Skip to content

Commit a11521e

Browse files
authored
Merge pull request #5792 from limwainstein/msem-mdvm-updates-2
MDVM/MSEM integration updates - Batch 2: Additional pages and related…
2 parents 3d57231 + 88e4486 commit a11521e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+349
-261
lines changed

defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,6 @@ To change the date range, select the **Date events occurred** filter above the t
6969

7070
![Event timeline selected custom date range.](/defender/media/defender-vulnerability-management/event-timeline-drilldown.png)
7171

72-
In the Exposure management **Recommendations** page, hover over the **Score history** graph to view new security configuration assessments that affect your score.
73-
7472
If there are no events that affect your devices or your score for devices, no events are displayed.
7573

7674
# [Existing customers](#tab/existing-customers-secure-score)

defender-vulnerability-management/tvm-microsoft-secure-score-devices.md

Lines changed: 74 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Microsoft Secure Score for Devices
33
description: Your score for devices shows the collective security configuration state of your devices across application, operating system, network, accounts, and security controls.
44
ms.service: defender-vuln-mgmt
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: lwainstein
6+
author: limwainstein
77
ms.localizationpriority: medium
88
manager: deniseb
99
audience: ITPro
@@ -12,44 +12,48 @@ ms.collection:
1212
- Tier1
1313
ms.topic: article
1414
search.appverid: met150
15-
ms.date: 03/06/2025
15+
ms.date: 11/24/2025
16+
appliesto:
17+
- Microsoft Defender Vulnerability Management
18+
- Microsoft Defender for Endpoint Plan 2
19+
- Microsoft Defender XDR
20+
- Microsoft Defender for Servers Plan 1 & 2
1621
---
1722

1823
# Microsoft Secure Score for Devices
1924

2025
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
2126

22-
**Applies to:**
27+
> [!NOTE]
28+
> The configuration score is now part of the devices secure score.
2329
24-
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)
25-
- [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint)
26-
- [Microsoft Defender XDR](/defender-xdr)
27-
- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
30+
Your devices secure score indicates how well your endpoints are protected against cybersecurity threats.
2831

29-
> [!NOTE]
30-
> Configuration score is now part of vulnerability management as Microsoft Secure Score for Devices.
32+
This article explains what the Microsoft Secure Score for devices is, how it works, and how you can improve your security configuration to reduce your vulnerability exposure.
33+
34+
## What is Microsoft Secure Score for devices?
3135

32-
Your score for devices is visible in the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) of the Microsoft Defender portal. A higher Microsoft Secure Score for Devices means your endpoints are more resilient from cybersecurity threat attacks. It reflects the collective security configuration state of your devices across the following categories:
36+
The secure score reflects the collective security configuration state of your devices across the following categories:
3337

3438
- Application
3539
- Operating system
3640
- Network
3741
- Accounts
3842
- Security controls
3943

40-
Select a category to go to the [**Security recommendations**](tvm-security-recommendation.md) page and view the relevant recommendations.
44+
The secure score is visible in different Microsoft Defender portal locations depending on your Microsoft Defender Vulnerability Management experience:
4145

42-
> [!TIP]
43-
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
46+
- If you're a **Microsoft Defender XDR + Microsoft Defender for Identity** preview customer, the secure score is visible under **Exposure management** > **Recommendations**.
47+
- For existing customers, the secure score is visible under the **Microsoft Defender Vulnerability Management** dashboard. Select a category to go to the [**Security recommendations**](tvm-security-recommendation.md) page and view the relevant recommendations.
4448

45-
Unmanaged devices (devices not enrolled in management solutions like Intune or Azure AD) do count towards your Secure Score but are typically marked as non-compliant for several security checks. These devices may lower your score, especially if they fail critical security assessments such as anti-malware status, patch management, and encryption requirements. It's recommended to bring these devices under management to improve both security posture and Secure Score.
49+
Unmanaged devices (devices not enrolled in management solutions like Intune or Azure AD) do count towards your Secure Score but are typically marked as non-compliant for several security checks. These devices may lower your score, especially if they fail critical security assessments such as anti-malware status, patch management, and encryption requirements. It's recommended to bring these devices under management to improve both security posture and secure score.
4650

4751
## How it works
4852

4953
> [!NOTE]
50-
> Microsoft Secure Score for Devices currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management.
54+
> Microsoft Secure Score for devices currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management.
5155
52-
The data in the Microsoft Secure Score for Devices card is the product of meticulous and ongoing vulnerability discovery process. It is aggregated with configuration discovery assessments that continuously:
56+
The data in the Microsoft Secure Score for devices is the product of meticulous and ongoing vulnerability discovery process. It is aggregated with configuration discovery assessments that continuously:
5357

5458
- Compare collected configurations to the collected benchmarks to discover misconfigured assets
5559
- Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction)
@@ -58,39 +62,72 @@ The data in the Microsoft Secure Score for Devices card is the product of meticu
5862

5963
## Improve your security configuration
6064

61-
Improve your security configuration by remediating issues from the security recommendations list. As you do so, your Microsoft Secure Score for Devices improves and your organization becomes more resilient against cybersecurity threats and vulnerabilities.
65+
# [Preview customers](#tab/preview-customers)
6266

63-
1. From the Microsoft Secure Score for Devices card in the Defender Vulnerability Management dashboard, select one of the categories. You'll view the list of recommendations related to that category. It will take you to the [**Security recommendations**](tvm-security-recommendation.md) page. If you want to see all security recommendations, once you get to the Security recommendations page, clear the search field.
67+
[!INCLUDE [mdvm-msem-section](../includes/mdvm-msem-section.md)]
6468

65-
2. Select an item on the list. The flyout panel will open with details related to the recommendation. Select **Request remediation**.
69+
Improve your security configuration by remediating issues from the security recommendations list. As you do so, your Microsoft Secure Score for devices improves and your organization becomes more resilient against cybersecurity threats and vulnerabilities.
70+
71+
1. Navigate to the **Exposure management > Recommendations** page.
72+
1. Review the categories in the **Score breakdown** section.
73+
1. Do one of the following:
74+
- View all security recommendations in the recommendation list.
75+
- To view recommendations by category, in the recommendations table, add the **Category** filter and select the category you want to address.
76+
1. Select a recommendation. A flyout panel opens with details related to the recommendation. Select **Request remediation**.
6677

6778
:::image type="content" alt-text="Security controls related security recommendations." source="/defender/media/defender-vulnerability-management/security-controls.png":::
6879

69-
3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
80+
1. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
7081

71-
4. Select **Submit**. You'll see a confirmation message that the remediation task has been created.
82+
1. Select **Submit**. You'll see a confirmation message that the remediation task has been created.
7283

7384
:::image type="content" alt-text="Remediation task creation confirmation." source="/defender/media/defender-vulnerability-management/remediation-task-created.png":::
7485

75-
5. Send a follow-up email to your IT Administrator and allow the time that you've allotted for the remediation to propagate in the system.
86+
1. Send a follow-up email to your IT Administrator and allow the time that you've allotted for the remediation to propagate in the system.
87+
88+
1. Review the **Recommendations** page. You can expect the following outcome:
89+
- In the **Score breakdown** area, the number of recommendations for the category you addressed decreases, compared to the percentage before remediation.
90+
- The addressed recommendation is no longer listed in the recommendations table.
91+
- Your **Devices Secure Score** increases compared to the percentage before remediation.
92+
93+
# [Existing customers](#tab/existing-customers)
94+
95+
Improve your security configuration by remediating issues from the security recommendations list. As you do so, your Microsoft Secure Score for devices improves and your organization becomes more resilient against cybersecurity threats and vulnerabilities.
96+
97+
1. In the **Endpoints** > **Vulnerability management** > **Dashboard**, locate the **Microsoft Secure Score for Devices** card.
98+
1. Select one of the categories. The list of recommendations related to that category is visible in the [**Recommendations**](tvm-security-recommendation.md) page. If you want to see all security recommendations, in the **Recommendations** page, clear the search field.
99+
1. Select an item on the list. A flyout panel opens with details related to the recommendation. Select **Request remediation**.
100+
101+
:::image type="content" alt-text="Security controls related security recommendations." source="/defender/media/defender-vulnerability-management/security-controls.png":::
102+
103+
1. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
104+
105+
1. Select **Submit**. You'll see a confirmation message that the remediation task has been created.
106+
107+
:::image type="content" alt-text="Remediation task creation confirmation." source="/defender/media/defender-vulnerability-management/remediation-task-created.png":::
108+
109+
1. Send a follow-up email to your IT Administrator and allow the time that you've allotted for the remediation to propagate in the system.
110+
111+
1. Review the **Microsoft Secure Score for Devices** card again on the dashboard. The number of security controls recommendations will decrease. When you select **Security controls** to go back to the **Security recommendations** page, the item that you've addressed won't be listed there anymore. Your Microsoft Secure Score for Devices should increase.
112+
113+
---
114+
115+
## Download mandatory security updates
116+
117+
To boost your vulnerability assessment detection rates, download the following mandatory security updates and deploy them in your network:
118+
119+
- 19H1 customers | [KB 4512941](https://support.microsoft.com/help/4512941/windows-10-update-kb4512941)
120+
- RS5 customers | [KB 4516077](https://support.microsoft.com/help/4516077/windows-10-update-kb4516077)
121+
- RS4 customers | [KB 4516045](https://support.microsoft.com/help/4516045/windows-10-update-kb4516045)
122+
- RS3 customers | [KB 4516071](https://support.microsoft.com/help/4516071/windows-10-update-kb4516071)
76123

77-
6. Review the **Microsoft Secure Score for Devices** card again on the dashboard. The number of security controls recommendations will decrease. When you select **Security controls** to go back to the **Security recommendations** page, the item that you've addressed won't be listed there anymore. Your Microsoft Secure Score for Devices should increase.
124+
To download the security updates:
78125

79-
> [!IMPORTANT]
80-
> To boost your vulnerability assessment detection rates, download the following mandatory security updates and deploy them in your network:
81-
>
82-
> - 19H1 customers | [KB 4512941](https://support.microsoft.com/help/4512941/windows-10-update-kb4512941)
83-
> - RS5 customers | [KB 4516077](https://support.microsoft.com/help/4516077/windows-10-update-kb4516077)
84-
> - RS4 customers | [KB 4516045](https://support.microsoft.com/help/4516045/windows-10-update-kb4516045)
85-
> - RS3 customers | [KB 4516071](https://support.microsoft.com/help/4516071/windows-10-update-kb4516071)
86-
>
87-
> To download the security updates:
88-
>
89-
> 1. Go to [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/home.aspx).
90-
> 2. Key-in the security update KB number that you need to download, then click **Search**.
126+
1. Go to [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/home.aspx).
127+
2. Key-in the security update KB number that you need to download, then click **Search**.
91128

92129
## Related topics
93130

94131
- [Dashboard](tvm-dashboard-insights.md)
95132
- [Exposure score](tvm-exposure-score.md)
96-
- [Security recommendations](tvm-security-recommendation.md)
133+
- [Security recommendations](tvm-security-recommendation.md)

defender-vulnerability-management/tvm-network-share-assessment.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Network share configuration assessment
33
description: Learn review recommendations related to network shares in your environment through vulnerability management.
44
ms.service: defender-vuln-mgmt
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: lwainstein
6+
author: limwainstein
77
ms.localizationpriority: medium
88
manager: deniseb
99
audience: ITPro
@@ -12,19 +12,17 @@ ms.collection:
1212
- Tier2
1313
ms.topic: how-to
1414
search.appverid: met150
15-
ms.date: 03/01/2023
15+
ms.date: 11/24/2025
16+
appliesto:
17+
- Microsoft Defender Vulnerability Management
18+
- Microsoft Defender XDR
19+
- Microsoft Defender for Servers Plan 2
1620
---
1721

1822
# Network share configuration assessment
1923

2024
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
2125

22-
**Applies to:**
23-
24-
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)
25-
- [Microsoft Defender XDR](/defender-xdr)
26-
- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
27-
2826
> [!NOTE]
2927
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
3028
@@ -44,32 +42,34 @@ When vulnerable network share configurations are identified, they're mapped to a
4442

4543
To see security recommendations addressing network share configurations:
4644

47-
1. Go to **Vulnerability management** > **Recommendations**.
48-
2. Select **Filters** and choose **Related component** > **OS > Shares**.
45+
1. In the Microsoft Defender portal, do one of the following:
46+
- If you're a **Microsoft Defender XDR + Microsoft Defender for Identity** preview customer, select **Exposure management** > **Recommendations**.
47+
- If you're an existing customer, select **Endpoints** > **Vulnerability management** > **Recommendations**.
48+
1. Select **Filters** and choose **Related component** > **OS > Shares**.
4949

50-
:::image type="content" alt-text="Options for filtering on network shares" source="/defender/media/defender-vulnerability-management/network-share-filter.png" lightbox="/defender/media/defender-vulnerability-management/network-share-filter.png":::
50+
:::image type="content" alt-text="Options for filtering on network shares" source="/defender/media/defender-vulnerability-management/network-share-filter.png":::
5151

52-
3. Select **Apply**.
52+
1. Select **Apply**.
5353

54-
If there are network shares with vulnerabilities to address, they'll appear in the list of recommendations
54+
If there are network shares with vulnerabilities to address, they'll appear in the list of recommendations.
5555

5656
:::image type="content" alt-text="Network shares configuration recommendations" source="/defender/media/defender-vulnerability-management/network-share-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/network-share-recommendations.png":::
5757

58-
Select a recommendation to see a flyout with information on the vulnerable network share configuration:
58+
Select a recommendation to see a flyout pane with information on the vulnerable network share configuration:
5959

60-
:::image type="content" alt-text="Network shares configuration recommendation details" source="/defender/media/defender-vulnerability-management/network-share-recommendations-details.png" lightbox="/defender/media/defender-vulnerability-management/network-share-recommendations-details.png":::
60+
:::image type="content" alt-text="Network shares configuration recommendation details" source="/defender/media/defender-vulnerability-management/network-share-recommendations-details.png":::
6161

6262
Explore the **Exposed devices** and **Exposed shares** tabs for details of the exposed entities in your organization.
6363

6464
## Request remediation for the network share configuration
6565

6666
You can view and submit a remediation request from the remediation options tab:
6767

68-
:::image type="content" alt-text="Network shares configuration remediation options" source="/defender/media/defender-vulnerability-management/network-share-remediation.png" lightbox="/defender/media/defender-vulnerability-management/network-share-remediation.png":::
68+
:::image type="content" alt-text="Network shares configuration remediation options" source="/defender/media/defender-vulnerability-management/network-share-remediation.png":::
6969

7070
## View configuration remediation activities
7171

72-
Go to **Vulnerability management** > **Remediation** and filter by the remediation type, "configuration change" to see the activity item related to this change.
72+
In the **Remediation** page, filter by the remediation type, "configuration change" to see the activity item related to this change.
7373

7474
## Related articles
7575

defender-vulnerability-management/tvm-prerequisites.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,10 @@ To start a trial or to purchase Defender Vulnerability Management, see [Sign up
3737
- Devices must be running a [Supported operating systems, platforms, and capabilities](tvm-supported-os.md) with available updates installed
3838
- Devices must meet the minimum requirements for [Defender for Endpoint](/defender-endpoint/minimum-requirements)
3939

40+
## Microsoft Security Exposure Management requirements
41+
42+
For **Microsoft Defender XDR + Microsoft Defender for Identity** preview customers, Defender Vulnerability Management is now integrated with Microsoft Security Exposure Management. If you're using this preview experience, ensure you meet the [Security Exposure Management prerequisites](/security-exposure-management/prerequisites).
43+
4044
## Roles and permissions
4145

4246
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control](/defender-xdr/manage-rbac) (Unified RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.

0 commit comments

Comments
 (0)