Skip to content

Commit b245ff0

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into msem-mdvm-updates-3
2 parents 5a0db22 + a11521e commit b245ff0

File tree

86 files changed

+726
-485
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+726
-485
lines changed

defender-for-cloud-apps/protect-salesforce.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,13 @@ Connecting Salesforce to Defender for Cloud Apps gives you improved insights int
2626
- Ransomware
2727
- Unmanaged bring your own device (BYOD)
2828

29+
30+
### Prerequisites
31+
32+
- Install and authorize the Salesforce Connected App in the target Salesforce org before you start the connection process. Salesforce enforces usage restrictions on Connected Apps. For more information, see:[Prepare for Connected App Usage Restrictions Change](https://help.salesforce.com/s/articleView?id=005132365&type=1)
33+
34+
- Assign the **Approve Uninstalled Connected Apps** permission to the Salesforce service account used to connect Microsoft Defender for Cloud Apps. Salesforce requires this permission to connect third-party apps via OAuth.
35+
2936
## How Defender for Cloud Apps helps to protect your environment
3037

3138
- [Detect cloud threats, compromised accounts, and malicious insiders](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware)

defender-vulnerability-management/defender-vulnerability-management.md

Lines changed: 19 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,6 @@ Reducing cyber risk requires comprehensive risk-based vulnerability management t
2727

2828
Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Using Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.
2929

30-
Watch the following video to learn more about Defender Vulnerability Management.
31-
32-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=4ee839c5-4ccb-4cc9-9945-ae8228e35121]
33-
3430
> [!TIP]
3531
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
3632
@@ -74,7 +70,23 @@ Enable security administrators and IT administrators to collaborate and seamless
7470
- **Alternate mitigations** - Gain insights on other mitigations, such as configuration changes that can reduce risk associated with software vulnerabilities.
7571
- **Real-time remediation status** - Real-time monitoring of the status and progress of remediation activities across the organization.
7672

77-
## Navigation pane
73+
## Vulnerability management experience in Microsoft Defender portal
74+
75+
# [Preview customers](#tab/preview-customers)
76+
77+
[!INCLUDE [mdvm-msem-section](../includes/mdvm-msem-section.md)]
78+
79+
|Area|Description|
80+
|---|---|
81+
| [**Exposure management > Vulnerability management > Overview**](tvm-dashboard-insights.md) |Get a high-level view of your organization's vulnerability information, including the endpoints exposure score, top recommendations, events, vulnerable software, remediation activities, and more. |
82+
|[**Exposure management > Recommendations**](tvm-security-recommendation.md)|See all Microsoft security recommendations in a single, streamlined experience. The **Vulnerabilities** section lists security recommendations and related threat information, where you can dive into recommendations related to specific vulnerabilities. |
83+
|[**Exposure management > Vulnerability management > Remediation**](tvm-remediation.md)|See remediation activities you've created and recommendation exceptions.|
84+
|[**Exposure management > Vulnerability management > Inventories**](tvm-software-inventory.md)|Discover and assess all your organization's assets in a single view.|
85+
|[**Exposure management > Vulnerability management > Vulnerabilities**](tvm-weaknesses.md)|See the list of common vulnerabilities and exposures (CVEs) in your organization.|
86+
|[**Exposure management > Vulnerability management > Overview > Top impactful events**](threat-and-vuln-mgt-event-timeline.md)|View events that may impact your organization's risk. You can also access the event timeline from the **Recommendations > Score history** section.|
87+
|[**Exposure management > Vulnerability management > Baseline assessments**](tvm-security-baselines.md)|Monitor security baseline compliance and identify changes in real-time.|
88+
89+
# [Existing customers](#tab/existing-customers)
7890

7991
|Area|Description|
8092
|---|---|
@@ -86,6 +98,8 @@ Enable security administrators and IT administrators to collaborate and seamless
8698
|[**Event timeline**](threat-and-vuln-mgt-event-timeline.md)|View events that may impact your organization's risk.|
8799
|[**Baselines assessment**](tvm-security-baselines.md)|Monitor security baseline compliance and identify changes in real-time.|
88100

101+
---
102+
89103
## APIs
90104

91105
Run vulnerability management related API calls to automate vulnerability management workflows. To get started, see [Supported Microsoft Defender for Endpoint APIs](/defender-endpoint/api/exposed-apis-list).

defender-vulnerability-management/device-restart-status.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,29 +3,29 @@ title: Device restart status
33
description: Learn about the device restart status tag in Microsoft Defender Vulnerability Management
44
ms.service: defender-vuln-mgmt
55
ms.pagetype: security
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: lwainstein
7+
author: limwainstein
88
ms.localizationpriority: medium
9-
manager: deniseb
9+
manager: bagol
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- tier1
1414
ms.topic: concept-article
1515
search.appverid: met150
16-
ms.date: 03/04/2022
16+
ms.date: 11/25/2025
17+
appliesto:
18+
- Microsoft Defender Vulnerability Management
19+
- Microsoft Defender for Endpoint Plan 2
20+
- Microsoft Defender XDR
21+
- Microsoft Defender for Servers Plan 1 & 2
1722
---
1823

1924
# Device restart status
2025

2126
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
2227

23-
**Applies to:**
24-
25-
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)
26-
- [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint)
27-
- [Microsoft Defender XDR](/defender-xdr)
28-
- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
28+
Security recommendations can help reduce your overall vulnerability exposure and your exposure score. A robust update process is key when it comes to addressing these recommendations in your organization. If an update hasn't completed for some devices due to a pending restart, the effect of addressing the security recommendation isn't reflected in your exposure score.
2929

3030
Security recommendations in Defender Vulnerability Management can help reduce your overall vulnerability exposure and your exposure score. A robust update process is key when it comes to addressing these recommendations in your organization. If an update hasn't completed for some devices due to a pending restart, the effect of addressing the security recommendation isn't reflected in your exposure score.
3131

@@ -41,15 +41,15 @@ The **Pending restart** tag helps you identify devices in this state so you can
4141

4242
The device restart status is visible in the following experiences in the Microsoft Defender portal.
4343

44-
### Security recommendations page
44+
### Recommendations page
4545

46-
On the security recommendations pages, filter by the **Pending restart** tag to only see security recommendations with devices pending a restart.
46+
On the **Recommendations** page, filter by the **Pending restart** tag to only see security recommendations with devices pending a restart.
4747

4848
:::image type="content" alt-text="pending restart tag in the security recommendations page." source="/defender/media/defender-vulnerability-management/pending-restart.png" lightbox="/defender/media/defender-vulnerability-management/pending-restart.png":::
4949

5050
### Software page
5151

52-
On the software page filter by, the **Pending restart** tag to see missing KBs with devices that are pending a restart:
52+
On the software page filter by the **Pending restart** tag to see missing KBs with devices that are pending a restart:
5353

5454
:::image type="content" alt-text="pending restart tag in the software page." source="/defender/media/defender-vulnerability-management/pending-restart-KB.png" lightbox="/defender/media/defender-vulnerability-management/pending-restart-KB.png":::
5555

-45.7 KB
Loading
-48.4 KB
Loading
-298 KB
Loading
-238 KB
Loading
-87.3 KB
Loading
-117 KB
Loading
-59.3 KB
Loading

0 commit comments

Comments
 (0)