You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/api/vulnerability.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,5 +64,7 @@ exploitInKit|Boolean|Exploit is part of an exploit kit
64
64
exploitTypes|String collection|Exploit affect. Possible values are: **Local privilege escalation**, **Denial of service**, or **Local**
65
65
exploitUris|String collection|Exploit source URLs
66
66
CveSupportability| String collection| Possible values are: **Supported**, **Not Supported**, or **SupportedInPremium**
67
+
EPSS|Numeric| Represents the probability that a vulnerability will be exploited. This probability is expressed as a number between 0 and 1 (0%-100%) according to the EPSS model.
68
+
67
69
68
70
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/internet-facing-devices.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
- tier2
14
14
ms.topic: conceptual
15
15
search.appverid: met150
16
-
ms.date: 07/10/2023
16
+
ms.date: 07/31/2024
17
17
---
18
18
19
19
# Internet-facing devices
@@ -64,6 +64,10 @@ You can use filters to focus in on internet-facing devices and investigate the r
64
64
65
65
:::image type="content" source="/defender/media/defender-endpoint/internet-facing-filter.png" alt-text="Screenshot of the internet-facing filter" lightbox="/defender/media/defender-endpoint/internet-facing-filter.png":::
66
66
67
+
The internet-facing device tag also appears in Microsoft Defender Vulnerability Management. This allows you to filter for internet-facing devices from the [weaknesses](/defender-vulnerability-management/tvm-weaknesses) and the [security recommendations](/defender-vulnerability-management/tvm-security-recommendation) pages in the Microsoft Defender portal.
68
+
69
+
:::image type="content" source="/defender/media/defender-endpoint/internet-facing-weaknesses.png" alt-text="Screenshot of the internet-facing weaknesses" lightbox="/defender/media/defender-endpoint/internet-facing-weaknesses.png":::
70
+
67
71
> [!NOTE]
68
72
> If no new events for a device occur for 48 hours, the Internet-facing tag is removed and it will no longer be visible in the Microsoft Defender portal.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-weaknesses.md
+30-11Lines changed: 30 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- Tier1
13
13
ms.topic: conceptual
14
14
search.appverid: met150
15
-
ms.date: 01/09/2024
15
+
ms.date: 07/31/2024
16
16
---
17
17
18
18
# Vulnerabilities in my organization
@@ -75,12 +75,31 @@ The **Exposed Devices** column shows how many devices are currently exposed to a
75
75
76
76
## Gain vulnerability insights
77
77
78
-
If you select a CVE from the weaknesses page, a flyout panel opens with more information such as the vulnerability description, details and threat insights. The AI generated vulnerability description provides detailed information on the vulnerability, its impact, recommended remediation steps, and any additional information, if available.
78
+
If you select a CVE from the weaknesses page, a flyout panel opens with more information such as the vulnerability description, details, and threat insights. The AI generated vulnerability description provides detailed information on the vulnerability, its effect, recommended remediation steps, and any additional information, if available.
79
79
80
80
:::image type="content" source="/defender/media/defender-vulnerability-management/weaknesses-cve-description.png" alt-text="Screenshot of the weaknesses weaknesses-flyout pane" lightbox="/defender/media/defender-vulnerability-management/weaknesses-cve-description.png":::
81
81
82
82
For each CVE, you can see a list of the exposed devices and the affected software.
83
83
84
+
## Exploit Prediction Scoring System (EPSS)
85
+
86
+
The Exploit Prediction Scoring System (EPSS) generates a data-driven score for the probability of a known software vulnerability being exploited in the wild. EPSS uses current threat information from the CVE and real-world exploit data. For each CVE, the EPSS model produces a probability score between 0 and 1 (0% and 100%). The higher the score, the greater the probability that a vulnerability will be exploited. Learn more about [EPSS](https://www.first.org/epss/).
87
+
88
+
EPSS is designed to help enrich your knowledge of weaknesses and their exploit probability, and enable you to prioritize accordingly.
89
+
90
+
To see the EPSS score select a CVE from the [Weaknesses](tvm-weaknesses.md) page in the Microsoft Defender portal:
91
+
92
+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss.png" alt-text="Screenshot of the weaknesses epss score." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss.png":::
93
+
94
+
When the EPSS is greater than 0.9, the **Threats** column tooltip is updated with the value to convey the urgency of mitigation:
95
+
96
+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png" alt-text="Screenshot of the weaknesses epss score in the threat tooltip." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png":::
97
+
98
+
> [!NOTE]
99
+
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.
100
+
101
+
You can use the [Vulnerability API](/defender-endpoint/api/vulnerability) to see the EPSS score.
102
+
84
103
## Related security recommendations
85
104
86
105
Use security recommendations to remediate the vulnerabilities in exposed devices and to reduce the risk to your assets and organization. When a security recommendation is available, you can select **Go to the related security recommendation** for details on how to remediate the vulnerability.
@@ -98,7 +117,7 @@ If there's no security update available, the CVE will have the tag 'No security
98
117
99
118
## Request CVE support
100
119
101
-
A CVE for software that isn't currently supported by vulnerability management still appears in the Weaknesses page. Because the software is not supported, only limited data will be available. Exposed device information will not be available for CVEs with unsupported software.
120
+
A CVE for software that isn't currently supported by vulnerability management still appears in the Weaknesses page. Because the software is not supported, only limited data is available. Exposed device information won't be available for CVEs with unsupported software.
102
121
103
122
To view a list of unsupported software, filter the weaknesses page by the "Not available" option in the "Exposed devices" section.
104
123
@@ -107,15 +126,15 @@ You can request for support to be added to Defender Vulnerability Management for
107
126
1. Select the CVE from the [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in the Microsoft Defender portal
108
127
2. Select **Please support this CVE** from the Vulnerability details tab
109
128
110
-
This request will be sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
129
+
The request is sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
111
130
112
131
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
113
132
114
133
## View Common Vulnerabilities and Exposures (CVE) entries in other places
115
134
116
135
### Top vulnerable software in the dashboard
117
136
118
-
1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You will see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
137
+
1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You'll see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
2. Select **Open device page** and select **Discovered vulnerabilities** from the device page.
143
162
3. Select the vulnerability you want to investigate.
144
163
145
-
A flyout will open and the **Detection logic** section shows the detection logic and source.
164
+
A flyout opens and the **Detection logic** section shows the detection logic and source.
146
165
147
-
:::image type="content" alt-text="Detection Logic example which lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
166
+
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
148
167
149
-
The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we'll only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
168
+
The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
150
169
151
170
## Report inaccuracy
152
171
153
-
Report a false positive when you see any vague, inaccurate, or incomplete information. You can also report on security recommendations that have already been remediated.
172
+
Report a false positive when you see any vague, inaccurate, or incomplete information. You can also report on security recommendations that are already been remediated.
154
173
155
174
1. Open the CVE on the Weaknesses page.
156
-
2. Select **Report inaccuracy** and a flyout pane will open.
175
+
2. Select **Report inaccuracy**.
157
176
3. From the flyout pane, choose an issue to report.
158
-
4. Fill in the requested details about the inaccuracy. This will vary depending on the issue you're reporting.
177
+
4. Fill in the requested details about the inaccuracy. This varies depending on the issue you're reporting.
159
178
5. Select **Submit**. Your feedback is immediately sent to the Microsoft Defender Vulnerability Management experts.
0 commit comments