Skip to content

Commit a7b3e58

Browse files
authored
Merge pull request #1450 from MicrosoftDocs/main
Publish main to live, Tuesday 10:30 AM PST, 09/24
2 parents d3f1e1f + b5a71a2 commit a7b3e58

17 files changed

+27
-16
lines changed

defender-endpoint/gov.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: deniseb
77
author: denisebmsft
88
ms.reviewer: jesquive
99
ms.localizationpriority: medium
10-
ms.date: 05/08/2024
10+
ms.date: 09/24/2024
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -182,6 +182,8 @@ These are the features and known gaps for [Mobile Threat Defense (Microsoft Defe
182182

183183
> [!NOTE]
184184
>
185-
> <sup>1</sup> The Defender Vulnerability Management Report inaccuracy functionality is not available for GCC, GCC High and DoD customers.
185+
> <sup>1</sup> The following Defender Vulnerability Management functionality is not available for GCC, GCC High and DoD customers:
186+
> - Report inaccuracy
187+
> - Request CVE support
186188
187189
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier2
1414
ms.localizationpriority: medium
1515
ms.topic: troubleshooting
16-
ms.date: 07/02/2024
16+
ms.date: 09/19/2024
1717
---
1818

1919
# Vulnerability support in Microsoft Defender Vulnerability Management
@@ -42,6 +42,8 @@ The following tables present the relevant vulnerability information organized by
4242
| 61457 | Fixed inaccurate detections in Mozilla Firefox | 03-Sept-24 |
4343
| - | Fixed inaccuracy in Microsoft Visual Studio 2015 | 03-Sept-24 |
4444
| - | Fixed inaccurate detections in Microsoft Teams by excluding downloads file path | 08-Sept-24 |
45+
| - | Fixed inaccuracy in Suse Kernel-Default-Devel | 09-Sept-24 |
46+
| 73287 | Fixed inaccuracy in CVE-2024-2800 | 09-Sept-24 |
4547
| - | Fixed inaccuracy in Python vulnerability - CVE-2024-7592 | 10-Sept-24 |
4648
| 54061 | Defender Vulnerability Management doesn't currently support Flock | 10-Sept-24 |
4749
| 68097 | Fixed inaccuracy in OpenSSL vulnerabilities - CVE-2024-4603, CVE-2024-4741 & CVE-2024-5535 | 10-Sept-24 |
@@ -54,6 +56,10 @@ The following tables present the relevant vulnerability information organized by
5456
| 71626 | Fixed inaccuracy in MongoDB vulnerability - CVE-2024-7553 | 10-Sept-24 |
5557
| - | Fixed inaccuracy in Cisco Anyconnect Secure Mobility Client vulnerabilities - CVE-2023-20241 & CVE-2023-20240 | 10-Sept-24 |
5658
| - | Fixed inaccuracy in Plantronics vulnerability - CVE-2024-27460 | 10-Sept-24 |
59+
| 72402 | Fixed inaccurate detections in FileZilla by excluding server.app path | 10-Sept-24 |
60+
| - | Added Microsoft Defender Vulnerability Management support to Kusto Explorer | 11-Sept-24 |
61+
| - | Fixed bad detections in Greenshot | 11-Sept-24 |
62+
| 71056 | Fixed inaccuracy in ExpressVPN | 11-Sept-24 |
5763

5864

5965
## August 2024

defender-vulnerability-management/tvm-weaknesses.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 07/31/2024
15+
ms.date: 09/24/2024
1616
---
1717

1818
# Vulnerabilities in my organization
@@ -81,7 +81,7 @@ If you select a CVE from the weaknesses page, a flyout panel opens with more inf
8181

8282
For each CVE, you can see a list of the exposed devices and the affected software.
8383

84-
## Exploit Prediction Scoring System (EPSS)
84+
## Exploit Prediction Scoring System (EPSS)
8585

8686
The Exploit Prediction Scoring System (EPSS) generates a data-driven score for the probability of a known software vulnerability being exploited in the wild. EPSS uses current threat information from the CVE and real-world exploit data. For each CVE, the EPSS model produces a probability score between 0 and 1 (0% and 100%). The higher the score, the greater the probability that a vulnerability will be exploited. Learn more about [EPSS](https://www.first.org/epss/).
8787

@@ -96,7 +96,7 @@ When the EPSS is greater than 0.9, the **Threats** column tooltip is updated wit
9696
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png" alt-text="Screenshot of the weaknesses epss score in the threat tooltip." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png":::
9797

9898
> [!NOTE]
99-
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.
99+
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.
100100
101101
You can use the [Vulnerability API](/defender-endpoint/api/vulnerability) to see the EPSS score.
102102

@@ -126,17 +126,20 @@ You can request for support to be added to Defender Vulnerability Management for
126126
1. Select the CVE from the [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in the Microsoft Defender portal
127127
2. Select **Please support this CVE** from the Vulnerability details tab
128128

129-
The request is sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
129+
The request is sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
130130

131-
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
131+
> [!NOTE]
132+
> Request CVE support functionality is not available for GCC, GCC High and DoD customers.
133+
134+
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
132135

133136
## View Common Vulnerabilities and Exposures (CVE) entries in other places
134137

135138
### Top vulnerable software in the dashboard
136139

137140
1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You'll see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
138141

139-
:::image type="content" alt-text="Top vulnerable software card." source="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png" lightbox="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png":::
142+
:::image type="content" alt-text="Top vulnerable software card." source="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png" lightbox="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png":::
140143

141144
2. Select the software you want to investigate.
142145
3. Select the **Discovered vulnerabilities** tab.
@@ -161,9 +164,9 @@ To see the detection logic:
161164
2. Select **Open device page** and select **Discovered vulnerabilities** from the device page.
162165
3. Select the vulnerability you want to investigate.
163166

164-
A flyout opens and the **Detection logic** section shows the detection logic and source.
167+
A flyout opens and the **Detection logic** section shows the detection logic and source.
165168

166-
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
169+
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
167170

168171
The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
169172

@@ -177,7 +180,7 @@ Report a false positive when you see any vague, inaccurate, or incomplete inform
177180
4. Fill in the requested details about the inaccuracy. This varies depending on the issue you're reporting.
178181
5. Select **Submit**. Your feedback is immediately sent to the Microsoft Defender Vulnerability Management experts.
179182

180-
:::image type="content" alt-text="Report inaccuracy options." source="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png" lightbox="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png":::
183+
:::image type="content" alt-text="Report inaccuracy options." source="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png" lightbox="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png":::
181184

182185
## Related articles
183186

defender-xdr/copilot-in-defender-device-summary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ You can access the device summary capability through the following ways:
5353

5454
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot of the device summary results in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page.png":::
5555

56-
- From an incident page, you can choose a device on the incident graph and then select **Device details** (1). On the device pane, select **Summarize** (2) to generate the device summary. The summary is displayed in the Copilot pane.
56+
- From an incident page, you can choose a device on the incident graph and then (1) select **Device details**. On the device pane, (2) select **Summarize** to generate the device summary. The summary is displayed in the Copilot pane.
5757

5858
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot highlighting the steps to access the device summary in an incident page in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png":::
5959

defender-xdr/security-copilot-defender-identity-summary.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,21 +51,21 @@ You can access the identity summary capability in the following ways:
5151

5252
- From an incident page, choose an identity on the incident graph and then (1) select **User details**. In the user details pane, (2) select **Summarize**. The results are displayed in the Copilot side panel.
5353

54-
:::image type="content" source="/defender/media/copilot-in-defender/identity-summary/identity-incident-graph-small.png" alt-text="Screenshot showing the Summarize option in the user details pane." lightbox="/defender/media/copilot-in-defender/identity-summary/identity-incident-graph.png":::
54+
:::image type="content" source="/defender/media/copilot-in-defender/identity-summary/identity-summary-incident-small.png" alt-text="Screenshot showing the Summarize option in the user details pane." lightbox="/defender/media/copilot-in-defender/identity-summary/identity-summary-incident.png":::
5555

5656
- Alternatively, you can select **Go to user page** on the bottom of the user details pane to open the user page. Copilot automatically generates the identity summary and displays the side panel upon opening the user page.
5757

5858
- You can also access the identity summary capability by choosing a user in the **Assets** tab of an incident. Select **Summarize** in the user details pane to generate the identity summary.
5959

60-
:::image type="content" source="/defender/media/copilot-in-defender/identity-summary/identity-assets-small.png" alt-text="Screenshot showing the Assets tab and a user account highlighted." lightbox="/defender/media/copilot-in-defender/identity-summary/identity-assets.png":::
60+
:::image type="content" source="/defender/media/copilot-in-defender/identity-summary/identity-summary-assets-small.png" alt-text="Screenshot showing the Assets tab and a user account highlighted." lightbox="/defender/media/copilot-in-defender/identity-summary/identity-summary-assets.png":::
6161

6262
- In an alert page, select a user then select **Summarize** in the user details pane to generate the identity summary.
6363

6464
- In the advanced hunting page, you can access the identity summary capability by selecting a user in the results table, then selecting the link to the user page. Copilot automatically generates the identity summary and displays the side panel upon opening the user page.
6565

6666
- From the main menu, navigate to **Assets > Identities**. Select a username from the list, then select **View user page** to open the user page. Copilot automatically generates the identity summary and displays the side panel upon opening the user page.
6767

68-
:::image type="content" source="/defender/media/copilot-in-defender/identity-summary/identity-identities-small.png" alt-text="Screenshot highlighting the view user page option in an username search within Identities." lightbox="/defender/media/copilot-in-defender/identity-summary/identity-identities.png":::
68+
:::image type="content" source="/defender/media/copilot-in-defender/identity-summary/identity-summary-viewuser-small.png" alt-text="Screenshot highlighting the view user page option in an username search within Identities." lightbox="/defender/media/copilot-in-defender/identity-summary/identity-summary-viewuser.png":::
6969

7070
- Type a username in the Microsoft Defender portal’s **search box** then select the username from the search results. In the user details side panel, select **Summarize** to generate the identity summary.
7171

-140 KB
Binary file not shown.
-440 KB
Binary file not shown.
-49.3 KB
Binary file not shown.
-143 KB
Binary file not shown.
-222 KB
Binary file not shown.

0 commit comments

Comments
 (0)