You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/api/get-assessment-software-vulnerabilities.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: Export software vulnerabilities assessment per device
3
3
description: The API response is per device and contains vulnerable software installed on your exposed devices and any known vulnerabilities in these software products. This table also includes operating system information, CVE IDs, and vulnerability severity information.
4
4
ms.service: defender-endpoint
5
-
author: denisebmsft
6
-
ms.author: deniseb
5
+
author: emmwalshh
6
+
ms.author: ewalsh
7
7
ms.localizationpriority: medium
8
8
manager: deniseb
9
9
audience: ITPro
@@ -15,7 +15,7 @@ ms.topic: reference
15
15
ms.subservice: reference
16
16
ms.custom: api
17
17
search.appverid: met150
18
-
ms.date: 01/23/2025
18
+
ms.date: 01/31/2025
19
19
---
20
20
21
21
# Export software vulnerabilities assessment per device
@@ -89,8 +89,8 @@ GET /api/machines/SoftwareVulnerabilitiesByMachine
89
89
> [!NOTE]
90
90
>
91
91
> - Each record is 1 KB of data. You should take this size into account when choosing the correct pageSize parameter for you.
92
-
> - Some other columns might be returned in the response. These columns are temporary and might be removed so please use only the documented columns.
93
-
> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output isn't necessarily returned in the same order listed in this table.
92
+
> - Some other columns might be returned in the response. These columns are temporary and might be removed so use only the documented columns.
93
+
> - The properties defined in the following table are listed alphabetically, by property ID. While running this API, the resulting output isn't necessarily returned in the same order listed in this table.
94
94
95
95
<br>
96
96
@@ -103,8 +103,8 @@ DeviceName|String|Fully qualified domain name (FQDN) of the device.|johnlaptop.e
103
103
DiskPaths|Array\[string\]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]
104
104
ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit
105
105
FirstSeenTimestamp|String|First time this product CVE was seen on the device.|2020-11-03 10:13:34.8476880
106
-
Id|String|Unique identifier for the record.|123ABG55_573AG&mnp!
107
-
LastSeenTimestamp|String|Last time the software vulnerability was seen on the device.|2020-11-03 10:13:34.8476880
106
+
ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!
107
+
LastSeenTimestamp|String|Last time the software was reported on the device.|2020-11-03 10:13:34.8476880
108
108
OSPlatform|String|Platform of the operating system running on the device. This property indicates specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11
109
109
RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."|Servers
110
110
RecommendationReference|String|A reference to the recommendation ID related to this software.|va-_-microsoft-_-silverlight
@@ -300,8 +300,8 @@ GET /api/machines/SoftwareVulnerabilitiesExport
300
300
> - The download URLs are valid for 6 hours.
301
301
> - For maximum download speed of your data, you can make sure you're downloading from the same Azure region that your data resides.
302
302
>
303
-
> - Each record is approximately 1KB of data. You should take this into account when choosing the correct pageSize parameter for you.
304
-
> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
303
+
> - Each record is 1KB of data. You should take this into account when choosing the correct pageSize parameter for you.
304
+
> - Some extra columns might be returned in the response. These columns are temporary and might be removed so use only the documented columns.
305
305
306
306
<br>
307
307
@@ -342,13 +342,13 @@ GET https://api-us.securitycenter.contoso.com/api/machines/SoftwareVulnerabiliti
342
342
Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CveId. The API pulls data in your organization as Json responses. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results. Unlike the full software vulnerabilities assessment (JSON response), which is used to obtain an entire snapshot of the software vulnerabilities assessment of your organization by device, the delta export JSON response API call is used to fetch only the changes that happened between a selected date and the current date (the "delta" API call). Instead of getting a full export with a large amount of data every time, you only get specific information on new, fixed, and updated vulnerabilities. Delta export JSON response API call can also be used to calculate different KPIs such as "how many vulnerabilities were fixed?" or "how many new vulnerabilities were added to my organization?"
343
343
344
344
> [!NOTE]
345
-
> It's highly recommended you use the full export software vulnerabilities assessment by device API call at least once a week and this additional export software vulnerabilities changes by device (delta) API call all the other days of the week. Unlike the other Assessments JSON response APIs, the "delta export" isn't a full export. The delta export includes only the changes that happened between a selected date and the current date (the "delta" API call).
345
+
> It's highly recommended you use the full export software vulnerabilities assessment by device API call at least once a week and this extra export software vulnerabilities changes by device (delta) API call all the other days of the week. Unlike the other Assessments JSON response APIs, the "delta export" isn't a full export. The delta export includes only the changes that happened between a selected date and the current date (the "delta" API call).
346
346
347
347
#### 3.1.1 Limitations
348
348
349
349
- Maximum page size is 200,000.
350
350
- The sinceTime parameter has a maximum of 14 days.
351
-
- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.
351
+
- Rate limitations for this API are 30 calls per minute and 1,000 calls per hour.
352
352
353
353
### 3.2 Permissions
354
354
@@ -394,7 +394,7 @@ DiskPaths|Array[string]|Disk evidence that the product is installed on the devic
394
394
EventTimestamp|String|The time this delta event was found.|2021-01-11T11:06:08.291Z
395
395
ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit
396
396
FirstSeenTimestamp|String|First time the CVE of this product was seen on the device.|2020-11-03 10:13:34.8476880
397
-
Id|String|Unique identifier for the record.|123ABG55_573AG&mnp!
397
+
ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!
398
398
LastSeenTimestamp|String|Last time the CVE was seen on the device.|2020-11-03 10:13:34.8476880
399
399
OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11
400
400
RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."|Servers
0 commit comments