Skip to content

Commit d1be2e5

Browse files
committed
Update tvm-software-inventory.md
1 parent af2753f commit d1be2e5

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-vulnerability-management/tvm-software-inventory.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Here's how to tell whether software isn't supported:
7979

8080
4. Select a specific software entry to open the flyout with more information.
8181

82-
Software might be visible at the device level, even if it's currently not supported by vulnerability management. However, only limited data will be available. You'll know if software is unsupported because it has `Not available` listed in the **Weakness** column. Software with no CPE can also show up under this device-specific software inventory.
82+
Software might be visible at the device level, even if it's currently not supported by vulnerability management. However, only limited data is available. You know if software is unsupported because it has `Not available` listed in the **Weakness** column. Software with no CPE can also show up under this device-specific software inventory.
8383

8484
### Software evidence
8585

@@ -97,7 +97,7 @@ You can view software pages a few different ways:
9797
- [Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
9898
- [Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the section called "Related component" in the flyout
9999

100-
A full page will appear with all the details of a specific software and the following information:
100+
A full page appears with all the details of a specific software and the following information:
101101

102102
- Side panel with vendor information, prevalence of the software in the organization (including number of devices it's installed on, and exposed devices that aren't patched), whether and exploit is available, and impact to exposure score.
103103
- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs with the number of exposed devices.
@@ -118,18 +118,18 @@ Report an inaccuracy when you see vulnerability information and assessment resul
118118
3. From the flyout pane, choose an issue to report from:
119119

120120
- a software detail is wrong
121-
- the software is not installed on any device in my org
121+
- the software isn't installed on any device in my org
122122
- the number of installed or exposed devices is wrong
123123

124-
4. Fill in the requested details about the inaccuracy. This will vary depending on the issue you're reporting.
124+
4. Fill in the requested details about the inaccuracy.
125125

126126
![Report inaccuracy](/defender/media/defender-vulnerability-management/report-inaccuracy-software.png)
127127

128128
5. Select **Submit**. Your feedback is immediately sent to the vulnerability management experts.
129129

130130
### Software inventory APIs
131131

132-
You can use APIs to view information on the software installed in your organization. The information returned by the APIs includes the devices it's installed on, software name, software vendor, installed versions, and number of weaknesses. For more information, see:
132+
You can use APIs to view information on the software installed in your organization. The information returned by the APIs includes the devices it's installed on, software name, software publisher, installed versions, and number of weaknesses. For more information, see:
133133

134134
- [Export software inventory assessment per device](/defender-endpoint/api/get-assessment-software-inventory)
135135
- [Export software vulnerabilities assessment per device](/defender-endpoint/api/get-assessment-software-vulnerabilities)

0 commit comments

Comments
 (0)