You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-security-recommendation.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- Tier1
13
13
ms.topic: conceptual
14
14
search.appverid: met150
15
-
ms.date: 03/04/2022
15
+
ms.date: 02/19/2025
16
16
---
17
17
18
18
# Security recommendations
@@ -55,20 +55,20 @@ Go to the **Vulnerability management** navigation menu and select **Recommendati
55
55
56
56
### Top security recommendations in the vulnerability management dashboard
57
57
58
-
In a given day as a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
58
+
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
59
59
60
60
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/top-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/top-security-recommendations.png":::
61
61
62
-
The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation will take you to the security recommendations page with more details.
62
+
The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation takes you to the security recommendations page with more details.
63
63
64
64
## Security recommendations overview
65
65
66
-
View recommendations, the number of weaknesses found, related components, threat insights, number of exposed devices, status, remediation type, remediation activities, impact to your exposure score and Secure Score for Devices once the recommendation is implemented, and associated tags.
66
+
Security recommendations enable you to view your organization's security recommendations, the number of weaknesses found, related components, threat insights, number of exposed devices, device status, remediation type, remediation activities, and associated tags. You can also see how your exposure score and Secure Score for devices would change when recommendations are implemented.
67
67
68
68
The color of the **Exposed devices** graph changes as the trend changes. If the number of exposed devices is on the rise, the color changes to red. If there's a decrease in the number of exposed devices, the color of the graph will change to green.
69
69
70
70
> [!NOTE]
71
-
> Vulnerability management shows devices that were in use up to **30 days** ago. This is different from the rest of Microsoft Defender for Endpoint, where if a device has not been in use for more than 7 days it has in an 'Inactive' status.
71
+
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than seven days.
72
72
73
73
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png":::
74
74
@@ -110,14 +110,17 @@ From the flyout, you can choose any of the following options:
110
110
If there is a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
111
111
112
112
1. Select the recommendation and **Open software page**
113
+
113
114
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md)
115
+
114
116
3. Decide how to address the increase or your organization's exposure, such as submitting a remediation request
115
117
116
118
### Recommendations on devices
117
119
118
120
To see the list of security recommendations that apply to a device you can:
119
121
120
122
1. Select the device from the **Exposed devices** tab in the recommendation flyout panel or select the device directly from the **Device inventory** page.
123
+
121
124
2. Select the **Security recommendations** tab to see a list of security recommendations for this device.
122
125
123
126
:::image type="content" source="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png":::
@@ -145,7 +148,7 @@ When an exception is created for a recommendation, the recommendation is no long
145
148
146
149
Select a security recommendation you would like to create an exception for, and then select **Exception options**.
147
150
148
-

151
+

149
152
150
153
Fill out the form and submit. To view all your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Threat & Vulnerability Management** menu and select the **Exceptions** tab. [Learn more about how to create an exception](tvm-exception.md#create-an-exception)
0 commit comments