Addressing security vulnerabilities and recommendations
Throughout this chapter, you’ve learned about MDVM features and examples of how you can use them in operations. In this section, we’ll continue to explore how MDVM gives you tools to stay on top of security recommendations and vulnerabilities, from finding out about them to resolving them.
Identifying vulnerabilities and recommendations
As MDVM converts MDE telemetry to discover vulnerabilities, you can track new vulnerabilities over time at security.microsoft.com by navigating to Endpoints | Vulnerability management | Event timeline. You can think of this as a news ticker or an RSS feed for apps in your tenant with new exploits and vulnerabilities:
Figure 17.12 – The MDVM event timeline
Optionally, you can click the Email notification settings button and follow the wizard to get email alerts about new entries.
A centralized view of security recommendations across MDE...