You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-weaknesses.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ If you select a CVE from the weaknesses page, a flyout panel opens with more inf
81
81
82
82
For each CVE, you can see a list of the exposed devices and the affected software.
83
83
84
-
## Exploit Prediction Scoring System (EPSS)
84
+
## Exploit Prediction Scoring System (EPSS)
85
85
86
86
The Exploit Prediction Scoring System (EPSS) generates a data-driven score for the probability of a known software vulnerability being exploited in the wild. EPSS uses current threat information from the CVE and real-world exploit data. For each CVE, the EPSS model produces a probability score between 0 and 1 (0% and 100%). The higher the score, the greater the probability that a vulnerability will be exploited. Learn more about [EPSS](https://www.first.org/epss/).
87
87
@@ -131,16 +131,15 @@ You can request for support to be added to Defender Vulnerability Management for
131
131
> [!NOTE]
132
132
> Request CVE support functionality is not available for GCC, GCC High and DoD customers.
133
133
134
-
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
136
135
137
136
## View Common Vulnerabilities and Exposures (CVE) entries in other places
138
137
139
138
### Top vulnerable software in the dashboard
140
139
141
140
1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You'll see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
2. Select **Open device page** and select **Discovered vulnerabilities** from the device page.
166
165
3. Select the vulnerability you want to investigate.
167
166
168
-
A flyout opens and the **Detection logic** section shows the detection logic and source.
167
+
A flyout opens and the **Detection logic** section shows the detection logic and source.
169
168
170
-
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
169
+
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
171
170
172
171
The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
0 commit comments