Skip to content

Commit 474aad5

Browse files
authored
Merge pull request #3031 from MicrosoftDocs/diannegali-tvmappliesto
updated mdvm pages
2 parents fd07e21 + c1abc9d commit 474aad5

16 files changed

+74
-62
lines changed

defender-vulnerability-management/get-defender-vulnerability-management.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365-security
1515
- tier1
1616
- essentials-get-started
17-
ms.date: 02/28/2025
17+
ms.date: 03/06/2025
1818
---
1919

2020
# Sign up for Microsoft Defender Vulnerability Management
@@ -38,13 +38,13 @@ You can [request one extension](https://productledgrowth.powerappsportals.com/Ad
3838

3939
You must be a Global Administrator to start a trial. Or, you can allow users to start a trial on behalf of your organization by enabling this option:
4040

41-
1. In the [Microsoft 365 admin center](https://admin.microsoft.com), go to **Settings** > **Org settings** > **Services** > **User owned apps and services**
41+
1. In the [Microsoft 365 admin center](https://admin.microsoft.com), go to **Settings** > **Org settings**. In the **Services** page, navigate to **User owned apps and services**.
4242

43-
2. Check **Let users start trials on behalf of your organization**
43+
2. Check **Let users start trials on behalf of your organization**.
4444

45-
3. Select **Save**
45+
3. Select **Save**.
4646

47-
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-user-starttrial.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management user trial setting.":::
47+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-trial-admin-center.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management user trial setting.":::
4848

4949
> [!NOTE]
5050
> If you don't want users in your organization to be able to start trials, as a Global Administrator, you must disable this option once you've activated the trial.

defender-vulnerability-management/tvm-block-vuln-apps.md

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,10 @@ audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- Tier1
14-
ms.topic: conceptual
14+
ms.topic: concept-article
1515
search.appverid: met150
16-
ms.date: 12/05/2024
16+
ms.date: 3/05/2024
17+
#customer intent: To learn how to block vulnerable applications with Microsoft Defender Vulnerability Management.
1718
---
1819

1920
# Block vulnerable applications with Microsoft Defender Vulnerability Management
@@ -24,6 +25,9 @@ ms.date: 12/05/2024
2425
- [Microsoft Defender XDR](/defender-xdr)
2526
- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
2627

28+
> [!NOTE]
29+
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
30+
2731
Remediating vulnerabilities takes time and can be dependent on the responsibilities and resources of the IT team. Security administrators can temporarily reduce the risk of a vulnerability by taking immediate action to block all currently known vulnerable versions of an application until the remediation request is completed. The block option gives your IT teams time to patch an application without worrying your security administrators about the vulnerabilities.
2832

2933
While taking the remediation steps suggested by a security recommendation, security administrators can perform a mitigation action and block vulnerable versions of an application. File indicators of compromise (IOC)s are created for each of the executable files that belong to vulnerable versions of that application. Microsoft Defender Antivirus then enforces blocks on the devices that are in the specified scope.
@@ -54,23 +58,23 @@ For both actions, you can customize the message the users see. For example, you
5458

5559
## How to block vulnerable applications
5660

57-
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Vulnerability management** > **Recommendations** .
61+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com), then navigate to **Endpoints** > **Vulnerability management** > **Recommendations** .
5862

5963
2. Select a security recommendation to see a flyout with more information.
6064

6165
3. Select **Request remediation**.
6266

63-
4. Select whether you want to apply the remediation and mitigation to all device groups or only a few.
67+
4. Fill out the form. In the **Remediation options** dropdown, select which of the options you want to request. The options are software update, software uninstall, and attention required.
6468

65-
5. Select the remediation options on the **Remediation request** page. The remediation options are software update, software uninstall, and attention required.
69+
5. Under Task management tools, tick the box for **Open a ticket in Intune (for AAD joined devices)** if you want to create a ticket in Microsoft Intune for the remediation request.
6670

67-
6. Pick a **Remediation due date** and select **Next**.
71+
6. Pick a **Remediation due date**.
6872

69-
7. Under **Mitigation action**, select **Block** or **Warn**. Once you submit a mitigation action, it's immediately applied.
73+
7. Under **Priority**, select High, Medium, or Low.
7074

71-
:::image type="content" alt-text="Mitigation action" source="/defender/media/defender-vulnerability-management/mitigation-action.png" lightbox="/defender/media/defender-vulnerability-management/mitigation-action.png":::
75+
8. Under **Add notes**, you can add any additional information. Select **Next**.
7276

73-
8. Review the selections you made and **Submit request**. On the final page, you can choose to go directly to the remediation page to view the progress of remediation activities and see the list of blocked applications.
77+
9. Review the selections you made and then select **Submit**. On the final page, you can choose to edit the selections and export all remediation request to a .CSV file.
7478

7579
> [!NOTE]
7680
> Beginning December 3, 2024, expect to see a reduction in the number of file indicators that are created by new application block policies. To reduce your current indicator usage, unblock any blocked applications, and create new block policies.
@@ -95,19 +99,19 @@ If you try to block an application and it doesn't work, you might have reached t
9599

96100
After you've submitted a request to block vulnerable applications, you can view remediation activities by following these steps:
97101

98-
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Vulnerability management** > **Remediation** > **Activities**.
102+
1. Navigate to **Endpoints** > **Vulnerability management** > **Remediation**.
99103

100-
2. Filter the results by this mitigation type: `Block and/or Warn to view all activities pertaining to block or warn actions`.
104+
2. In the **Activities** tab, you can choose to filter the results by mitigation type. The options are **Block**, **Warn**, **None**, and **Workaround**.
101105

102-
3. An activity log displays. Keep in mind that it's an activity log, not the current block status of the application. Select the relevant activity to see a flyout panel with details including the remediation description, mitigation description, and the device remediation status:
106+
3. Select the relevant activity to see a flyout pane with details including the remediation description, mitigation description, and the device remediation status:
103107

104108
:::image type="content" alt-text="Remediation and mitigation details" source="/defender/media/defender-vulnerability-management/remediation-mitigation-details.png" lightbox="/defender/media/defender-vulnerability-management/remediation-mitigation-details.png":::
105109

106110
## View blocked applications
107111

108112
To view a list of blocked applications, follow these steps:
109113

110-
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Remediation** > **Blocked applications** tab:
114+
1. Navigate to **Endpoints** > **Vulnerability management** > **Remediation**, then select the **Blocked applications** tab:
111115

112116
:::image type="content" alt-text="Blocked application" source="/defender/media/defender-vulnerability-management/blocked-applications.png" lightbox="/defender/media/defender-vulnerability-management/blocked-applications.png":::
113117

defender-vulnerability-management/tvm-browser-extensions.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ ms.date: 03/04/2025
2525
- [Microsoft Defender XDR](/defender-xdr)
2626
- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
2727

28+
> [!NOTE]
29+
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
30+
2831
This browser extension is a small software application that adds functionality to a web browser for use with Microsoft Defender Vulnerability Management. This extension provides your security team with visibility into installed browser extensions to help ensure the safe usage of extensions in your organization.
2932

3033
The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it, and whether it's turned on or off on a device.

defender-vulnerability-management/tvm-software-inventory.md

Lines changed: 26 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Software inventory
3-
description: The software inventory page for Microsoft Defender for Endpoint's Vulnerability Management shows how many weaknesses and vulnerabilities were detected in software.
3+
description: The software inventory page for Microsoft Defender Vulnerability Management shows how many weaknesses and vulnerabilities were detected in software.
44
ms.service: defender-vuln-mgmt
55
ms.author: deniseb
66
author: denisebmsft
@@ -10,9 +10,10 @@ audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- Tier1
13-
ms.topic: conceptual
13+
ms.topic: concept-article
1414
search.appverid: met150
15-
ms.date: 02/23/2025
15+
ms.date: 03/05/2025
16+
#customer intent: To learn about the software inventory page in Microsoft Defender for Endpoint's Vulnerability Management.
1617
---
1718

1819
# Software inventory
@@ -24,7 +25,7 @@ ms.date: 02/23/2025
2425
- [Microsoft Defender XDR](/defender-xdr)
2526
- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
2627

27-
The software inventory in Defender Vulnerability Management is a list of known software in your organization. The default filter on the software inventory page displays all software with official [Common Platform Enumerations (CPE)](https://nvd.nist.gov/products/cpe). The view includes details such as the name of the vendor, number of weaknesses, threats, and number of exposed devices.
28+
The software inventory in Microsoft Defender Vulnerability Management is a list of known software in your organization. The default filter on the software inventory page displays all software with official [Common Platform Enumerations (CPE)](https://nvd.nist.gov/products/cpe). The view includes details such as the name of the vendor, number of weaknesses, threats, and number of exposed devices.
2829

2930
You can remove the **CPE Available** filter to gain further visibility and increase your search scope across all installed software in your organization. When you clear this filter, all software, including software without a CPE, displays in the software inventory list.
3031

@@ -39,28 +40,30 @@ Since it's real time, in a matter of minutes, you see vulnerability information
3940

4041
## Navigate to the Software inventory page
4142

42-
Access the software inventory page by selecting **Software inventory** from the Vulnerability management navigation menu in the [Microsoft Defender portal](/defender-xdr/microsoft-365-security-center-mde).
43+
Access the software inventory page by signing in to the [Microsoft Defender portal](https://security.microsoft.com) and navigating to **Endpoints** > **Vulnerability management** > **Inventories**, which opens to the **Software** tab.
4344

4445
> [!NOTE]
45-
> If you search for software using the Microsoft Defender for Endpoint global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write `windows_10` or `windows_11` instead of `Windows 10` or `Windows 11`.
46+
> If you search for software using the the Microsoft Defender portal global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write `windows_10` or `windows_11` instead of `Windows 10` or `Windows 11`.
4647
4748
## Software inventory overview
4849

4950
The **Software inventory** page opens with a list of software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags.
5051

5152
The data is updated every three to four hours. There's currently no way to force a sync.
5253

53-
By default, the view is filtered by **Product Code (CPE): Available**. You can also filter the list view based on weaknesses found in the software, threats associated with them, and tags like whether the software has reached end-of-support.
54+
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
5455

55-
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/software-inventory-page.png" lightbox="/defender/media/defender-vulnerability-management/software-inventory-page.png":::
56+
You can filter the list view based on product code (CPE), OS platform, weaknesses found in the software, threats associated with them, and tags like whether the software has reached end-of-support.
5657

57-
Select the software that you want to investigate. A flyout panel opens with a more compact view of the information on the page. You can either dive deeper into the investigation and select **Open software page**, or flag any technical inconsistencies by selecting **Report inaccuracy**.
58+
:::image type="content" alt-text="Screenshot of available filters in the software inventory page." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-filters-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-filters.png":::
59+
60+
Select the software that you want to investigate. A flyout pane opens with a more compact view of the information on the page. You can either dive deeper into the investigation and select **Open software page**, or flag any technical inconsistencies by selecting **Report inaccuracy**.
5861

5962
### Software that isn't supported
6063

61-
Software that isn't currently supported by vulnerability management might be present in the software inventory page. Because it isn't supported, only limited data are available. Filter by unsupported software with the "Not available" option in the "Weakness" section.
64+
Software that isn't currently supported by vulnerability management might be present in the software inventory page. Because it isn't supported, only limited data are available. Filter by unsupported software with the *Not available* option in the **Weakness** section.
6265

63-
:::image type="content" alt-text="Unsupported software filter." source="/defender/media/defender-vulnerability-management/tvm-unsupported-software-filter.png" lightbox="/defender/media/defender-vulnerability-management/tvm-unsupported-software-filter.png":::
66+
:::image type="content" alt-text="Unsupported software filter" source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-notavail.png":::
6467

6568
Here's how to tell whether software isn't supported:
6669

@@ -71,11 +74,11 @@ Here's how to tell whether software isn't supported:
7174

7275
## Software inventory on devices
7376

74-
1. In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, select **Device inventory**.
77+
1. Sign in to the Microsoft Defender portal. Navigate to **Assets** > **Devices** to open the **Device inventory** page.
7578

7679
2. Select the name of a device to open its device page.
7780

78-
3. Select the **Software inventory** tab to see a list of all the known software present on the device.
81+
3. Select the **Inventories** tab. Under **Software**, you can see a list of all the known software present on the device.
7982

8083
4. Select a specific software entry to open the flyout with more information.
8184

@@ -85,29 +88,31 @@ Software might be visible at the device level, even if it's currently not suppor
8588

8689
See evidence of where we detected a specific software on a device from the registry, disk, or both. You can find it on any device in the device software inventory.
8790

88-
Select a software name to open the flyout, and look for the section called "Software Evidence."
91+
Select a software name to open the flyout, and look for the section called **Software Evidence**.
8992

90-
:::image type="content" alt-text="Software evidence example of Windows 10 from the devices list, showing software evidence registry path." source="/defender/media/defender-vulnerability-management/tvm-software-evidence.png" lightbox="/defender/media/defender-vulnerability-management/tvm-software-evidence.png":::
93+
:::image type="content" alt-text="Software evidence example of Microsoft Edge showing evidence registry path as seen on a device page" source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence.png":::
9194

9295
## Software pages
9396

9497
You can view software pages a few different ways:
9598

96-
- Software inventory page > Select a software name > Select **Open software page** in the flyout
99+
- **Endpoints** > **Vulnerability management** > **Inventories** > Select a software name > Select **Open software page** in the flyout
97100
- [Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
98-
- [Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the section called "Related component" in the flyout
101+
- [Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the **Related component** section in the flyout
99102

100103
A full page appears with all the details of a specific software and the following information:
101104

102-
- Side panel with vendor information, prevalence of the software in the organization (including number of devices it's installed on, and exposed devices that aren't patched), whether and exploit is available, and impact to exposure score.
103-
- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs with the number of exposed devices.
105+
- Overview with vendor information, exploits available, and impact rating
106+
- Data visualizations showing the number of and severity of discovered weaknesses, exposed devices, software's usage in the past 30 days, and the top events in the last seven days.
104107
- Tabs showing information such as:
105108
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
106109
- Named CVEs of discovered vulnerabilities.
107110
- Devices that have the software installed (along with device name, domain, OS, and more).
108111
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
112+
- Event timeline
113+
- Browser extensions (if applicable)
109114

110-
:::image type="content" alt-text="Software example page for Visual Studio 2017 with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-software-page-example.png" lightbox="/defender/media/defender-vulnerability-management/tvm-software-page-example.png":::
115+
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
111116

112117
## Report inaccuracy
113118

@@ -123,7 +128,7 @@ Report an inaccuracy when you see vulnerability information and assessment resul
123128

124129
4. Fill in the requested details about the inaccuracy.
125130

126-
![Report inaccuracy](/defender/media/defender-vulnerability-management/report-inaccuracy-software.png)
131+
![Report inaccuracy](/defender/media/defender-vulnerability-management/tvm-sw-inventory-report.png)
127132

128133
5. Select **Submit**. Your feedback is immediately sent to the vulnerability management experts.
129134

0 commit comments

Comments
 (0)