You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-software-inventory.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ Here's how to tell whether software isn't supported:
79
79
80
80
4. Select a specific software entry to open the flyout with more information.
81
81
82
-
Software might be visible at the device level, even if it's currently not supported by vulnerability management. However, only limited data will be available. You'll know if software is unsupported because it has `Not available` listed in the **Weakness** column. Software with no CPE can also show up under this device-specific software inventory.
82
+
Software might be visible at the device level, even if it's currently not supported by vulnerability management. However, only limited data is available. You know if software is unsupported because it has `Not available` listed in the **Weakness** column. Software with no CPE can also show up under this device-specific software inventory.
83
83
84
84
### Software evidence
85
85
@@ -97,7 +97,7 @@ You can view software pages a few different ways:
97
97
-[Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
98
98
-[Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the section called "Related component" in the flyout
99
99
100
-
A full page will appear with all the details of a specific software and the following information:
100
+
A full page appears with all the details of a specific software and the following information:
101
101
102
102
- Side panel with vendor information, prevalence of the software in the organization (including number of devices it's installed on, and exposed devices that aren't patched), whether and exploit is available, and impact to exposure score.
103
103
- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs with the number of exposed devices.
@@ -118,18 +118,18 @@ Report an inaccuracy when you see vulnerability information and assessment resul
118
118
3. From the flyout pane, choose an issue to report from:
119
119
120
120
- a software detail is wrong
121
-
- the software is not installed on any device in my org
121
+
- the software isn't installed on any device in my org
122
122
- the number of installed or exposed devices is wrong
123
123
124
-
4. Fill in the requested details about the inaccuracy. This will vary depending on the issue you're reporting.
124
+
4. Fill in the requested details about the inaccuracy.
5. Select **Submit**. Your feedback is immediately sent to the vulnerability management experts.
129
129
130
130
### Software inventory APIs
131
131
132
-
You can use APIs to view information on the software installed in your organization. The information returned by the APIs includes the devices it's installed on, software name, software vendor, installed versions, and number of weaknesses. For more information, see:
132
+
You can use APIs to view information on the software installed in your organization. The information returned by the APIs includes the devices it's installed on, software name, software publisher, installed versions, and number of weaknesses. For more information, see:
133
133
134
134
-[Export software inventory assessment per device](/defender-endpoint/api/get-assessment-software-inventory)
135
135
-[Export software vulnerabilities assessment per device](/defender-endpoint/api/get-assessment-software-vulnerabilities)
0 commit comments