You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,8 +69,6 @@ To change the date range, select the **Date events occurred** filter above the t
69
69
70
70

71
71
72
-
In the Exposure management **Recommendations** page, hover over the **Score history** graph to view new security configuration assessments that affect your score.
73
-
74
72
If there are no events that affect your devices or your score for devices, no events are displayed.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-microsoft-secure-score-devices.md
+74-37Lines changed: 74 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: Microsoft Secure Score for Devices
3
3
description: Your score for devices shows the collective security configuration state of your devices across application, operating system, network, accounts, and security controls.
-[Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint)
26
-
-[Microsoft Defender XDR](/defender-xdr)
27
-
-[Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
30
+
Your devices secure score indicates how well your endpoints are protected against cybersecurity threats.
28
31
29
-
> [!NOTE]
30
-
> Configuration score is now part of vulnerability management as Microsoft Secure Score for Devices.
32
+
This article explains what the Microsoft Secure Score for devices is, how it works, and how you can improve your security configuration to reduce your vulnerability exposure.
33
+
34
+
## What is Microsoft Secure Score for devices?
31
35
32
-
Your score for devices is visible in the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) of the Microsoft Defender portal. A higher Microsoft Secure Score for Devices means your endpoints are more resilient from cybersecurity threat attacks. It reflects the collective security configuration state of your devices across the following categories:
36
+
The secure score reflects the collective security configuration state of your devices across the following categories:
33
37
34
38
- Application
35
39
- Operating system
36
40
- Network
37
41
- Accounts
38
42
- Security controls
39
43
40
-
Select a category to go to the [**Security recommendations**](tvm-security-recommendation.md) page and view the relevant recommendations.
44
+
The secure score is visible in different Microsoft Defender portal locations depending on your Microsoft Defender Vulnerability Management experience:
41
45
42
-
> [!TIP]
43
-
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
46
+
- If you're a **Microsoft Defender XDR + Microsoft Defender for Identity** preview customer, the secure score is visible under **Exposure management** > **Recommendations**.
47
+
- For existing customers, the secure score is visible under the **Microsoft Defender Vulnerability Management** dashboard. Select a category to go to the [**Security recommendations**](tvm-security-recommendation.md) page and view the relevant recommendations.
44
48
45
-
Unmanaged devices (devices not enrolled in management solutions like Intune or Azure AD) do count towards your Secure Score but are typically marked as non-compliant for several security checks. These devices may lower your score, especially if they fail critical security assessments such as anti-malware status, patch management, and encryption requirements. It's recommended to bring these devices under management to improve both security posture and Secure Score.
49
+
Unmanaged devices (devices not enrolled in management solutions like Intune or Azure AD) do count towards your Secure Score but are typically marked as non-compliant for several security checks. These devices may lower your score, especially if they fail critical security assessments such as anti-malware status, patch management, and encryption requirements. It's recommended to bring these devices under management to improve both security posture and secure score.
46
50
47
51
## How it works
48
52
49
53
> [!NOTE]
50
-
> Microsoft Secure Score for Devices currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management.
54
+
> Microsoft Secure Score for devices currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management.
51
55
52
-
The data in the Microsoft Secure Score for Devices card is the product of meticulous and ongoing vulnerability discovery process. It is aggregated with configuration discovery assessments that continuously:
56
+
The data in the Microsoft Secure Score for devices is the product of meticulous and ongoing vulnerability discovery process. It is aggregated with configuration discovery assessments that continuously:
53
57
54
58
- Compare collected configurations to the collected benchmarks to discover misconfigured assets
55
59
- Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction)
@@ -58,39 +62,72 @@ The data in the Microsoft Secure Score for Devices card is the product of meticu
58
62
59
63
## Improve your security configuration
60
64
61
-
Improve your security configuration by remediating issues from the security recommendations list. As you do so, your Microsoft Secure Score for Devices improves and your organization becomes more resilient against cybersecurity threats and vulnerabilities.
65
+
# [Preview customers](#tab/preview-customers)
62
66
63
-
1. From the Microsoft Secure Score for Devices card in the Defender Vulnerability Management dashboard, select one of the categories. You'll view the list of recommendations related to that category. It will take you to the [**Security recommendations**](tvm-security-recommendation.md) page. If you want to see all security recommendations, once you get to the Security recommendations page, clear the search field.
2. Select an item on the list. The flyout panel will open with details related to the recommendation. Select **Request remediation**.
69
+
Improve your security configuration by remediating issues from the security recommendations list. As you do so, your Microsoft Secure Score for devices improves and your organization becomes more resilient against cybersecurity threats and vulnerabilities.
70
+
71
+
1. Navigate to the **Exposure management > Recommendations** page.
72
+
1. Review the categories in the **Score breakdown** section.
73
+
1. Do one of the following:
74
+
- View all security recommendations in the recommendation list.
75
+
- To view recommendations by category, in the recommendations table, add the **Category** filter and select the category you want to address.
76
+
1. Select a recommendation. A flyout panel opens with details related to the recommendation. Select **Request remediation**.
66
77
67
78
:::image type="content" alt-text="Security controls related security recommendations." source="/defender/media/defender-vulnerability-management/security-controls.png":::
68
79
69
-
3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
80
+
1. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
70
81
71
-
4. Select **Submit**. You'll see a confirmation message that the remediation task has been created.
82
+
1. Select **Submit**. You'll see a confirmation message that the remediation task has been created.
5. Send a follow-up email to your IT Administrator and allow the time that you've allotted for the remediation to propagate in the system.
86
+
1. Send a follow-up email to your IT Administrator and allow the time that you've allotted for the remediation to propagate in the system.
87
+
88
+
1. Review the **Recommendations** page. You can expect the following outcome:
89
+
- In the **Score breakdown** area, the number of recommendations for the category you addressed decreases, compared to the percentage before remediation.
90
+
- The addressed recommendation is no longer listed in the recommendations table.
91
+
- Your **Devices Secure Score** increases compared to the percentage before remediation.
92
+
93
+
# [Existing customers](#tab/existing-customers)
94
+
95
+
Improve your security configuration by remediating issues from the security recommendations list. As you do so, your Microsoft Secure Score for devices improves and your organization becomes more resilient against cybersecurity threats and vulnerabilities.
96
+
97
+
1. In the **Endpoints** > **Vulnerability management** > **Dashboard**, locate the **Microsoft Secure Score for Devices** card.
98
+
1. Select one of the categories. The list of recommendations related to that category is visible in the [**Recommendations**](tvm-security-recommendation.md) page. If you want to see all security recommendations, in the **Recommendations** page, clear the search field.
99
+
1. Select an item on the list. A flyout panel opens with details related to the recommendation. Select **Request remediation**.
100
+
101
+
:::image type="content" alt-text="Security controls related security recommendations." source="/defender/media/defender-vulnerability-management/security-controls.png":::
102
+
103
+
1. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
104
+
105
+
1. Select **Submit**. You'll see a confirmation message that the remediation task has been created.
1. Send a follow-up email to your IT Administrator and allow the time that you've allotted for the remediation to propagate in the system.
110
+
111
+
1. Review the **Microsoft Secure Score for Devices** card again on the dashboard. The number of security controls recommendations will decrease. When you select **Security controls** to go back to the **Security recommendations** page, the item that you've addressed won't be listed there anymore. Your Microsoft Secure Score for Devices should increase.
112
+
113
+
---
114
+
115
+
## Download mandatory security updates
116
+
117
+
To boost your vulnerability assessment detection rates, download the following mandatory security updates and deploy them in your network:
6. Review the **Microsoft Secure Score for Devices** card again on the dashboard. The number of security controls recommendations will decrease. When you select **Security controls** to go back to the **Security recommendations** page, the item that you've addressed won't be listed there anymore. Your Microsoft Secure Score for Devices should increase.
124
+
To download the security updates:
78
125
79
-
> [!IMPORTANT]
80
-
> To boost your vulnerability assessment detection rates, download the following mandatory security updates and deploy them in your network:
-[Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
27
-
28
26
> [!NOTE]
29
27
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
30
28
@@ -44,32 +42,34 @@ When vulnerable network share configurations are identified, they're mapped to a
44
42
45
43
To see security recommendations addressing network share configurations:
46
44
47
-
1. Go to **Vulnerability management** > **Recommendations**.
:::image type="content" alt-text="Options for filtering on network shares" source="/defender/media/defender-vulnerability-management/network-share-filter.png" lightbox="/defender/media/defender-vulnerability-management/network-share-filter.png":::
50
+
:::image type="content" alt-text="Options for filtering on network shares" source="/defender/media/defender-vulnerability-management/network-share-filter.png":::
51
51
52
-
3. Select **Apply**.
52
+
1. Select **Apply**.
53
53
54
-
If there are network shares with vulnerabilities to address, they'll appear in the list of recommendations
54
+
If there are network shares with vulnerabilities to address, they'll appear in the list of recommendations.
Go to**Vulnerability management** > **Remediation**and filter by the remediation type, "configuration change" to see the activity item related to this change.
72
+
In the**Remediation**page, filter by the remediation type, "configuration change" to see the activity item related to this change.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-prerequisites.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,10 @@ To start a trial or to purchase Defender Vulnerability Management, see [Sign up
37
37
- Devices must be running a [Supported operating systems, platforms, and capabilities](tvm-supported-os.md) with available updates installed
38
38
- Devices must meet the minimum requirements for [Defender for Endpoint](/defender-endpoint/minimum-requirements)
39
39
40
+
## Microsoft Security Exposure Management requirements
41
+
42
+
For **Microsoft Defender XDR + Microsoft Defender for Identity** preview customers, Defender Vulnerability Management is now integrated with Microsoft Security Exposure Management. If you're using this preview experience, ensure you meet the [Security Exposure Management prerequisites](/security-exposure-management/prerequisites).
43
+
40
44
## Roles and permissions
41
45
42
46
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control](/defender-xdr/manage-rbac) (Unified RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.
0 commit comments