You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-weaknesses.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ The Weaknesses page opens with a list of the CVEs your devices are exposed to. Y
48
48
> If there is no official CVE-ID assigned to a vulnerability, the vulnerability name is assigned by Microsoft Defender Vulnerability Management and will be the format **TVM-2020-002**.
49
49
50
50
> [!NOTE]
51
-
> The maximum number of records you can export from the weaknesses page to a CSV file is 10,000.
51
+
> The maximum number of records you can export from the weaknesses page to a CSV file is 8,000 and the export must not exceed 64KB. If you receive a message stating the results are too large to export, refine your query to include less records.
|[Storm-0506](https://www.microsoft.com/en-us/security/blog/2022/11/17/dev-0569-finds-new-ways-to-deliver-royal-ransomware-various-payloads/)||Group in development||
133
133
|Storm-0530||North Korea|H0lyGh0st|
134
134
|Storm-0539||Financially motivated|Atlas Lion|
135
135
|Storm-0569||Financially motivated||
@@ -143,10 +143,10 @@ Use the following reference table to understand how our previously publicly disc
143
143
|Storm-0861||Iran||
144
144
|Storm-0867||Egypt|Caffeine|
145
145
|Storm-0971||Financially motivated|(Merged into Octo Tempest)|
146
-
|Storm-0978||Group in development|RomCom, Underground Team|
146
+
|[Storm-0978](https://www.microsoft.com/en-us/security/blog/2023/07/11/storm-0978-attacks-reveal-financial-and-espionage-motives/)||Group in development|RomCom, Underground Team|
147
147
|Storm-1044||Financially motivated|Danabot|
148
148
|Storm-1084||Iran|DarkBit|
149
-
|Storm-1101||Group in development|NakedPages|
149
+
|[Storm-1101](https://www.microsoft.com/en-us/security/blog/2023/03/13/dev-1101-enables-high-volume-aitm-campaigns-with-open-source-phishing-kit/)||Group in development|NakedPages|
150
150
|Storm-1113||Financially motivated||
151
151
|Storm-1133||Palestinian Authority||
152
152
|Storm-1152||Financially motivated||
@@ -163,7 +163,7 @@ Use the following reference table to understand how our previously publicly disc
Copy file name to clipboardExpand all lines: exposure-management/whats-new.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,15 @@ Security Exposure Management is currently in public preview.
25
25
>
26
26
> `https://aka.ms/msem/rss`
27
27
28
+
## September 2024
29
+
30
+
### Proactively manage your security posture
31
+
32
+
Read how the *ExposureGraphEdges* and *ExposureGraphNodes* tables in Advanced Hunting helps your organizations proactively manage and understand your security posture by analyzing asset relationships and potential vulnerabilities.
33
+
34
+
**Blog** - [Microsoft Security Exposure Management Graph: Prioritization is the king](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-security-exposure-management-graph-prioritization-is/ba-p/4160316)
35
+
For more information, see, [Query the enterprise exposure graph](query-enterprise-exposure-graph.md)
0 commit comments