Blog Post

Microsoft Defender Vulnerability Management Blog
4 MIN READ

Introducing event timeline – an innovative, new way to manage your security exposure

Shir_Feldman's avatar
Shir_Feldman
Icon for Microsoft rankMicrosoft
Jul 06, 2020
Effectively discovering, prioritizing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat and vulnerability management, whic...
Updated Jul 06, 2020
Version 2.0