Skip to content

Commit bd31fd0

Browse files
committed
Update tvm-remediation.md
1 parent 36c1c51 commit bd31fd0

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

defender-vulnerability-management/tvm-remediation.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Remediate vulnerabilities
3-
description: Remediate security weaknesses discovered through security recommendations, and create exceptions if needed, in defender vulnerability management.
2+
title: Remediate vulnerabilities with Microsoft Defender Vulnerability Management
3+
description: Remediate security weaknesses discovered through security recommendations, and create exceptions if needed, in Defender Vulnerability Management.
44
ms.service: defender-vuln-mgmt
55
ms.author: deniseb
66
author: denisebmsft
@@ -15,7 +15,7 @@ search.appverid: met150
1515
ms.date: 02/23/2025
1616
---
1717

18-
# Remediate vulnerabilities
18+
# Remediate vulnerabilities with Microsoft Defender Vulnerability Management
1919

2020
**Applies to:**
2121

@@ -49,11 +49,11 @@ See [Use Intune to remediate vulnerabilities identified by Microsoft Defender fo
4949

5050
3. Fill out the form, including what you are requesting remediation for, applicable device groups, priority, due date, and optional notes.
5151

52-
If you choose the "attention required" remediation option, selecting a due date won't be available since there's no specific action.
52+
If you choose the "attention required" remediation option, you can't select a due date because there's no specific action.
5353

54-
4. Select **Submit request**. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. This won't trigger a remediation or apply any changes to devices.
54+
4. Select **Submit request**. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. This action doesn't trigger a remediation or apply any changes to devices.
5555

56-
5. Notify your IT Administrator about the new request and have them log into Intune to approve or reject the request and start a package deployment.If you want to check how the ticket shows up in Intune, See [Use Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint](/mem/intune/protect/atp-manage-vulnerabilities) for details.
56+
5. Notify your IT Administrator about the new request and have them log into Intune to approve or reject the request and start a package deployment. If you want to check how the ticket shows up in Intune, See [Use Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint](/mem/intune/protect/atp-manage-vulnerabilities) for details.
5757

5858
6. Go to the [**Remediation**](tvm-remediation.md) page to view the status of your remediation request.
5959

@@ -68,14 +68,14 @@ Lower your organization's exposure from vulnerabilities and increase your securi
6868

6969
When you submit a remediation request from the Security recommendations page, it kicks off a remediation activity. A security task is created that can be tracked on a **Remediation** page, and a remediation ticket is created in Microsoft Intune.
7070

71-
If you chose the "attention required" remediation option, there will be no progress bar, ticket status, or due date since there's no actual action we can monitor.
71+
If you chose the "attention required" remediation option, there's no progress bar, ticket status, or due date since there's no actual action we can monitor.
7272

7373
Once you are in the Remediation page, select the remediation activity that you want to view. You can follow the remediation steps, track progress, view the related recommendation, export to CSV, or mark as complete.
7474

7575
:::image type="content" source="/defender/media/remediation-flyouteolswnew.png" lightbox="/defender/media/remediation-flyouteolswnew.png" alt-text="Example of the Remediation page, with a selected remediation activity, and that activity's flyout listing the description, IT service and device management tools, and device remediation":::
7676

7777
> [!NOTE]
78-
> There is a 180 day retention period for completed remediation activities. To keep the Remediation page performing optimally, the remediation activity will be removed 6 months after its completion.
78+
> There's a 180 day retention period for completed remediation activities. To keep the Remediation page performing optimally, the remediation activity will be removed six months after its completion.
7979
8080
### Completed by column
8181

@@ -85,11 +85,11 @@ Track who closed the remediation activity with the "Completed by" column on the
8585
- **System confirmation**: The task was automatically completed (all devices remediated)
8686
- **N/A**: Information isn't available because we don't know how this older task was completed
8787

88-
:::image type="content" alt-text="Created by and completed by columns with two rows. One row for completed by has example of an email, the other row says system confirmation." source="/defender/media/defender-vulnerability-management/tvm-completed-by.png":::
88+
:::image type="content" alt-text="Created by and completed by columns with two rows. One row for completed by has example of an email. The other row says system confirmation." source="/defender/media/defender-vulnerability-management/tvm-completed-by.png":::
8989

9090
### Top remediation activities in the dashboard
9191

92-
View **Top remediation activities** in the [**Vulnerability management** dashboard](tvm-dashboard-insights.md). Select any of the entries to go to the **Remediation** page. You can mark the remediation activity as completed after the IT admin team remediates the task.
92+
In the [Microsoft Defender portal](https://security.microsoft.com), you can view **Top remediation activities** in the **Vulnerability management** dashboard. Select any of the entries to go to the **Remediation** page. You can mark the remediation activity as completed after the IT admin team remediates the task.
9393

9494
![Example of Top remediation activities card with a table that lists top activities that were generated from security recommendations.](/defender/media/defender-vulnerability-management/tvm-remediation-activities-card.png)
9595

0 commit comments

Comments
 (0)