Skip to content

Commit b5a71a2

Browse files
authored
Merge pull request #1448 from MicrosoftDocs/replaces-1368
Replaces 1368
2 parents 5515b15 + b93c9a9 commit b5a71a2

File tree

2 files changed

+16
-11
lines changed

2 files changed

+16
-11
lines changed

defender-endpoint/gov.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: deniseb
77
author: denisebmsft
88
ms.reviewer: jesquive
99
ms.localizationpriority: medium
10-
ms.date: 05/08/2024
10+
ms.date: 09/24/2024
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -182,6 +182,8 @@ These are the features and known gaps for [Mobile Threat Defense (Microsoft Defe
182182

183183
> [!NOTE]
184184
>
185-
> <sup>1</sup> The Defender Vulnerability Management Report inaccuracy functionality is not available for GCC, GCC High and DoD customers.
185+
> <sup>1</sup> The following Defender Vulnerability Management functionality is not available for GCC, GCC High and DoD customers:
186+
> - Report inaccuracy
187+
> - Request CVE support
186188
187189
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-vulnerability-management/tvm-weaknesses.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 07/31/2024
15+
ms.date: 09/24/2024
1616
---
1717

1818
# Vulnerabilities in my organization
@@ -81,7 +81,7 @@ If you select a CVE from the weaknesses page, a flyout panel opens with more inf
8181

8282
For each CVE, you can see a list of the exposed devices and the affected software.
8383

84-
## Exploit Prediction Scoring System (EPSS)
84+
## Exploit Prediction Scoring System (EPSS)
8585

8686
The Exploit Prediction Scoring System (EPSS) generates a data-driven score for the probability of a known software vulnerability being exploited in the wild. EPSS uses current threat information from the CVE and real-world exploit data. For each CVE, the EPSS model produces a probability score between 0 and 1 (0% and 100%). The higher the score, the greater the probability that a vulnerability will be exploited. Learn more about [EPSS](https://www.first.org/epss/).
8787

@@ -96,7 +96,7 @@ When the EPSS is greater than 0.9, the **Threats** column tooltip is updated wit
9696
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png" alt-text="Screenshot of the weaknesses epss score in the threat tooltip." lightbox="/defender/media/defender-vulnerability-management/tvm-weaknesses-epss-tip.png":::
9797

9898
> [!NOTE]
99-
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.
99+
> Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.
100100
101101
You can use the [Vulnerability API](/defender-endpoint/api/vulnerability) to see the EPSS score.
102102

@@ -126,17 +126,20 @@ You can request for support to be added to Defender Vulnerability Management for
126126
1. Select the CVE from the [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in the Microsoft Defender portal
127127
2. Select **Please support this CVE** from the Vulnerability details tab
128128

129-
The request is sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
129+
The request is sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
130130

131-
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
131+
> [!NOTE]
132+
> Request CVE support functionality is not available for GCC, GCC High and DoD customers.
133+
134+
:::image type="content" alt-text="Weakness flyout with support CVE button example." source="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png" lightbox="/defender/media/defender-vulnerability-management/weaknesses-support-cve.png":::
132135

133136
## View Common Vulnerabilities and Exposures (CVE) entries in other places
134137

135138
### Top vulnerable software in the dashboard
136139

137140
1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You'll see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
138141

139-
:::image type="content" alt-text="Top vulnerable software card." source="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png" lightbox="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png":::
142+
:::image type="content" alt-text="Top vulnerable software card." source="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png" lightbox="/defender/media/defender-vulnerability-management/tvm-top-vulnerable-software500.png":::
140143

141144
2. Select the software you want to investigate.
142145
3. Select the **Discovered vulnerabilities** tab.
@@ -161,9 +164,9 @@ To see the detection logic:
161164
2. Select **Open device page** and select **Discovered vulnerabilities** from the device page.
162165
3. Select the vulnerability you want to investigate.
163166

164-
A flyout opens and the **Detection logic** section shows the detection logic and source.
167+
A flyout opens and the **Detection logic** section shows the detection logic and source.
165168

166-
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
169+
:::image type="content" alt-text="Detection Logic example that lists the software detected on the device and the KBs." source="/defender/media/defender-vulnerability-management/tvm-cve-detection-logic.png":::
167170

168171
The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
169172

@@ -177,7 +180,7 @@ Report a false positive when you see any vague, inaccurate, or incomplete inform
177180
4. Fill in the requested details about the inaccuracy. This varies depending on the issue you're reporting.
178181
5. Select **Submit**. Your feedback is immediately sent to the Microsoft Defender Vulnerability Management experts.
179182

180-
:::image type="content" alt-text="Report inaccuracy options." source="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png" lightbox="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png":::
183+
:::image type="content" alt-text="Report inaccuracy options." source="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png" lightbox="/defender/media/defender-vulnerability-management/report-inaccuracy-software.png":::
181184

182185
## Related articles
183186

0 commit comments

Comments
 (0)