Skip to content

Commit d1dccfa

Browse files
committed
Update tvm-browser-extensions.md
1 parent fa3f9d7 commit d1dccfa

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-vulnerability-management/tvm-browser-extensions.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ ms.date: 02/23/2025
2626

2727
This browser extension is a small software application that adds functionality to a web browser for use with Microsoft Defender Vulnerability Management. This extension provides your security team with visibility into installed browser extensions to help ensure the safe usage of extensions in your organization.
2828

29-
The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it and if it's turned on or off on a device.
29+
The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it, and whether it's turned on or off on a device.
3030

3131
The information available helps your security team learn about the installed extensions, and use that information to make decisions on how you want to manage extensions.
3232

@@ -37,9 +37,9 @@ The information available helps your security team learn about the installed ext
3737
2. Select the **Browser extensions** tab.
3838

3939
> [!NOTE]
40-
> Browser extension assessment is only available on Windows devices. Only extensions that exist in Edge, Chrome, and Firefox, appear in browser extension list.
40+
> Browser extension assessment is only available on Windows devices. Only extensions that exist in Microsoft Edge, Chrome, and Firefox, appear in browser extension list.
4141
42-
The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number that have it turned on.
42+
The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number of devices with the extensions turned on.
4343

4444
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions.png" alt-text="Screenshot of the Browser extensions page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions.png":::
4545

@@ -51,7 +51,7 @@ Select a browser extension to open its flyout pane, where you can learn more abo
5151

5252
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_details.png" alt-text="Screenshot of the Browser extensions details pane" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_details.png":::
5353

54-
Where applicable, there will be a link available on this page to access the extension in the store it was installed from.
54+
Where applicable, there's a link available on this page to access the extension in the store it was installed from.
5555

5656
### Browser extension permissions
5757

@@ -64,7 +64,7 @@ Select the **Permissions** tab, from the browser extension flyout pane, to see i
6464
The permission risk level generated is based on the type of access the permission is requesting. You can use this information to help make an informed decision on whether you want to allow or block this extension.
6565

6666
> [!NOTE]
67-
> Risk is subjective, and it's up to each organization to determine the types of risk they are willing to take on.
67+
> Risk is subjective, and it's up to each organization to determine the types of risk they're willing to take on.
6868
6969
Select a permission to see a further flyout with more information.
7070

0 commit comments

Comments
 (0)