Skip to content

Commit 695b5b0

Browse files
authored
Update get-assessment-software-vulnerabilities.md
1 parent 8ae7a39 commit 695b5b0

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

defender-endpoint/api/get-assessment-software-vulnerabilities.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -342,7 +342,7 @@ GET https://api-us.securitycenter.contoso.com/api/machines/SoftwareVulnerabiliti
342342
Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CveId. The API pulls data in your organization as Json responses. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results. Unlike the full software vulnerabilities assessment (JSON response), which is used to obtain an entire snapshot of the software vulnerabilities assessment of your organization by device, the delta export JSON response API call is used to fetch only the changes that happened between a selected date and the current date (the "delta" API call). Instead of getting a full export with a large amount of data every time, you only get specific information on new, fixed, and updated vulnerabilities. Delta export JSON response API call can also be used to calculate different KPIs such as "how many vulnerabilities were fixed?" or "how many new vulnerabilities were added to my organization?"
343343

344344
> [!NOTE]
345-
> We refresh the __Full _Software Vulnerabilities Assessment(Flat/Full VA) by Device___ export every __six hours__ and store each snapshot in blob storage; the API always serves the latest snapshot, to emphasize  calling the Get Endpoint won't to trigger a generation, call get endpoint  will just read latest Flat from blob.
345+
> We refresh the __Full _Software Vulnerabilities Assessment(Flat/Full VA) by Device___ export every __six hours__ and store each snapshot in blob storage; the API always serves the latest snapshot, to emphasize  calling the Get Endpoint won't to trigger a generation, call get endpoint will just read latest Flat OR Delta After sinceTime.
346346
> A successful completion of Full VA export will trigger __delta export__ that captures the changes from latest Flat VA processed by Delta to new Flat VA.
347347
> > __RBAC-scoped duplicates__
348348
> > Because exports are scoped by __RBACGroup__, a device that moves from one RBAC group to another will appear __twice__ in a Delta export when you query with the global view (`RBACGroup=*`): once under its previous group with status "Fixed" and once under its current group with status "New". Use the `rbacGroupId` and device identifiers together (or de-duplicate on your side) if you need a single authoritative record per device.
@@ -355,6 +355,8 @@ Returns a table with an entry for every unique combination of DeviceId, Software
355355

356356
1. __Handle RBAC moves__ – When processing a Delta, de-duplicate entries where the same `Id(deviceId_software_` version _ cve`)`appears under multiple `rbacGroupId` values.
357357

358+
1. When "Status" = Fix" the calcualtion of "EventTimestamp"- "FirstSeenTimestamp" should give you an estimation on when the CVE was fixed up to a granularity of 6 hours(because of Delta worker run interval).
359+
358360

359361
#### 3.1.1 Limitations
360362

@@ -473,7 +475,7 @@ GET https://api.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilityC
473475
"exploitabilityLevel": "NoExploit",
474476
"recommendationReference": "va-_-google-_-chrome",
475477
"status": "Fixed",
476-
"eventTimestamp": "2021-01-11T11:06:08.291Z"
478+
"eventTimestamp": "2020-11-03 10:13:34.8476880"
477479
},
478480
{
479481
"id": "00e59c61234533860738ecf488eec8abf296e41e_onedrive_20.64.329.3__",
@@ -500,7 +502,7 @@ GET https://api.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilityC
500502
"exploitabilityLevel": "NoExploit",
501503
"recommendationReference": "va-_-microsoft-_-onedrive",
502504
"status": "Fixed",
503-
"eventTimestamp": "2021-01-11T11:06:08.291Z"
505+
"eventTimestamp": "2020-11-03 10:13:34.8476880"
504506
},
505507
{
506508
"id": "01aa8c73095bb12345918663f3f94ce322107d24_firefox_83.0.0.0_CVE-2020-26971_",
@@ -529,7 +531,7 @@ GET https://api.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilityC
529531
"exploitabilityLevel": "NoExploit",
530532
"recommendationReference": "va-_-mozilla-_-firefox",
531533
"status": "Fixed",
532-
"eventTimestamp": "2021-01-11T11:06:08.291Z"
534+
"eventTimestamp": "2020-11-03 10:13:34.8476880"
533535
},
534536
{
535537
"id": "026f0fcb12345fbd2decd1a339702131422d362e_project_16.0.13701.20000__",
@@ -556,7 +558,7 @@ GET https://api.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilityC
556558
"exploitabilityLevel": "NoExploit",
557559
"recommendationReference": "va-_-microsoft-_-project",
558560
"status": "Fixed",
559-
"eventTimestamp": "2021-01-11T11:06:08.291Z"
561+
"eventTimestamp": "2020-11-03 10:13:34.8476880"
560562
},
561563
{
562564
"id": "038df381234510b357ac19d0113ef622e4e212b3_chrome_81.0.4044.138_CVE-2020-16011_",
@@ -585,7 +587,7 @@ GET https://api.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilityC
585587
"exploitabilityLevel": "NoExploit",
586588
"recommendationReference": "va-_-google-_-chrome",
587589
"status": "Fixed",
588-
"eventTimestamp": "2021-01-11T11:06:08.291Z"
590+
"eventTimestamp": "2020-11-03 10:13:34.8476880"
589591
}
590592
],
591593
"@odata.nextLink": "https://wpatdadi-eus-stg.cloudapp.net/api/machines/SoftwareVulnerabilitiesTimeline?sincetime=2021-01-11&pagesize=5&$skiptoken=eyJFeHBvcnREZWZpbml0aW9uIjp7IlRpbWVQYXRoIjoiMjAyMS0wMS0xMS8xMTAxLyJ9LCJFeHBvcnRGaWxlSW5kZXgiOjAsIkxpbmVTdG9wcGVkQXQiOjV9"

0 commit comments

Comments
 (0)