You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-remediation.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Remediate vulnerabilities
3
-
description: Remediate security weaknesses discovered through security recommendations, and create exceptions if needed, in defender vulnerability management.
2
+
title: Remediate vulnerabilities with Microsoft Defender Vulnerability Management
3
+
description: Remediate security weaknesses discovered through security recommendations, and create exceptions if needed, in Defender Vulnerability Management.
4
4
ms.service: defender-vuln-mgmt
5
5
ms.author: deniseb
6
6
author: denisebmsft
@@ -15,7 +15,7 @@ search.appverid: met150
15
15
ms.date: 02/23/2025
16
16
---
17
17
18
-
# Remediate vulnerabilities
18
+
# Remediate vulnerabilities with Microsoft Defender Vulnerability Management
19
19
20
20
**Applies to:**
21
21
@@ -49,11 +49,11 @@ See [Use Intune to remediate vulnerabilities identified by Microsoft Defender fo
49
49
50
50
3. Fill out the form, including what you are requesting remediation for, applicable device groups, priority, due date, and optional notes.
51
51
52
-
If you choose the "attention required" remediation option, selecting a due date won't be available since there's no specific action.
52
+
If you choose the "attention required" remediation option, you can't select a due date because there's no specific action.
53
53
54
-
4. Select **Submit request**. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. This won't trigger a remediation or apply any changes to devices.
54
+
4. Select **Submit request**. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. This action doesn't trigger a remediation or apply any changes to devices.
55
55
56
-
5. Notify your IT Administrator about the new request and have them log into Intune to approve or reject the request and start a package deployment.If you want to check how the ticket shows up in Intune, See [Use Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint](/mem/intune/protect/atp-manage-vulnerabilities) for details.
56
+
5. Notify your IT Administrator about the new request and have them log into Intune to approve or reject the request and start a package deployment.If you want to check how the ticket shows up in Intune, See [Use Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint](/mem/intune/protect/atp-manage-vulnerabilities) for details.
57
57
58
58
6. Go to the [**Remediation**](tvm-remediation.md) page to view the status of your remediation request.
59
59
@@ -68,14 +68,14 @@ Lower your organization's exposure from vulnerabilities and increase your securi
68
68
69
69
When you submit a remediation request from the Security recommendations page, it kicks off a remediation activity. A security task is created that can be tracked on a **Remediation** page, and a remediation ticket is created in Microsoft Intune.
70
70
71
-
If you chose the "attention required" remediation option, there will be no progress bar, ticket status, or due date since there's no actual action we can monitor.
71
+
If you chose the "attention required" remediation option, there's no progress bar, ticket status, or due date since there's no actual action we can monitor.
72
72
73
73
Once you are in the Remediation page, select the remediation activity that you want to view. You can follow the remediation steps, track progress, view the related recommendation, export to CSV, or mark as complete.
74
74
75
75
:::image type="content" source="/defender/media/remediation-flyouteolswnew.png" lightbox="/defender/media/remediation-flyouteolswnew.png" alt-text="Example of the Remediation page, with a selected remediation activity, and that activity's flyout listing the description, IT service and device management tools, and device remediation":::
76
76
77
77
> [!NOTE]
78
-
> There is a 180 day retention period for completed remediation activities. To keep the Remediation page performing optimally, the remediation activity will be removed 6 months after its completion.
78
+
> There's a 180 day retention period for completed remediation activities. To keep the Remediation page performing optimally, the remediation activity will be removed six months after its completion.
79
79
80
80
### Completed by column
81
81
@@ -85,11 +85,11 @@ Track who closed the remediation activity with the "Completed by" column on the
85
85
-**System confirmation**: The task was automatically completed (all devices remediated)
86
86
-**N/A**: Information isn't available because we don't know how this older task was completed
87
87
88
-
:::image type="content" alt-text="Created by and completed by columns with two rows. One row for completed by has example of an email, the other row says system confirmation." source="/defender/media/defender-vulnerability-management/tvm-completed-by.png":::
88
+
:::image type="content" alt-text="Created by and completed by columns with two rows. One row for completed by has example of an email. The other row says system confirmation." source="/defender/media/defender-vulnerability-management/tvm-completed-by.png":::
89
89
90
90
### Top remediation activities in the dashboard
91
91
92
-
View **Top remediation activities** in the [**Vulnerability management** dashboard](tvm-dashboard-insights.md). Select any of the entries to go to the **Remediation** page. You can mark the remediation activity as completed after the IT admin team remediates the task.
92
+
In the [Microsoft Defender portal](https://security.microsoft.com), you can view **Top remediation activities** in the **Vulnerability management** dashboard. Select any of the entries to go to the **Remediation** page. You can mark the remediation activity as completed after the IT admin team remediates the task.
93
93
94
94

0 commit comments