You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/atp-manage-vulnerabilities.md
+15-11Lines changed: 15 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
# required metadata
3
3
4
4
title: Use Intune to remediate vulnerabilities found by Microsoft Defender for Endpoint
5
-
description: See how to manage security tasks from and Threat & vulnerability Management, part of Microsoft Defender for Endpoint from within the Intune console.
5
+
description: See how to manage security tasks from and Threat & vulnerability Management, part of Microsoft Defender for Endpoint from within the Intune console.
6
6
keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 05/01/2021
10
+
ms.date: 11/30/2021
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -35,12 +35,12 @@ When you integrate Intune with Microsoft Defender for Endpoint, you can take adv
35
35
36
36
## How integration works
37
37
38
-
After you connect Intune to Microsoft Defender for Endpoint, Defender for Endpoint receives threat and vulnerability details from managed devices.
38
+
After you connect Intune to Microsoft Defender for Endpoint, Defender for Endpoint receives threat and vulnerability details from managed devices.
39
39
40
-
- Vulnerabilities that are discovered are not based on configurations from Intune. They are based on Microsoft Defender for Endpoint configurations and scan details.
41
-
-Only issues that can be remediated by Intune are raised as security tasks for Intune.
40
+
- Vulnerabilities that are discovered aren't based on configurations from Intune. They're based on Microsoft Defender for Endpoint configurations and scan details.
41
+
-Not all issues that Defender for Endpoint flags for remediation support remediation through the creation of a security task for Intune.
42
42
43
-
In the Microsoft Defender Security Center console, Defender for Endpoint security admins review data about endpoint vulnerabilities. The admins then use a single-click to create security tasks that flag the vulnerable devices for remediation. The security tasks are immediately passed to the Intune console where Intune admins can view them. The security task identifies the type of vulnerability, priority, status, and the steps to take to remediate the vulnerability. The Intune admin chooses to accept or reject the task.
43
+
In the Microsoft Defender Security Center console, Defender for Endpoint security admins review data about endpoint vulnerabilities. The admins then use a few clicks to create security tasks that flag the vulnerable devices for remediation. The security tasks are immediately passed to the Microsoft Endpoint Manager admin center where Intune admins can view them. The security task identifies the type of vulnerability, priority, status, and the steps to take to remediate the vulnerability. The Intune admin chooses to accept or reject the task.
44
44
45
45
When a task is accepted, the Intune admin then acts to remediate the vulnerability through Intune, using the guidance provided as part of the security task.
46
46
@@ -76,7 +76,7 @@ Following is an example workflow for an application. This same general workflow
76
76
77
77
Because the media player in this example isn't a managed app, Intune can only provide text instructions. If the app was managed, Intune could provide instructions to download an updated version, and provide a link to open the deployment for the app so that the updated files can be added to the deployment.
78
78
79
-
- After completing the remediation, the Intune admin opens the security task and selects **Complete Task**. The remediation status is updated for Intune and in Defender for Endpoint, where security admins confirm the revised status for the vulnerability.
79
+
- After completing the remediation, the Intune admin opens the security task and selects **Complete Task**. The remediation status is updated for Intune and in Defender for Endpoint, where security admins confirm the revised status for the vulnerability.
80
80
81
81
## Prerequisites
82
82
@@ -87,18 +87,22 @@ Following is an example workflow for an application. This same general workflow
87
87
88
88
**Intune configurations for Defender for Endpoint**:
89
89
90
-
- Configure a service to service connection with Microsoft Defender for Endpoint.
90
+
- Configure a service-to-service connection with Microsoft Defender for Endpoint.
91
91
- Deploy a device configuration policy with a profile type of **Microsoft Defender for Endpoint (desktop devices running Windows 10 or later)** to devices that will have risk assessed by Defender for Endpoint.
92
92
93
93
For information about how to set up Intune to work with Defender for Endpoint, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](advanced-threat-protection-configure.md#enable-microsoft-defender-for-endpoint-in-intune).
94
94
95
95
## Work with security tasks
96
96
97
+
Before you can work with security tasks, they must be created from within the Defender Security Center. For information on using the Microsoft Defender Security Center to create security tasks, see [Remediate vulnerabilities with threat and vulnerability management](/microsoft-365/security/defender-endpoint/tvm-remediation?view=o365-worldwide#request-remediation) in the Defender for Endpoint documentation.
98
+
99
+
To manage security tasks:
100
+
97
101
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
3. Select a task from the list to open a resource window that displays additional details for that security task.
105
+
3. Select a task from the list to open a resource window that displays more details for that security task.
102
106
103
107
While viewing the security task resource window, you can select additional links:
104
108
@@ -113,9 +117,9 @@ Following is an example workflow for an application. This same general workflow
113
117
114
118
When it's possible to do so, the remediation instructions include links that open the relevant configuration objects in the Intune console.
115
119
116
-
6. After completing the remediation steps, open the security task and select **Complete Task**. This action updates the security task status in both Intune and Defender for Endpoint.
120
+
6. After completing the remediation steps, open the security task and select **Complete Task**. This action updates the security task status in both Intune and Defender for Endpoint.
117
121
118
-
After remediation is successful, the risk exposure score in Microsoft Defender for Endpoint can drop, based on new information from the remediated devices.
122
+
After remediation is successful, the risk exposure score in Defender for Endpoint can drop, based on new information from the remediated devices.
0 commit comments