Skip to content

Commit fd965e5

Browse files
author
Jill Grant
authored
Merge pull request #287411 from danielledennis/main
CVE Remediation update
2 parents f687412 + 6ece371 commit fd965e5

File tree

6 files changed

+60
-21
lines changed

6 files changed

+60
-21
lines changed
382 KB
Loading
93.5 KB
Loading
250 KB
Loading

articles/external-attack-surface-management/modifying-inventory-assets.md

Lines changed: 39 additions & 17 deletions
Large diffs are not rendered by default.

articles/external-attack-surface-management/understanding-asset-details.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,12 @@ The **Observation** tab displays any insights from the Attack Surface Priorities
222222

223223
For more information on observations, see [Understanding dashboards](understanding-dashboards.md). For each observation, Defender EASM provides the name of the observation, categorizes it by type, assigns a priority, and lists both CVSS v2 and v3 scores where applicable.
224224

225-
![Screenshot that shows the Observation tab.](media/Inventory-15.png)
225+
The Observations tab features two tables: Observations and Non-appliable observations. All active observations determined to be "recent" within your attack surface will be in the Observations table, whereas the Non-applicable observations table lists any observations that have either been manually marked as non-applicable or were determined by the system to no longer be applicable. To mark observations as non-applicable and therefore exclude that particular observation from dashboard counts, simply select the desired observations and click "Set as non-applicable." The observation(s) will immediately disappear from the active Observations table and will instead appear on the "Non-applicable observations" table. You can revert this change at any time by selection the relevant observation(s) from this table and selecting "Set as applicable."
226+
227+
228+
![Screenshot that shows the Observations tab with multiple CVEs selected to be marked as non-applicable.](media/cves-3.png)
229+
230+
226231

227232

228233
### Connected assets

articles/external-attack-surface-management/understanding-dashboards.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To access your Defender EASM dashboards, first navigate to your Defender EASM in
3030
![Screenshot of dashboard screen with dashboard navigation section highlighted.](media/Dashboards-1.png)
3131

3232

33-
## Downloading chart data
33+
### Downloading chart data
3434

3535
The data underlying any dashboard chart can be exported to a CSV file. This export is useful for users who wish to import Defender EASM data into third party tools, or work off a CSV file when remediating any issues. To download chart data, first select the specific chart segment that contains the data you wish to download. Chart exports currently support individual chart segments; to download multiple segments from the same chart, you need to export each individual segment.
3636

@@ -41,6 +41,18 @@ Microsoft Excel enforces a character limit of 32,767 characters per cell. Some f
4141
![Screenshot of dashboard chart drilldown view with export button visible.](media/export-1.png)
4242

4343

44+
45+
### Marking CVEs as non-applicable
46+
47+
Many Defender EASM dashboards feature CVE data, bringing your attention to potential vulnerabilities based on the web component infrastructure that powers your attack surface. For instance, CVEs are listed on the Attack Surface summary dashboard, categorized by their potential severity. Upon investigating these CVEs, you might determine that some are not relevant to your organization. This may be because you are running an unimpacted version of the web component, or your organization has different technical solutions in place to protect you from that specific vulnerability.
48+
49+
From the drilldown view of any CVE-related chart, next to the "Download CSV report" button, you now have the option to set an observation as non-applicable. Clicking this value will route you to an inventory list of all assets associated to that observation, and you can then elect to mark all observations as non-applicable from this page. For more information on marking observations as non-applicable, see [Modifying inventory assets](modifying-inventory-assets.md).
50+
51+
![Screenshot of dashboard drilldown view with "mark observation as nonapplicable" button highlighted.](media/cves-1.png)
52+
53+
54+
55+
4456
## Inventory changes
4557

4658
Your attack surface is constantly changing, which is why Defender EASM continuously analyzes and updates your inventory to ensure accuracy. Assets are frequently added and removed from inventory, so it's important to track these changes to understand your attack surface and identify key trends. The inventory changes dashboard provides an overview of these changes, displaying the "added" and "removed" counts for each asset type. You can filter the dashboard by two date ranges: either the last 7 or 30 days.
@@ -75,7 +87,7 @@ The Observations page features a list of all potential insights in the left-hand
7587

7688
![Screenshot of attack surface drilldown for medium severity priorities.](media/Dashboards-3.png)
7789

78-
This detailed view for any observation includes the title of the issue, a description, and remediation guidance from the Defender EASM team. In this example, the description explains how expired SSL certificates can lead to critical business functions becoming unavailable, preventing customers or employees from accessing web content and thus damaging your organization’s brand. The Remediation section provides advice on how to swiftly fix the issue; in this example, Microsoft recommends that you review the certificates associated with the impacted host assets, update the coinciding SSL certificate(s), and update your internal procedures to ensure that SSL certificates are updated in a timely manner.
90+
This detailed view for any observation includes the title of the issue, a description, and remediation guidance from the Defender EASM team. In this example, the description explains how expired SSL certificates can lead to critical business functions becoming unavailable, preventing customers or employees from accessing web content and thus damaging your organization’s brand. The Remediation section provides advice on how to swiftly fix the issue; in this example, Microsoft recommends that you review the certificates associated with the impacted host assets, update the coinciding SSL certificates, and update your internal procedures to ensure that SSL certificates are updated in a timely manner.
7991

8092
Finally, the Asset section lists any entities that have been impacted by this specific security concern. In this example, a user wants to investigate the impacted assets to learn more about the expired SSL Certificate. You can click on any asset name from this list to view the Asset Details page.
8193

@@ -101,7 +113,7 @@ For instance, your organization may decide to migrate all cloud infrastructure t
101113

102114
### Sensitive services
103115

104-
This section displays sensitive services detected on your Attack Surface that should be assessed and potentially adjusted to ensure the security of your organization. This chart highlights any services that have historically been vulnerable to attack or are common vectors of information leakage to malicious actors. Any assets in this section should be investigated, and Microsoft recommends that organizations consider alternative services with a better security posture to mitigate risk.
116+
This section displays sensitive services detected on your Attack Surface that should be assessed and potentially adjusted to ensure the security of your organization. This chart highlights any services that are historically vulnerable to attack or are common vectors of information leakage to malicious actors. Any assets in this section should be investigated, and Microsoft recommends that organizations consider alternative services with a better security posture to mitigate risk.
105117

106118
![Screenshot of sensitive services chart.](media/Dashboards-7.png)
107119

0 commit comments

Comments
 (0)