Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Microsoft 365 Security and Compliance for Administrators

You're reading from  Microsoft 365 Security and Compliance for Administrators

Product type Book
Published in Mar 2024
Publisher Packt
ISBN-13 9781837638376
Pages 432 pages
Edition 1st Edition
Languages
Authors (2):
Sasha Kranjac Sasha Kranjac
Profile icon Sasha Kranjac
Omar Kudović Omar Kudović
Profile icon Omar Kudović
View More author details

Table of Contents (17) Chapters

Preface 1. Part 1:Introduction to Microsoft 365
2. Chapter 1: Getting Started with Microsoft 365 Security and Compliance 3. Chapter 2: The Role of Microsoft Entra ID in Microsoft 365 Security 4. Part 2: Microsoft 365 Security
5. Chapter 3: Microsoft Defender for Office 365 6. Chapter 4: Microsoft Defender for Endpoint 7. Chapter 5: Getting Started with Microsoft Purview 8. Chapter 6: Microsoft Defender for Cloud Apps 9. Chapter 7: Microsoft Defender Vulnerability Management 10. Chapter 8: Microsoft Defender for Identity 11. Part 3: Microsoft 365 Governance and Compliance
12. Chapter 9: Microsoft Purview Insider Risk Management 13. Chapter 10: Microsoft Purview Information Protection 14. Chapter 11: Understanding the Lifecycle of Auditing and Records 15. Index 16. Other Books You May Enjoy

Inventories and weaknesses

To understand the software landscape throughout your organization’s MDVM, use the Inventories page, where you can dive deeper into browser extensions usage and the state of certificates and firmware vulnerabilities, whereas the Weaknesses page contains a list of common vulnerabilities exploits (CVEs) currently applicable to your environment. Let’s get into more detail about each of these two important MDVM pages.

Inventories

The vulnerability management Inventory page gives you an understanding of the software usage in your organization in the past 30 days. Similar to the Recommendations page, this software usage information page has the same columns, such as weaknesses, threats, vendors, and others, but here, this information is relevant to the median usage of the software rather than to the specific recommendation or a vulnerability:

Figure 7.15 – MDVM inventories page

Figure 7.15 – MDVM inventories page

On the Inventories page, besides...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}