Home
%3CLINGO-SUB%20id%3D%22lingo-sub-466511%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-466511%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20checking%20out%20the%20new%20Threat%20%26amp%3B%20Vulnerability%20Management%20Security%20Recommendations%20dashboard%20and%20noticing%20that%20the%20detection%20of%20many%20registry%20keys%20relating%20to%20Internet%20Explorer%20features%20is%20broken.%20I%20have%20several%20of%20the%20keys%20configured%20properly%20across%20our%20environment%20in%20accordance%20with%20the%20Remediation%20Options%20tab%2C%20but%20they're%20not%20detected%20successfully.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIncorrect%20detections%20include%20(but%20may%20not%20be%20limited%20to)%3A%3CBR%20%2F%3E*%20Enable%20'Information%20Bar'%3CBR%20%2F%3E*%20Enable%20'Restrict%20File%20Download'%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAre%20others%20seeing%20this%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-469170%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-469170%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20software%20inventory%20isn't%20correctly%20detecting%20all%20installed%20software.%20It%20shows%20multiple%20instances%20of%20some%20programs%2C%20while%20showing%20no%20instances%20of%20others.%20Some%20machines%20it%20shows%20up%20properly%20and%20some%20it%20doesn't.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-475077%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-475077%22%20slang%3D%22en-US%22%3E%3CP%3EI%20know%20it's%20new%2C%20but%20I%20am%20really%20digging%20the%20Vulnerability%20page.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-481021%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-481021%22%20slang%3D%22en-US%22%3E%3CP%3EAwesome%20addition%20guys%2C%20amazing%20work.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-481085%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-481085%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%3EIs%20this%20new%20feature%20also%20available%20in%20Windows%20Server%202019%3F%20If%20not%2C%20will%20this%20come%20%3F%3C%2FFONT%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CFONT%3EThanks%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-482324%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482324%22%20slang%3D%22en-US%22%3E%3CP%3EIt%20would%20be%20nice%20to%20know%20what%20the%20security%20recommendations%20are%20based%20on.%26nbsp%3B%20I%20have%2011%20machines%20that%20have%20the%20recommendation%20%22%3CSPAN%3EUpdate%207-zip%20to%20version%2019.0.0.0%22%20but%20as%20far%20as%20I%20can%20tell%2C%20they%20have%20all%20been%20upgraded.%26nbsp%3B%20Is%20it%20checking%20registry%20keys%2C%20file%20versions%20in%20specific%20directories%2C%20something%20else%3F%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-507031%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-507031%22%20slang%3D%22en-US%22%3E%3CP%3EInterested%20to%20know%20if%20this%20functionality%20will%20be%20back%20ported%20into%20previous%20versions%20of%20Windows%20Server%3F%20We're%20looking%20at%20the%20PowerBI%20Dashboards%20as%20a%20part%20of%20our%20patching%20process%20and%20can%20only%20see%20Windows%2010%20devices%20showing%20as%20missing%20security%20patches.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-504808%22%20slang%3D%22en-US%22%3ERE%3A%20MDATP%20Threat%20%26amp%3Bamp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-504808%22%20slang%3D%22en-US%22%3Egreat%20addition%2C%20please%20use%20the%20'frown%20face'%20on%20the%20top%20right%20corner%20of%20the%20portal%20to%20file%20your%20suggestion%20directly%20with%20our%20engineering%20team%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-540500%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-540500%22%20slang%3D%22en-US%22%3E%3CP%3EYes%2C%20the%20new%20TVM%20functionality%20is%20planned%20to%20be%20backported%20to%20previous%20Windows%20Server%20versions%20in%20the%20upcoming%20months.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-565016%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-565016%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20TVM%20able%20to%20account%20for%20supercedence%20updates%3F%20We%20see%20a%20lot%20of%20discovered%20vulnerabilities%20that%20have%20been%20patched%20in%20SCCM.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-623251%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-623251%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20this%20still%20rolling%20out%3F%3CBR%20%2F%3EWe%20have%20enabled%20preview%20features%20a%20while%20ago%2C%20but%20stil%20don%60t%20see%20thes%20options.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-628916%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-628916%22%20slang%3D%22en-US%22%3E%3CP%3EI%20got%20it%20since%20last%20Thursday.%20Nice%20feature%20guys!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-634080%22%20slang%3D%22en-US%22%3ERE%3A%20MDATP%20Threat%20%26amp%3Bamp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-634080%22%20slang%3D%22en-US%22%3ECool%20and%20I%20have%20this%20tool%2C%20does%20it%20comes%20tech%20support%20as%20does%20O365.%20I%20have%20this%20tool%20with%20my%20M365%20E5.%20Or%20is%20tech%20support%20a%20fee%20base%20for%20this%20product%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-634455%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-634455%22%20slang%3D%22en-US%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F157733%22%20target%3D%22_blank%22%3E%40Jerry%20Gonzalez%3C%2FA%3E%20Support%20is%20included%20in%20your%20M365%20E5%20subscription%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-637787%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-637787%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%2C%20but%20how%20do%20I%20get%20the%20support.%20I%20have%20call%20O365%20and%20they%20stated%20they%20don't%20support.%26nbsp%3B%20Try%20to%20open%20a%20ticket%20and%20get%20these%2C%20which%20I%20don't%20have%20that%20information%20and%20not%20sure%20if%20I%20need%20this.%20Since%20I%20am%20paying%20for%20the%20M365%20E5%20that%20covers%20everything.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F115810i052B76F76A4C65AE%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Contract%20option.jpg%22%20title%3D%22Contract%20option.jpg%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F115811iA19F5BCFB077BEC9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Subscription%20option.jpg%22%20title%3D%22Subscription%20option.jpg%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F115812i5C55445F1E275AC6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Support%20Request.jpg%22%20title%3D%22Support%20Request.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-638176%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-638176%22%20slang%3D%22en-US%22%3EI'm%20sorry%20to%20say%20I%20get%20the%20same%20on%20that%20page.%20I%20received%20free%20support%20a%20few%20months%20back%2C%20but%20as%20I%20recall%2C%20this%20ticket%20was%20created%20via%20the%20Azure%20portal.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-460977%22%20slang%3D%22en-US%22%3EMDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-460977%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThreat%20%26amp%3B%20Vulnerability%20Management%20is%20a%20new%20Microsoft%20Defender%20ATP%20component%20that%20helps%20effectively%20identify%2C%20assess%2C%20and%20remediate%20endpoint%20weaknesses.%20%26nbsp%3BThreat%20%26amp%3B%20Vulnerability%20Management%20provides%20both%20security%20administrators%20and%20security%20operations%20teams%20with%20unique%20value%2C%20including%3A%3C%2FP%3EReal-time%20endpoint%20detection%20and%20response%20(EDR)%20insights%20correlated%20with%20endpoint%20vulnerabilities%20Invaluable%20machine%20vulnerability%20context%20during%20incident%20investigations%20Built-in%20remediation%20processes%20through%20Microsoft%20Intune%20and%20Microsoft%20System%20Center%20Configuration%20Manager%3CP%3ENote%3A%20Microsoft%20Intune%20and%20Microsoft%20System%20Center%20Configuration%20Manager%20(SCCM)%20integration%20will%20roll-in%20next%20month.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EToday%2C%20we%20are%20excited%20to%20announce%20that%20the%20new%20Threat%20%26amp%3B%20Vulnerability%20Management%20(TVM)%20is%20now%20available%20for%20public%20preview%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fsecuritycenter.windows.com%2Ftvm_dashboard%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20ATP%20portal%3C%2FA%3E.%20We%20are%20bringing%20a%20game%20changing%20risk-based%20approach%20to%20the%20discovery%2C%20prioritization%2C%20and%20remediation%20of%20endpoint%20vulnerabilities%20and%20misconfigurations.%20See%20our%20announcement%20blog%20for%20details.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThreat%20%26amp%3B%20Vulnerability%20Management%20is%20the%20latest%20innovation%20in%20Microsoft%20Defender%20ATP%2C%20which%20continues%20to%20evolve%20to%20provide%20customers%20with%20powerful%2C%20real-time%2C%20and%20integrated%20means%20to%20discover%2C%20prioritize%2C%20and%20remediate%20threats.%20Customers%20who%20have%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-atp%2Fpreview-windows-defender-advanced-threat-protection%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eturned%20on%20Microsoft%20Defender%20ATP%20preview%20features%3C%2FA%3E%20will%20see%20this%20game-changing%20capability%20in%20their%20dashboard.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAdditional%20TVM%20capabilities%20will%20continue%20rolling%20out%20throughout%20the%20upcoming%20months%20%E2%80%93%20Stay%20tuned!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFor%20information%20on%20getting%20started%20with%20Microsoft%20Defender%20ATP%20TVM%20see%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmdatp-tvm%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Faka.ms%2Fmdatp-tvm%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3EFigure%201%3A%20Screenshot%20of%20the%20Threat%20%26amp%3B%20Vulnerability%20Management%20dashboard%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20Microsoft%20Defender%20ATP%2C%20Threat%20%26amp%3B%20Vulnerability%20Management%20team%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-460977%22%20slang%3D%22en-US%22%3E%3CP%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-850271%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-850271%22%20slang%3D%22en-US%22%3E%3CP%3EIt%20looks%20like%20window%20server%202019%20is%20the%20only%20OS%20supported.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWill%20this%20be%20expanded%20to%20included%20server%202016%20as%20this%20is%20still%20going%20to%20be%20around%20for%20around%205%2B%20years%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-851226%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-851226%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20a%20roadmap%20for%20new%20features%20of%20MDATP%26nbsp%3B(like%20for%20o365)%20available%20so%20one%20can%20follow%20when%20the%20support%20for%20server%202016%2F12R2%20is%20planned%20to%20be%20available%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-991414%22%20slang%3D%22en-US%22%3ERe%3A%20MDATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20publicly%20available!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-991414%22%20slang%3D%22en-US%22%3E%3CP%3EAt%20Ignite%2C%20Microsoft%20said%20that%20Exposure%20level%20data%20will%20be%20available%20for%20server%202012%20and%20up%20in%20about%202%20months.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

 

Threat & Vulnerability Management is a new Microsoft Defender ATP component that helps effectively identify, assess, and remediate endpoint weaknesses.  Threat & Vulnerability Management provides both security administrators and security operations teams with unique value, including:

  • Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities
  • Invaluable machine vulnerability context during incident investigations
  • Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager

Note: Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) integration will roll-in next month.

 

Today, we are excited to announce that the new Threat & Vulnerability Management (TVM) is now available for public preview in the Microsoft Defender ATP portal. We are bringing a game changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. See our announcement blog for details.

 

Threat & Vulnerability Management is the latest innovation in Microsoft Defender ATP, which continues to evolve to provide customers with powerful, real-time, and integrated means to discover, prioritize, and remediate threats. Customers who have turned on Microsoft Defender ATP preview features will see this game-changing capability in their dashboard.

 

Additional TVM capabilities will continue rolling out throughout the upcoming months – Stay tuned!

 

For information on getting started with Microsoft Defender ATP TVM see https://aka.ms/mdatp-tvm.

 

Screenshot_1.png

Figure 1: Screenshot of the Threat & Vulnerability Management dashboard

 

 

The Microsoft Defender ATP, Threat & Vulnerability Management team

 

19 Comments
Contributor

I'm checking out the new Threat & Vulnerability Management Security Recommendations dashboard and noticing that the detection of many registry keys relating to Internet Explorer features is broken. I have several of the keys configured properly across our environment in accordance with the Remediation Options tab, but they're not detected successfully.

 

Incorrect detections include (but may not be limited to):
* Enable 'Information Bar'
* Enable 'Restrict File Download'

 

Are others seeing this?

Frequent Visitor

The software inventory isn't correctly detecting all installed software. It shows multiple instances of some programs, while showing no instances of others. Some machines it shows up properly and some it doesn't.

Senior Member

I know it's new, but I am really digging the Vulnerability page. 

Regular Visitor

Awesome addition guys, amazing work. 

Occasional Visitor

Is this new feature also available in Windows Server 2019? If not, will this come ?

 

Thanks

Contributor

It would be nice to know what the security recommendations are based on.  I have 11 machines that have the recommendation "Update 7-zip to version 19.0.0.0" but as far as I can tell, they have all been upgraded.  Is it checking registry keys, file versions in specific directories, something else?

Microsoft
great addition, please use the 'frown face' on the top right corner of the portal to file your suggestion directly with our engineering team
Occasional Contributor

Interested to know if this functionality will be back ported into previous versions of Windows Server? We're looking at the PowerBI Dashboards as a part of our patching process and can only see Windows 10 devices showing as missing security patches. 

Microsoft

Yes, the new TVM functionality is planned to be backported to previous Windows Server versions in the upcoming months.

Occasional Visitor

Is TVM able to account for supercedence updates? We see a lot of discovered vulnerabilities that have been patched in SCCM.

Regular Contributor

Is this still rolling out?
We have enabled preview features a while ago, but stil don`t see thes options.

Occasional Contributor

I got it since last Thursday. Nice feature guys!

Contributor
Cool and I have this tool, does it comes tech support as does O365. I have this tool with my M365 E5. Or is tech support a fee base for this product?
Occasional Contributor
@Jerry Gonzalez Support is included in your M365 E5 subscription
Contributor

Thanks, but how do I get the support. I have call O365 and they stated they don't support.  Try to open a ticket and get these, which I don't have that information and not sure if I need this. Since I am paying for the M365 E5 that covers everything.Contract option.jpgSubscription option.jpgSupport Request.jpg

Occasional Contributor
I'm sorry to say I get the same on that page. I received free support a few months back, but as I recall, this ticket was created via the Azure portal.
Occasional Contributor

It looks like window server 2019 is the only OS supported. 

 

Will this be expanded to included server 2016 as this is still going to be around for around 5+ years?

Established Member

Is there a roadmap for new features of MDATP (like for o365) available so one can follow when the support for server 2016/12R2 is planned to be available?

Established Member

At Ignite, Microsoft said that Exposure level data will be available for server 2012 and up in about 2 months.