You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/atp-manage-vulnerabilities.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,12 +35,12 @@ When you integrate Intune with Microsoft Defender for Endpoint, you can take adv
35
35
36
36
## How integration works
37
37
38
-
After you connect Intune to Microsoft Defender for Endpoint, Defender for Endpoint receives threat and vulnerability details from managed devices.
38
+
After you connect Intune to Microsoft Defender for Endpoint, Defender for Endpoint receives threat and vulnerability details from managed devices.
39
39
40
-
- Vulnerabilities that are discovered are not based on configurations from Intune. They are based on Microsoft Defender for Endpoint configurations and scan details.
41
-
-Only issues that can be remediated by Intune are raised as security tasks for Intune.
40
+
- Vulnerabilities that are discovered aren't based on configurations from Intune. They're based on Microsoft Defender for Endpoint configurations and scan details.
41
+
-Not all issues that Defender for Endpoint flags for remediation support remediation through the creation of a security task for Intune.
42
42
43
-
In the Microsoft Defender Security Center console, Defender for Endpoint security admins review data about endpoint vulnerabilities. The admins then use a a few clicks to create security tasks that flag the vulnerable devices for remediation. The security tasks are immediately passed to the Microsoft Endpoint Manager admin center where Intune admins can view them. The security task identifies the type of vulnerability, priority, status, and the steps to take to remediate the vulnerability. The Intune admin chooses to accept or reject the task.
43
+
In the Microsoft Defender Security Center console, Defender for Endpoint security admins review data about endpoint vulnerabilities. The admins then use a few clicks to create security tasks that flag the vulnerable devices for remediation. The security tasks are immediately passed to the Microsoft Endpoint Manager admin center where Intune admins can view them. The security task identifies the type of vulnerability, priority, status, and the steps to take to remediate the vulnerability. The Intune admin chooses to accept or reject the task.
44
44
45
45
When a task is accepted, the Intune admin then acts to remediate the vulnerability through Intune, using the guidance provided as part of the security task.
46
46
@@ -87,7 +87,7 @@ Following is an example workflow for an application. This same general workflow
87
87
88
88
**Intune configurations for Defender for Endpoint**:
89
89
90
-
- Configure a service to service connection with Microsoft Defender for Endpoint.
90
+
- Configure a service-to-service connection with Microsoft Defender for Endpoint.
91
91
- Deploy a device configuration policy with a profile type of **Microsoft Defender for Endpoint (desktop devices running Windows 10 or later)** to devices that will have risk assessed by Defender for Endpoint.
92
92
93
93
For information about how to set up Intune to work with Defender for Endpoint, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](advanced-threat-protection-configure.md#enable-microsoft-defender-for-endpoint-in-intune).
3. Select a task from the list to open a resource window that displays additional details for that security task.
105
+
3. Select a task from the list to open a resource window that displays more details for that security task.
106
106
107
107
While viewing the security task resource window, you can select additional links:
108
108
@@ -119,7 +119,7 @@ To manage security tasks:
119
119
120
120
6. After completing the remediation steps, open the security task and select **Complete Task**. This action updates the security task status in both Intune and Defender for Endpoint.
121
121
122
-
After remediation is successful, the risk exposure score in Microsoft Defender for Endpoint can drop, based on new information from the remediated devices.
122
+
After remediation is successful, the risk exposure score in Defender for Endpoint can drop, based on new information from the remediated devices.
0 commit comments