Skip to content

Commit 95a6d60

Browse files
committed
Merge branch 'main' into ASTQR-chrisda
2 parents b203c0e + df4e2ba commit 95a6d60

File tree

14 files changed

+75
-32
lines changed

14 files changed

+75
-32
lines changed

defender-endpoint/api/get-all-recommendations.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -100,34 +100,36 @@ Here is an example of the response.
100100
"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Recommendations",
101101
"value": [
102102
{
103-
"id": "va-_-microsoft-_-windows_10" "va-_-microsoft-_-windows_11",
104-
"productName": "windows_10" "Windows_11",
105-
"recommendationName": "Update Windows 10" "Update Windows 11",
106-
"weaknesses": 397,
103+
"id": "va-_-microsoft-_-edge_chromium-based",
104+
"productName": "edge_chromium-based",
105+
"recommendationName": "Update Microsoft Edge Chromium-based to version 127.0.2651.74",
106+
"weaknesses": 762,
107107
"vendor": "microsoft",
108-
"recommendedVersion": "",
108+
"recommendedVersion": "127.0.2651.74",
109+
"recommendedVendor": "",
110+
"recommendedProgram": "",
109111
"recommendationCategory": "Application",
110112
"subCategory": "",
111113
"severityScore": 0,
112114
"publicExploit": true,
113115
"activeAlert": false,
114116
"associatedThreats": [
115-
"3098b8ef-23b1-46b3-aed4-499e1928f9ed",
116-
"40c189d5-0330-4654-a816-e48c2b7f9c4b",
117-
"4b0c9702-9b6c-4ca2-9d02-1556869f56f8",
118-
"e8fc2121-3cf3-4dd2-9ea0-87d7e1d2b29d",
119-
"94b6e94b-0c1d-4817-ac06-c3b8639be3ab"
117+
"71d9120e-7eea-4058-889a-1a60bbf7e312"
120118
],
121119
"remediationType": "Update",
122120
"status": "Active",
123121
"configScoreImpact": 0,
124-
"exposureImpact": 7.674418604651163,
125-
"totalMachineCount": 37,
126-
"exposedMachinesCount": 7,
122+
"exposureImpact": 1.1744086343876479,
123+
"totalMachineCount": 261,
124+
"exposedMachinesCount": 193,
127125
"nonProductivityImpactedAssets": 0,
128-
"relatedComponent": "Windows 10" "Windows 11"
126+
"relatedComponent": "Edge Chromium-based",
127+
"hasUnpatchableCve": false,
128+
"tags": [
129+
"internetFacing"
130+
],
131+
"exposedCriticalDevices": 116
129132
}
130-
...
131133
]
132134
}
133135
```

defender-endpoint/api/get-all-vulnerabilities.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,9 @@ Here is an example of the response.
108108
"exploitInKit": false,
109109
"exploitTypes": [],
110110
"exploitUris": [],
111-
"CveSupportability": "supported"
111+
"CveSupportability": "supported",
112+
"tags": [],
113+
"epss": 0.632
112114
}
113115
]
114116

defender-endpoint/api/get-recommendation-by-id.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,11 @@ Here's an example of the response.
102102
"totalMachineCount": 6,
103103
"exposedMachinesCount": 5,
104104
"nonProductivityImpactedAssets": 0,
105-
"relatedComponent": "Chrome"
105+
"relatedComponent": "Chrome",
106+
"tags": [
107+
"internetFacing"
108+
],
109+
"exposedCriticalDevices": 116
106110
}
107111
```
108112

defender-endpoint/api/recommendation.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,5 +80,7 @@ Want to experience Defender for Endpoint? [Sign up for a free trial.](https://si
8080
|exposedMachinesCount|Long|Number of installed devices that are exposed to vulnerabilities|
8181
|nonProductivityImpactedAssets|Long|Number of devices that aren't affected|
8282
|relatedComponent|String|Related software component|
83-
|
83+
|exposedCriticalDevices|Numeric|The sum of critical devices in all levels of criticality except “not critical" for a particular recommendation|
84+
85+
8486
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/vulnerability.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,5 +64,7 @@ exploitInKit|Boolean|Exploit is part of an exploit kit
6464
exploitTypes|String collection|Exploit affect. Possible values are: **Local privilege escalation**, **Denial of service**, or **Local**
6565
exploitUris|String collection|Exploit source URLs
6666
CveSupportability| String collection| Possible values are: **Supported**, **Not Supported**, or **SupportedInPremium**
67+
EPSS|Numeric| Represents the probability that a vulnerability will be exploited. This probability is expressed as a number between 0 and 1 (0%-100%) according to the EPSS model.
68+
6769

6870
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-endpoint/internet-facing-devices.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier2
1414
ms.topic: conceptual
1515
search.appverid: met150
16-
ms.date: 07/10/2023
16+
ms.date: 07/31/2024
1717
---
1818

1919
# Internet-facing devices
@@ -64,6 +64,10 @@ You can use filters to focus in on internet-facing devices and investigate the r
6464

6565
:::image type="content" source="/defender/media/defender-endpoint/internet-facing-filter.png" alt-text="Screenshot of the internet-facing filter" lightbox="/defender/media/defender-endpoint/internet-facing-filter.png":::
6666

67+
The internet-facing device tag also appears in Microsoft Defender Vulnerability Management. This allows you to filter for internet-facing devices from the [weaknesses](/defender-vulnerability-management/tvm-weaknesses) and the [security recommendations](/defender-vulnerability-management/tvm-security-recommendation) pages in the Microsoft Defender portal.
68+
69+
:::image type="content" source="/defender/media/defender-endpoint/internet-facing-weaknesses.png" alt-text="Screenshot of the internet-facing weaknesses" lightbox="/defender/media/defender-endpoint/internet-facing-weaknesses.png":::
70+
6771
> [!NOTE]
6872
> If no new events for a device occur for 48 hours, the Internet-facing tag is removed and it will no longer be visible in the Microsoft Defender portal.
6973
File renamed without changes.
111 KB
Loading

defender-vulnerability-management/tvm-weaknesses.md

Lines changed: 30 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 01/09/2024
15+
ms.date: 07/31/2024
1616
---
1717

1818
# Vulnerabilities in my organization
@@ -75,12 +75,31 @@ The **Exposed Devices** column shows how many devices are currently exposed to a
7575

7676
## Gain vulnerability insights
7777

78-
If you select a CVE from the weaknesses page, a flyout panel opens with more information such as the vulnerability description, details and threat insights. The AI generated vulnerability description provides detailed information on the vulnerability, its impact, recommended remediation steps, and any additional information, if available.
78+
If you select a CVE from the weaknesses page, a flyout panel opens with more information such as the vulnerability description, details, and threat insights. The AI generated vulnerability description provides detailed information on the vulnerability, its effect, recommended remediation steps, and any additional information, if available.
7979

8080
:::image type="content" source="/defender/media/defender-vulnerability-management/weaknesses-cve-description.png" alt-text="Screenshot of the weaknesses weaknesses-flyout pane" lightbox="/defender/media/defender-vulnerability-management/weaknesses-cve-description.png":::
8181

8282
For each CVE, you can see a list of the exposed devices and the affected software.
8383

84+
## Exploit Prediction Scoring System (EPSS)
85+
86+
The Exploit Prediction Scoring System (EPSS) generates a data-driven score for the probability of a known software vulnerability being exploited in the wild. EPSS uses current threat information from the CVE and real-world exploit data. For each CVE, the EPSS model produces a probability score between 0 and 1 (0% and 100%). The higher the score, the greater the probability that a vulnerability will be exploited. Learn more about [EPSS](https://www.first.org/epss/).
87+
88+
EPSS is designed to help enrich your knowledge of weaknesses and their exploit probability, and enable you to prioritize accordingly.
89+
90+
To see the EPSS score select a CVE from the [Weaknesses](tvm-weaknesses.md) page in the Microsoft Defender portal:
91+
92+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss.png" alt-text="Screenshot of the weaknesses epss score." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss.png":::
93+
94+
When the EPSS is greater than 0.9, the **Threats** column tooltip is updated with the value to convey the urgency of mitigation:
95+
96+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png" alt-text="Screenshot of the weaknesses epss score in the threat tooltip." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png":::
97+
98+
> [!NOTE]
99+
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.
100+
101+
You can use the [Vulnerability API](/defender-endpoint/api/vulnerability) to see the EPSS score.
102+
84103
## Related security recommendations
85104

86105
Use security recommendations to remediate the vulnerabilities in exposed devices and to reduce the risk to your assets and organization. When a security recommendation is available, you can select **Go to the related security recommendation** for details on how to remediate the vulnerability.
@@ -98,7 +117,7 @@ If there's no security update available, the CVE will have the tag 'No security
98117
99118
## Request CVE support
100119

101-
A CVE for software that isn't currently supported by vulnerability management still appears in the Weaknesses page. Because the software is not supported, only limited data will be available. Exposed device information will not be available for CVEs with unsupported software.
120+
A CVE for software that isn't currently supported by vulnerability management still appears in the Weaknesses page. Because the software is not supported, only limited data is available. Exposed device information won't be available for CVEs with unsupported software.
102121

103122
To view a list of unsupported software, filter the weaknesses page by the "Not available" option in the "Exposed devices" section.
104123

@@ -107,15 +126,15 @@ You can request for support to be added to Defender Vulnerability Management for
107126
1. Select the CVE from the [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in the Microsoft Defender portal
108127
2. Select **Please support this CVE** from the Vulnerability details tab
109128

110-
This request will be sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
129+
The request is sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
111130

112131
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
113132

114133
## View Common Vulnerabilities and Exposures (CVE) entries in other places
115134

116135
### Top vulnerable software in the dashboard
117136

118-
1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You will see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
137+
1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You'll see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
119138

120139
:::image type="content" alt-text="Top vulnerable software card." source="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png" lightbox="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png":::
121140

@@ -142,20 +161,20 @@ To see the detection logic:
142161
2. Select **Open device page** and select **Discovered vulnerabilities** from the device page.
143162
3. Select the vulnerability you want to investigate.
144163

145-
A flyout will open and the **Detection logic** section shows the detection logic and source.
164+
A flyout opens and the **Detection logic** section shows the detection logic and source.
146165

147-
:::image type="content" alt-text="Detection Logic example which lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
166+
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
148167

149-
The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we'll only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
168+
The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
150169

151170
## Report inaccuracy
152171

153-
Report a false positive when you see any vague, inaccurate, or incomplete information. You can also report on security recommendations that have already been remediated.
172+
Report a false positive when you see any vague, inaccurate, or incomplete information. You can also report on security recommendations that are already been remediated.
154173

155174
1. Open the CVE on the Weaknesses page.
156-
2. Select **Report inaccuracy** and a flyout pane will open.
175+
2. Select **Report inaccuracy**.
157176
3. From the flyout pane, choose an issue to report.
158-
4. Fill in the requested details about the inaccuracy. This will vary depending on the issue you're reporting.
177+
4. Fill in the requested details about the inaccuracy. This varies depending on the issue you're reporting.
159178
5. Select **Submit**. Your feedback is immediately sent to the Microsoft Defender Vulnerability Management experts.
160179

161180
:::image type="content" alt-text="Report inaccuracy options." source="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png" lightbox="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png":::
120 KB
Loading

0 commit comments

Comments
 (0)