Skip to content

Commit 344acdd

Browse files
Merge pull request #3607 from MicrosoftDocs/mdvm-software
MDVM software inventory -- software version normalization
2 parents 6a60bba + 569bb2a commit 344acdd

File tree

1 file changed

+35
-29
lines changed

1 file changed

+35
-29
lines changed

defender-vulnerability-management/tvm-software-inventory.md

Lines changed: 35 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: concept-article
1414
search.appverid: met150
15-
ms.date: 03/05/2025
15+
ms.date: 04/29/2025
1616
#customer intent: To learn about the software inventory page in Microsoft Defender for Endpoint's Vulnerability Management.
1717
---
1818

@@ -36,20 +36,18 @@ You can remove the **CPE Available** filter to gain further visibility and incre
3636

3737
In the field of discovery, we're using the same set of signals that is responsible for detection and vulnerability assessment in [Microsoft Defender for Endpoint detection and response capabilities](/defender-endpoint/overview-endpoint-detection-response).
3838

39-
Since it's real time, in a matter of minutes, you see vulnerability information as they get discovered. The engine automatically grabs information from multiple security feeds. In fact, you see if a particular software is connected to a live threat campaign. It also provides a link to a Threat Analytics report soon as it's available.
39+
Since it's real time, in a matter of minutes, you see vulnerability information as it's discovered. The engine automatically grabs information from multiple security feeds. In fact, you see if a particular software is connected to a live threat campaign. It also provides a link to a Threat Analytics report soon as it's available.
4040

4141
## Navigate to the Software inventory page
4242

43-
Access the software inventory page by signing in to the [Microsoft Defender portal](https://security.microsoft.com) and navigating to **Endpoints** > **Vulnerability management** > **Inventories**, which opens to the **Software** tab.
43+
In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, go to **Endpoints** > **Vulnerability management** > **Inventories**, and then select the **Software** tab.
4444

4545
> [!NOTE]
46-
> If you search for software using the the Microsoft Defender portal global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write `windows_10` or `windows_11` instead of `Windows 10` or `Windows 11`.
46+
> If you search for software using the Microsoft Defender portal global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write `windows_10` or `windows_11` instead of `Windows 10` or `Windows 11`.
4747
4848
## Software inventory overview
4949

50-
The **Software inventory** page opens with a list of software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags.
51-
52-
The data is updated every three to four hours. There's currently no way to force a sync.
50+
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
5351

5452
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
5553

@@ -74,7 +72,7 @@ Here's how to tell whether software isn't supported:
7472

7573
## Software inventory on devices
7674

77-
1. Sign in to the Microsoft Defender portal. Navigate to **Assets** > **Devices** to open the **Device inventory** page.
75+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Assets** > **Devices** to open the **Device inventory** page.
7876

7977
2. Select the name of a device to open its device page.
8078

@@ -86,45 +84,53 @@ Software might be visible at the device level, even if it's currently not suppor
8684

8785
### Software evidence
8886

89-
See evidence of where we detected a specific software on a device from the registry, disk, or both. You can find it on any device in the device software inventory.
87+
See evidence of where specific software was detected a device in the registry, on the disk, or both. You can find this information on any device in the device software inventory.
9088

91-
Select a software name to open the flyout, and look for the section called **Software Evidence**.
89+
Select a software name to open its flyout, and look for the section called **Software Evidence**.
9290

9391
:::image type="content" alt-text="Software evidence example of Microsoft Edge showing evidence registry path as seen on a device page" source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence.png":::
9492

9593
## Software pages
9694

97-
You can view software pages a few different ways:
95+
You can view software pages in the [Microsoft Defender portal](https://security.microosft.com) a few different ways:
9896

99-
- **Endpoints** > **Vulnerability management** > **Inventories** > Select a software name > Select **Open software page** in the flyout
100-
- [Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
101-
- [Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the **Related component** section in the flyout
97+
- Go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab. Select a software name, and then, in the flyout, select **Open software page**.
98+
- Go to **Endpoints** > **Vulnerability management** > **Recommendations**. Select a recommendation, and in the flyout, select **Open software page**. (See [Security recommendations page](tvm-security-recommendation.md).)
99+
- Go to **Endpoints** > **Vulnerability management** > **Event timeline**. Select an event, and then, in the **Related components** section, select the link for the software name. (See [Event timeline page](threat-and-vuln-mgt-event-timeline.md).)
102100

103-
A full page appears with all the details of a specific software and the following information:
101+
The software page provides details about specific software with the following information:
104102

105103
- Overview with vendor information, exploits available, and impact rating
106104
- Data visualizations showing the number of and severity of discovered weaknesses, exposed devices, software's usage in the past 30 days, and the top events in the last seven days.
107-
- Tabs showing information such as:
108-
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
109-
- Named CVEs of discovered vulnerabilities.
110-
- Devices that have the software installed (along with device name, domain, OS, and more).
111-
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
112-
- Event timeline
113-
- Browser extensions (if applicable)
105+
- Tabs showing information, such as:
106+
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
107+
- Named CVEs of discovered vulnerabilities.
108+
- Devices that have the software installed (along with device name, domain, OS, and more).
109+
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
110+
- Event timeline
111+
- Browser extensions (if applicable)
112+
113+
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
114+
115+
## Normalized software versions
114116

115-
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
117+
For some software, normalized versions might be displayed in the Microsoft Defender portal. For example, suppose a device has [SQL Server 2016, version 13.0.7016.1](/troubleshoot/sql/releases/download-and-install-latest-updates#sql-server-2016) installed. However, in the [Microsoft Defender portal](https://security.microsoft.com), SQL Server 2016 is listed as `13.3.7016.1`, a normalized version of SQL Server. In this case, `13.3.7016.1` is functionally equivalent to `13.0.7016.1`.
118+
119+
Defender Vulnerability Management applies version normalization rules to ensure better cross-device correlation and more accurate vulnerability assessments. Version normalization is intentional and valid, and is used consistently to streamline detection logic and align with internal data models.
116120

117121
## Report inaccuracy
118122

119123
Report an inaccuracy when you see vulnerability information and assessment results that are incorrect.
120124

121-
1. Open the software flyout on the Software inventory page.
122-
2. Select **Report inaccuracy**.
123-
3. From the flyout pane, choose an issue to report from:
125+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab.
126+
127+
2. Select a software name to open its flyout, and then select **Report inaccuracy**.
128+
129+
3. From the flyout pane, choose an issue. Examples include:
124130

125-
- a software detail is wrong
126-
- the software isn't installed on any device in my org
127-
- the number of installed or exposed devices is wrong
131+
- A software detail is wrong
132+
- The software isn't installed on any device in my org
133+
- The number of installed or exposed devices is wrong
128134

129135
4. Fill in the requested details about the inaccuracy.
130136

0 commit comments

Comments
 (0)