You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-weaknesses.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- Tier1
13
13
ms.topic: conceptual
14
14
search.appverid: met150
15
-
ms.date: 07/31/2024
15
+
ms.date: 09/24/2024
16
16
---
17
17
18
18
# Vulnerabilities in my organization
@@ -81,7 +81,7 @@ If you select a CVE from the weaknesses page, a flyout panel opens with more inf
81
81
82
82
For each CVE, you can see a list of the exposed devices and the affected software.
83
83
84
-
## Exploit Prediction Scoring System (EPSS)
84
+
## Exploit Prediction Scoring System (EPSS)
85
85
86
86
The Exploit Prediction Scoring System (EPSS) generates a data-driven score for the probability of a known software vulnerability being exploited in the wild. EPSS uses current threat information from the CVE and real-world exploit data. For each CVE, the EPSS model produces a probability score between 0 and 1 (0% and 100%). The higher the score, the greater the probability that a vulnerability will be exploited. Learn more about [EPSS](https://www.first.org/epss/).
87
87
@@ -96,7 +96,7 @@ When the EPSS is greater than 0.9, the **Threats** column tooltip is updated wit
96
96
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png" alt-text="Screenshot of the weaknesses epss score in the threat tooltip." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png":::
97
97
98
98
> [!NOTE]
99
-
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.
99
+
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.
100
100
101
101
You can use the [Vulnerability API](/defender-endpoint/api/vulnerability) to see the EPSS score.
102
102
@@ -126,17 +126,20 @@ You can request for support to be added to Defender Vulnerability Management for
126
126
1. Select the CVE from the [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in the Microsoft Defender portal
127
127
2. Select **Please support this CVE** from the Vulnerability details tab
128
128
129
-
The request is sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
129
+
The request is sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
130
130
131
-
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
131
+
> [!NOTE]
132
+
> Request CVE support functionality is not available for GCC, GCC High and DoD customers.
133
+
134
+
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
132
135
133
136
## View Common Vulnerabilities and Exposures (CVE) entries in other places
134
137
135
138
### Top vulnerable software in the dashboard
136
139
137
140
1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You'll see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
2. Select **Open device page** and select **Discovered vulnerabilities** from the device page.
162
165
3. Select the vulnerability you want to investigate.
163
166
164
-
A flyout opens and the **Detection logic** section shows the detection logic and source.
167
+
A flyout opens and the **Detection logic** section shows the detection logic and source.
165
168
166
-
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
169
+
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
167
170
168
171
The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
169
172
@@ -177,7 +180,7 @@ Report a false positive when you see any vague, inaccurate, or incomplete inform
177
180
4. Fill in the requested details about the inaccuracy. This varies depending on the issue you're reporting.
178
181
5. Select **Submit**. Your feedback is immediately sent to the Microsoft Defender Vulnerability Management experts.
0 commit comments