Skip to content

Commit e7adbac

Browse files
committed
Update tvm-security-recommendation.md
1 parent 0cdab94 commit e7adbac

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

defender-vulnerability-management/tvm-security-recommendation.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,16 +59,16 @@ As a Security Administrator, you can take a look at the [vulnerability managemen
5959

6060
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/top-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/top-security-recommendations.png":::
6161

62-
The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation will take you to the security recommendations page with more details.
62+
The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation takes you to the security recommendations page with more details.
6363

6464
## Security recommendations overview
6565

66-
View recommendations, the number of weaknesses found, related components, threat insights, number of exposed devices, status, remediation type, remediation activities, impact to your exposure score and Secure Score for Devices once the recommendation is implemented, and associated tags.
66+
Security recommendations enable you to view your organization's security recommendations, the number of weaknesses found, related components, threat insights, number of exposed devices, device status, remediation type, remediation activities, and associated tags. You can also see how your exposure score and Secure Score for devices would change when recommendations are implemented.
6767

6868
The color of the **Exposed devices** graph changes as the trend changes. If the number of exposed devices is on the rise, the color changes to red. If there's a decrease in the number of exposed devices, the color of the graph will change to green.
6969

7070
> [!NOTE]
71-
> Vulnerability management shows devices that were in use up to **30 days** ago. This is different from the rest of Microsoft Defender for Endpoint, where if a device has not been in use for more than 7 days it has in an 'Inactive' status.
71+
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than sevan days.
7272
7373
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png":::
7474

@@ -110,14 +110,17 @@ From the flyout, you can choose any of the following options:
110110
If there is a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
111111

112112
1. Select the recommendation and **Open software page**
113+
113114
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md)
115+
114116
3. Decide how to address the increase or your organization's exposure, such as submitting a remediation request
115117

116118
### Recommendations on devices
117119

118120
To see the list of security recommendations that apply to a device you can:
119121

120122
1. Select the device from the **Exposed devices** tab in the recommendation flyout panel or select the device directly from the **Device inventory** page.
123+
121124
2. Select the **Security recommendations** tab to see a list of security recommendations for this device.
122125

123126
:::image type="content" source="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png":::

0 commit comments

Comments
 (0)