You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-certificate-inventory.md
+14-12Lines changed: 14 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,9 @@ audience: ITPro
10
10
ms.collection:
11
11
- m365-security
12
12
- Tier1
13
-
ms.topic: conceptual
13
+
ms.topic: concept-article
14
14
search.appverid: met150
15
-
ms.date: 04/11/2022
15
+
ms.date: 03/06/2025
16
16
---
17
17
18
18
# Certificate inventory
@@ -49,18 +49,20 @@ The **Certificate inventory** lets you view a list of the certificates installed
49
49
50
50
## View your certificates
51
51
52
-
1.Go to **Vulnerability management** > **Software inventory**in the [Microsoft Defender portal](https://security.microsoft.com).
52
+
1.Sign in to the [Microsoft Defender portal](https://security.microsoft.com). Navigate to **Endpoints** > **Vulnerability management** > **Inventories**.
53
53
2. Select the **Certificates** tab.
54
54
55
-
The **Certificate inventory** page opens with a list of the certificates installed across your organization, including details on the expiration date, key size, who issued the certificate, and the number of instances.
55
+
The **Certificate inventory** page opens to an overview containing data visualizations of the number of certificates. with a list of the certificates installed across your organization, including details on the expiration date, key size, who issued the certificate, and the number of instances.
56
56
57
57
> [!NOTE]
58
-
> Only certificates found on Windows devices (in the local machine certificate store) will be displayed in certificate inventory list.
58
+
> Only certificates found on Windows devices (in the local machine certificate store) are displayed in certificate inventory list.
59
59
60
-
:::image type="content" source="/defender/media/defender-vulnerability-management/certificate_inventory.png" alt-text="Screenshot of the certificate inventory list." lightbox="/defender/media/defender-vulnerability-management/certificate_inventory.png":::
60
+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-cert-main-small.png" alt-text="Screenshot of the certificate inventory list." lightbox="/defender/media/defender-vulnerability-management/tvm-cert-main.png":::
61
61
62
62
## Gain insights into potentially vulnerable certificates
63
63
64
+
Navigate to the **All certificates** tab to view the list of certificates installed across your organization.
65
+
64
66
At the top of the page, you can view the number of certificates that have been identified as potentially less secure and introduce risk into your organization. This number includes certificates with the following issues:
65
67
66
68
- Expired.
@@ -73,17 +75,17 @@ At the top of the page, you can view the number of certificates that have been i
73
75
74
76
You can use filters to view the inventory based on:
75
77
76
-
-**Certificate status:** view the certificates that have expired, are expiring soon, are issued with a future date, or are current
78
+
-**Type:** view certificates that are root, intermediate, issued by a trusted publisher, machine certificates, or server certificates
79
+
-**Status:** view the certificates that have expired, are expiring soon, are issued with a future date, or are current
77
80
-**Self-signed:** view certificates that are self-signed
78
81
-**Key size:** view certificates that have a short key size or valid key size
79
82
-**Signature hash:** view certificates that have a weak signature hash or valid signature hash
80
-
-**Key usage:** view certificates with key usage values, such as digital signature, repudiation, and certificate signing
81
83
82
84
## Get more information on a discovered certificate
83
85
84
86
When you select the certificate that you want to investigate, a flyout panel opens with the certificate details page:
85
87
86
-
:::image type="content" source="/defender/media/defender-vulnerability-management/certificate_details.png" alt-text="Screenshot of the certificate details page" lightbox="/defender/media/defender-vulnerability-management/certificate_details.png":::
88
+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-cert-flyout-small.png" alt-text="Screenshot of the certificate details page" lightbox="/defender/media/defender-vulnerability-management/tvm-cert-flyout.png":::
87
89
88
90
You can select the **Issuing details** tab to see information on who the certificate was issued to and who it was issued by.
89
91
@@ -94,9 +96,9 @@ To see the list of the devices the certificate is installed on, choose the **Ins
94
96
You can also view a list of certificates installed on a device:
95
97
96
98
1. Select the device from the **Installed devices** tab in the flyout panel or select the device directly from the **Device inventory** page.
97
-
2.Select the **Certificate inventory** tab to see a list of certificates installed on that device.
99
+
2.In the device page, select the **Inventories** tab then choose **Certificates** to see a list of certificates installed on that device.
98
100
99
-
:::image type="content" source="/defender/media/defender-vulnerability-management/certificate_inventory_page.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/certificate_inventory_page.png":::
101
+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-cert-device-small.png" alt-text="Screenshot of the certificate inventory in a device page" lightbox="/defender/media/defender-vulnerability-management/tvm-cert-device.png":::
100
102
101
103
3. Select a certificate to open the flyout with more information.
102
104
@@ -110,7 +112,7 @@ Select **View all** to go to the certificate inventory page.
110
112
111
113
## Use advanced hunting
112
114
113
-
You can use advanced hunting queries to gain visibility on certificates in your organization. For example, using the **DeviceTvmCertificateInfo** table, you can query to show all expired certificates.
115
+
You can use advanced hunting queries to gain visibility on certificates in your organization. For example, using the [**DeviceTvmCertificateInfo**](/defender-xdr/advanced-hunting-devicetvmcertificateinfo-table) table, you can query to show all expired certificates.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-dashboard-insights.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,9 @@ ms.collection:
11
11
- m365-security
12
12
- tier1
13
13
ms.custom: admindeeplinkDEFENDER
14
-
ms.topic: conceptual
14
+
ms.topic: concept-article
15
15
search.appverid: met150
16
-
ms.date: 02/23/2025
16
+
ms.date: 03/06/2025
17
17
---
18
18
19
19
# Microsoft Defender Vulnerability Management dashboard
@@ -63,7 +63,7 @@ Watch this video for a quick overview of what is in the Defender Vulnerability M
63
63
|**Top vulnerable software**|Get real-time visibility into your organization's software inventory with a stack-ranked list of vulnerable software installed on your network's devices and how they impact your organizational exposure score. Select an item for details or **Show more** to see the rest of the vulnerable software list in the **Software inventory** page.|
64
64
|**Top remediation activities**|Track the remediation activities generated from the security recommendations. You can select each item on the list to see the details in the **Remediation** page or select **Show more** to view the rest of the remediation activities, and active exceptions.|
65
65
|**Top exposed devices**|View exposed device names and their exposure level. Select a device name from the list to go to the device page where you can view the alerts, risks, incidents, security recommendations, installed software, and discovered vulnerabilities associated with the exposed devices. Select **Show more** to see the rest of the exposed devices list. From the devices list, you can manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate device.|
66
-
|
66
+
|**Top events**|View the top events and the number of impacted devices in your organization in the last seven days. Select **Show more** to open the [Event timeline](threat-and-vuln-mgt-event-timeline.md) and view and filter all events, including new vulnerabilities, new exploitable vulnerabilities, and new configuration assessments.|
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-microsoft-secure-score-devices.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,9 @@ audience: ITPro
10
10
ms.collection:
11
11
- m365-security
12
12
- Tier1
13
-
ms.topic: conceptual
13
+
ms.topic: concept-article
14
14
search.appverid: met150
15
-
ms.date: 03/04/2022
15
+
ms.date: 03/06/2025
16
16
---
17
17
18
18
# Microsoft Secure Score for Devices
@@ -58,13 +58,13 @@ Improve your security configuration by remediating issues from the security reco
58
58
59
59
1. From the Microsoft Secure Score for Devices card in the Defender Vulnerability Management dashboard, select one of the categories. You'll view the list of recommendations related to that category. It will take you to the [**Security recommendations**](tvm-security-recommendation.md) page. If you want to see all security recommendations, once you get to the Security recommendations page, clear the search field.
60
60
61
-
2. Select an item on the list. The flyout panel will open with details related to the recommendation. Select **Remediation options**.
61
+
2. Select an item on the list. The flyout panel will open with details related to the recommendation. Select **Request remediation**.
62
62
63
63
:::image type="content" alt-text="Security controls related security recommendations." source="/defender/media/defender-vulnerability-management/security-controls.png":::
64
64
65
65
3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
66
66
67
-
4.**Submit request**. You'll see a confirmation message that the remediation task has been created.
67
+
4.Select **Submit**. You'll see a confirmation message that the remediation task has been created.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-remediation.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ audience: ITPro
10
10
ms.collection:
11
11
- m365-security
12
12
- Tier2
13
-
ms.topic: conceptual
13
+
ms.topic: concept-article
14
14
search.appverid: met150
15
15
ms.date: 02/23/2025
16
16
---
@@ -43,15 +43,15 @@ See [Use Intune to remediate vulnerabilities identified by Microsoft Defender fo
43
43
44
44
### Remediation request steps
45
45
46
-
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to the **Vulnerability management**, and then select [**Recommendations**](tvm-security-recommendation.md).
46
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to the **Endpoints** > **Vulnerability management**, and then select [**Recommendations**](tvm-security-recommendation.md).
47
47
48
-
2. Select a security recommendation you would like to request remediation for, and then select **Remediation options**.
48
+
2. Select a security recommendation you would like to request remediation for, and then select **Request remediation** in the flyout pane.
49
49
50
-
3. Fill out the form, including what you are requesting remediation for, applicable device groups, priority, due date, and optional notes.
50
+
3. Fill out the form, including what you are requesting remediation for, whether to open a ticket in Intune, priority, due date, and optional notes. Select Next.
51
51
52
-
If you choose the "attention required" remediation option, you can't select a due date because there's no specific action.
52
+
If you choose the **attention required** remediation option, you can't select a due date because there's no specific action.
53
53
54
-
4.Select **Submit request**. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. This action doesn't trigger a remediation or apply any changes to devices.
54
+
4.Review the details of your request then, select **Submit**. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. This action doesn't trigger a remediation or apply any changes to devices.
55
55
56
56
5. Notify your IT Administrator about the new request and have them log into Intune to approve or reject the request and start a package deployment. If you want to check how the ticket shows up in Intune, See [Use Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint](/mem/intune/protect/atp-manage-vulnerabilities) for details.
57
57
@@ -68,7 +68,7 @@ Lower your organization's exposure from vulnerabilities and increase your securi
68
68
69
69
When you submit a remediation request from the Security recommendations page, it kicks off a remediation activity. A security task is created that can be tracked on a **Remediation** page, and a remediation ticket is created in Microsoft Intune.
70
70
71
-
If you chose the "attention required" remediation option, there's no progress bar, ticket status, or due date since there's no actual action we can monitor.
71
+
If you chose the **attention required** remediation option, there's no progress bar, ticket status, or due date since there's no actual action we can monitor.
72
72
73
73
Once you are in the Remediation page, select the remediation activity that you want to view. You can follow the remediation steps, track progress, view the related recommendation, export to CSV, or mark as complete.
0 commit comments