](tvm-remediation.md) page.
144
+
145
+
For more information, see [Learn more about how to request remediation](tvm-remediation.md#request-remediation),
138
146
139
147
## File for exception
140
148
141
-
As an alternative to a remediation request when a recommendation is not relevant at the moment, you can create exceptions for recommendations. [Learn more about exceptions](tvm-exception.md)
149
+
As an alternative to a remediation request when a recommendation isn't relevant at the moment, you can create exceptions for recommendations. [Learn more about exceptions](tvm-exception.md)
142
150
143
-
Only users with "exceptions handling" permissions can add exception. [Learn more about RBAC roles](/defender-endpoint/user-roles).
151
+
Only users with appropriate permissions can add exceptions (see [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac)).
144
152
145
153
When an exception is created for a recommendation, the recommendation is no longer active. The recommendation state will change to **Full exception** or **Partial exception** (by device group).
146
154
147
155
### How to create an exception
148
156
149
-
Select a security recommendation you would like to create an exception for, and then select **Exception options**.
157
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation you want to create an exception for, and then select **Exception options**.
158
+
159
+

160
+
161
+
2. Fill out the form and submit.
150
162
151
-

163
+
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Threat & Vulnerability Management** menu, and select the **Exceptions** tab.
152
164
153
-
Fill out the form and submit. To view all your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Threat & Vulnerability Management** menu and select the **Exceptions** tab. [Learn more about how to create an exception](tvm-exception.md#create-an-exception)
165
+
For more information, see [Learn more about how to create an exception](tvm-exception.md#create-an-exception).
154
166
155
167
## Report inaccuracy
156
168
157
169
You can report a false positive when you see any vague, inaccurate, incomplete, or already remediated security recommendation information.
158
170
159
-
1.Open the Security recommendation.
171
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), open a security recommendation.
160
172
161
173
2. Select the three dots beside the security recommendation that you want to report, then select **Report inaccuracy**.
162
174
163
-
3.From the flyout pane, select the inaccuracy category from the drop-down menu, fill in your email address, and details regarding the inaccuracy.
175
+
3.In the flyout pane, select the inaccuracy category from the drop-down menu, fill in your email address, and details regarding the inaccuracy.
164
176
165
177
4. Select **Submit**. Your feedback is immediately sent to the vulnerability management experts.
0 commit comments