Home
%3CLINGO-SUB%20id%3D%22lingo-sub-400910%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20risk-based%20approach%20to%20threat%20and%20vulnerability%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-400910%22%20slang%3D%22en-US%22%3E%3CP%3EI%20agree%20with%20Taslet.%20We%20have%20several%20one-stop%20overviews%20of%20security%20between%20Azure%2C%20WDATP%2FMDATP%2C%20and%20O365.%20Some%20of%20them%20overlap%20features%20with%20other%2C%20and%20some%20features%20get%20orphaned%20when%20consoles%20get%20reorganized.%20I%20love%20the%20direction%20MS%20is%20going%20with%20delivering%20value%20for%20telemetry%20we%20are%20already%20sending.%20The%20tiering%20and%20the%20product%20sales%20structure%20are%20getting%20in%20the%20way%20of%20operational%20management%2C%20though.%20But%20I'm%20a%20big%20fan%20of%20the%20feature%20announced%20in%20the%20original%20post%20here%20-%20it%20is%20very%20welcome!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-393580%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20risk-based%20approach%20to%20threat%20and%20vulnerability%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-393580%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EJust%20curious%20to%20know%20how%20this%20will%20get%20integrated%20with%20Azure%20environment%2C%20ASC%20(Azure%20Security%20Center)%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Edashboards%20to%20have%20a%20single%20view%20of%20security%20posture.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-393574%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20risk-based%20approach%20to%20threat%20and%20vulnerability%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-393574%22%20slang%3D%22en-US%22%3E%3CP%3EJust%20curious%20to%20know%20how%20this%20will%20get%20integrated%20with%20Azure%20environment%2C%20ACP%20dashboards%20to%20have%20a%20single%20view%20of%20security%20posture.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-388807%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20risk-based%20approach%20to%20threat%20and%20vulnerability%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-388807%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20197px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F100135iB6BAD0939147D987%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22c-montgomery-burns_197x282.jpg%22%20title%3D%22c-montgomery-burns_197x282.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-388520%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20risk-based%20approach%20to%20threat%20and%20vulnerability%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-388520%22%20slang%3D%22en-US%22%3E%3CP%3EStill%20waiting%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-386979%22%20slang%3D%22en-US%22%3ERE%3A%20Introducing%20a%20risk-based%20approach%20to%20threat%20and%20vulnerability%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-386979%22%20slang%3D%22en-US%22%3EI%20can't%20wait%20for%20this.%20It%20looks%20very%20interesting.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-377845%22%20slang%3D%22en-US%22%3EIntroducing%20a%20risk-based%20approach%20to%20threat%20and%20vulnerability%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-377845%22%20slang%3D%22en-US%22%3E%3CP%3EWe%E2%80%99re%20delighted%20to%20announce%20%3CSTRONG%3EThreat%20and%20Vulnerability%20Management%3C%2FSTRONG%3E%2C%20a%20new%20built-in%20capability%20that%20uses%20a%20risk-based%20approach%20to%20the%20discovery%2C%20prioritization%2C%20and%20remediation%20of%20endpoint%20vulnerabilities%20and%20misconfigurations.%20This%20capability%20is%20coming%20to%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%2C%20our%20industry-leading%20unified%20endpoint%20security%20platform%20with%20an%20updated%20name%20that%20reflects%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmdatp-for-mac%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Enewly%20announced%20expanded%20coverage%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEffectively%20identifying%2C%20assessing%2C%20and%20remediating%20endpoint%20weaknesses%20is%20pivotal%20in%20running%20a%20healthy%20security%20program%20and%20reducing%20organizational%20risk.%20Threat%20%26amp%3B%20Vulnerability%20Management%20serves%20as%20an%20infrastructure%20for%20reducing%20organizational%20exposure%2C%20hardening%20endpoint%20surface%20area%2C%20and%20increasing%20organizational%20resilience.%20Furthermore%2C%20it%20bridges%20security%20stakeholders%E2%80%94security%20administrators%2C%20security%20operations%2C%20and%20IT%20administrators%E2%80%94by%20allowing%20them%20to%20collaborate%20and%20seamlessly%20remediate%20threats.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThreat%20%26amp%3B%20Vulnerability%20Management%20is%20a%20new%20component%20of%20Microsoft%20Defender%20ATP%2C%20and%20provides%20both%20security%20administrators%20and%20security%20operations%20teams%20with%20unique%20value%2C%20including%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EReal-time%20endpoint%20detection%20and%20response%20(EDR)%20insights%20correlated%20with%20endpoint%20vulnerabilities%3C%2FLI%3E%0A%3CLI%3EInvaluable%20machine%20vulnerability%20context%20during%20incident%20investigations%3C%2FLI%3E%0A%3CLI%3EBuilt-in%20remediation%20processes%20through%20Microsoft%20Intune%20and%20Microsoft%20System%20Center%20Configuration%20Manager%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FJuSm8adfYaY%253Ffeature%253Doembed%26amp%3Burl%3Dhttp%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DJuSm8adfYaY%26amp%3Bimage%3Dhttps%253A%252F%252Fi.ytimg.com%252Fvi%252FJuSm8adfYaY%252Fhqdefault.jpg%26amp%3Bkey%3Db0d40caa4f094c68be7c29880b16f56e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22600%22%20height%3D%22337%22%20scrolling%3D%22no%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%20title%3D%22Video%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1702823765%22%20id%3D%22toc-hId-1702823765%22%20id%3D%22toc-hId-1702823765%22%3EHow%20this%20new%20Threat%20%26amp%3B%20Vulnerability%20Management%20changes%20the%20game%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20Threat%20%26amp%3B%20Vulnerability%20Management%20in%20Microsoft%20Defender%20ATP%2C%20we%20are%20introducing%20a%20new%20set%20of%20advanced%2C%20agentless%2C%20cloud-powered%20capabilities%20that%20provide%20continuous%2C%20real-time%2C%20risk-based%20vulnerability%20management.%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1045846701%22%20id%3D%22toc-hId--1045846701%22%20id%3D%22toc-hId--1045846701%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-696963634%22%20id%3D%22toc-hId-696963634%22%20id%3D%22toc-hId-696963634%22%3EReal-time%20discovery%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20discover%20endpoint%20vulnerabilities%20and%20misconfiguration%2C%20Threat%20%26amp%3B%20Vulnerability%20Management%20uses%20the%20same%20agentless%20built-in%20Microsoft%20Defender%20ATP%20sensors%20to%20reduce%20cumbersome%20network%20scans%20and%20IT%20overhead%2C%20and%20provides%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EReal-time%20device%20inventory.%3C%2FSTRONG%3E%20Devices%20onboarded%20to%20Microsoft%20Defender%20ATP%20automatically%20report%20and%20push%20vulnerability%20and%20security%20configuration%20data%20to%20the%20dashboard.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EVisibility%20into%20software%20and%20vulnerabilities.%3C%2FSTRONG%3E%20Optics%20into%20the%20organization%E2%80%99s%20software%20inventory%2C%20as%20well%20as%20software%20changes%20like%20installations%2C%20uninstallations%2C%20and%20patches.%20Newly%20discovered%20vulnerabilities%20are%20reported%20with%20actionable%20mitigation%20recommendations%20for%201%3CSUP%3Est%3C%2FSUP%3E%20and%203%3CSUP%3Erd%3C%2FSUP%3E%20party%20applications.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EApplication%20runtime%20context.%3C%2FSTRONG%3E%20Constant%20visibility%20into%20application%20usage%20patterns%20for%20better%20prioritization%20and%20decision-making.%20Critical%20dependencies%2C%20such%20as%20vulnerable%20runtime%20libraries%20being%20loaded%20by%20other%20applications%2C%20are%20made%20visible.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EConfiguration%20posture.%3C%2FSTRONG%3E%20Visibility%20into%20organizational%20security%20configuration%2C%20surfacing%20issues%20like%20disabled%20antivirus%2C%20enabled%20SMBv1%2C%20or%20misconfigurations%20that%20could%20allow%20escalation%20of%20privileges.%20Issues%20are%20reported%20in%20the%20dashboard%20with%20actionable%20security%20recommendations.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH3%20id%3D%22toc-hId--1855193327%22%20id%3D%22toc-hId--1855193327%22%20id%3D%22toc-hId--1855193327%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--112382992%22%20id%3D%22toc-hId--112382992%22%20id%3D%22toc-hId--112382992%22%3EIntelligence-driven%20prioritization%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThreat%20%26amp%3B%20Vulnerability%20Management%20helps%20customers%20prioritize%20and%20focus%20on%20those%20weaknesses%20that%20pose%20the%20most%20urgent%20and%20the%20highest%20risk%20to%20the%20organization.%20Rather%20than%20using%20static%20prioritization%20by%20severity%20scores%2C%20Threat%20%26amp%3B%20Vulnerability%20Management%20in%20Microsoft%20Defender%20ATP%20highlights%20the%20most%20critical%20weaknesses%20that%20need%20attention%20by%20fusing%20its%20security%20recommendations%20with%20dynamic%20threat%20and%20business%20context%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EExposing%20emerging%20attacks%20in%20the%20wild.%3C%2FSTRONG%3E%20Through%20its%20advanced%20cyber%20data%20and%20threat%20analytics%20platform%2C%20Threat%20%26amp%3B%20Vulnerability%20Management%20dynamically%20aligns%20the%20prioritization%20of%20its%20security%20recommendations%20to%20focus%20on%20vulnerabilities%20that%20are%20currently%20being%20exploited%20in%20the%20wild%20and%20emerging%20threats%20that%20pose%20the%20highest%20risk.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EPinpointing%20active%20breaches.%20%3C%2FSTRONG%3EMicrosoft%20Defender%20ATP%20correlates%20Threat%20%26amp%3B%20Vulnerability%20Management%20and%20EDR%20insights%20to%20provide%20the%20unique%20ability%20to%20prioritize%20vulnerabilities%20that%20are%20currently%20being%20exploited%20in%20an%20active%20breach%20within%20the%20organization.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EProtecting%20high-value%20assets.%3C%2FSTRONG%3E%20Microsoft%20Defender%20ATP%E2%80%99s%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F17%2Fwindows-defender-atp-integrates-with-microsoft-information-protection-to-discover-protect-and-monitor-sensitive-data-on-windows-devices%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eintegration%20with%20Azure%20Information%20Protection%3C%2FA%3E%20allows%20Threat%20%26amp%3B%20Vulnerability%20Management%20to%20call%20attention%20to%20exposed%20machines%20with%20business-critical%20applications%2C%20confidential%20data%2C%20or%20high-value%20users.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH3%20id%3D%22toc-hId-1630427343%22%20id%3D%22toc-hId-1630427343%22%20id%3D%22toc-hId-1630427343%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--921729618%22%20id%3D%22toc-hId--921729618%22%20id%3D%22toc-hId--921729618%22%3ESeamless%20remediation%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%E2%80%99s%20Threat%20%26amp%3B%20Vulnerability%20Management%20allows%20security%20administrators%20and%20IT%20administrators%20to%20collaborate%20seamlessly%20to%20remediate%20issues.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EOne-click%20remediation%20requests%20to%20IT.%3C%2FSTRONG%3E%20Through%20Microsoft%20Defender%20ATP%E2%80%99s%20integration%20with%20Microsoft%20Intune%20and%20System%20Center%20Configuration%20Manager%20(SCCM)%2C%20security%20administrators%20can%20create%20a%20remediation%20task%20in%20Microsoft%20Intune%20with%20one%20click.%20We%20plan%20to%20expand%20this%20capability%20to%20other%20IT%20security%20management%20platforms.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EAlternate%20mitigations.%3C%2FSTRONG%3E%20Threat%20%26amp%3B%20Vulnerability%20Management%20provides%20insights%20on%20additional%20mitigations%2C%20such%20as%20configuration%20changes%20that%20can%20reduce%20risk%20associated%20with%20software%20vulnerabilities.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EReal-time%20remediation%20status.%3C%2FSTRONG%3E%20Microsoft%20Defender%20ATP%20provides%20real-time%20monitoring%20of%20the%20status%20and%20progress%20of%20remediation%20activities%20across%20the%20organization.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH2%20id%3D%22toc-hId-1017594222%22%20id%3D%22toc-hId-1017594222%22%20id%3D%22toc-hId-1017594222%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1534562739%22%20id%3D%22toc-hId--1534562739%22%20id%3D%22toc-hId--1534562739%22%3EHow%20Microsoft%20Defender%20ATP%E2%80%99s%20Threat%20%26amp%3B%20Vulnerability%20Management%20works%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20designed%20Threat%20%26amp%3B%20Vulnerability%20Management%20with%20the%20primary%20goal%20of%20helping%20organizations%20reduce%20exposure%20to%20threats%20and%20increase%20organizational%20resilience.%20To%20do%20this%2C%20we%E2%80%99re%20introducing%20two%20new%20metrics%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EExposure%20score%3C%2FSTRONG%3E%20reflects%20the%20current%20exposure%20associated%20with%20devices%20in%20the%20organization%20based%20on%20dynamic%20vulnerabilities%2C%20threat%2C%20and%20business%20context.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EConfiguration%20score%3C%2FSTRONG%3E%20shows%20the%20collective%20security%20configuration%20posture%20of%20devices%20based%20on%20security%20best%20practices.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Threat%20%26amp%3B%20Vulnerability%20Management%20dashboard%20provides%20real-time%20visual%20of%20these%20scores%2C%20which%20are%20continuously%20assessed%20based%20on%20environmental%20changes.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F94050i6031CA082C3FA2F3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%221_scored.jpg%22%20title%3D%221_scored.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20weaknesses%20identified%20in%20the%20environment%20are%20mapped%20to%20actionable%20security%20recommendations%20and%20prioritized%20by%20their%20impact%20on%20the%20organizational%20exposure%20score.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F94051i8DF2148F5BF6A620%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%222_recommendations.jpg%22%20title%3D%222_recommendations.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEach%20security%20recommendation%20includes%20an%20actionable%20remediation%20recommendation%2C%20which%20can%20be%20pushed%20into%20the%20IT%20task%20queue%20through%20a%20built-in%20integration%20with%20Microsoft%20Intune%20and%20SCCM.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F94052i022DCFCF085D989B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%223_recommendation_side_panel.jpg%22%20title%3D%223_recommendation_side_panel.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20status%20and%20progress%20of%20these%20remediation%20activities%20can%20be%20monitored%20through%20the%20dashboard.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20434px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F94053iE7A75BAEAE87CC1B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%224_Remediation_tasks.jpg%22%20title%3D%224_Remediation_tasks.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThreat%20%26amp%3B%20Vulnerability%20Management%20also%20provides%20real-time%20visibility%20into%20the%20software%20inventory%2C%20with%20important%20information%20like%20vulnerabilities%20associated%20with%20software%20versions%20installed%20on%20devices%2C%20related%20exploits%20and%20threats%2C%20and%20impact%20to%20exposure%20score.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F94054i08C04FEA4F0292C5%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%225_Software%20inventory.jpg%22%20title%3D%225_Software%20inventory.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20pivoting%20to%20a%20specific%20machine%2C%20Threat%20%26amp%3B%20Vulnerability%20Management%20provides%20machine%20exposure%20level%2C%20security%20recommendations%2C%20vulnerabilities%20identified%20on%20the%20machine%2C%20and%20other%20critical%20information.%20This%20data%2C%20together%20with%20alerts%20and%20incidents%20data%20provides%20security%20operations%20with%20a%20much%20clearer%20picture%20during%20incident%20investigations.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F94055i970AB8AE8A94715B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%227_1%20-%20007g%20-%20Machine.jpg%22%20title%3D%227_1%20-%20007g%20-%20Machine.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-208247596%22%20id%3D%22toc-hId-208247596%22%20id%3D%22toc-hId-208247596%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1458632800%22%20id%3D%22toc-hId--1458632800%22%20id%3D%22toc-hId--1458632800%22%3EPreview%20available%20soon%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThreat%20%26amp%3B%20Vulnerability%20Management%20is%20just%20the%20latest%20innovation%20to%20be%20added%20to%20Microsoft%20Defender%20ATP%2C%20which%20continues%20to%20evolve%20to%20provide%20customers%20with%20powerful%2C%20real-time%2C%20and%20integrated%20means%20to%20discover%2C%20prioritize%2C%20and%20remediate%20threats.%20Customers%20who%20have%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-atp%2Fpreview-windows-defender-advanced-threat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eturned%20on%20Microsoft%20Defender%20ATP%20preview%20features%3C%2FA%3E%20will%20see%20this%20game-changing%20capability%20in%20their%20dashboard%20within%20the%20next%20month.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENot%20yet%20enjoying%20the%20benefits%20of%20Microsoft%20Defender%20ATP%E2%80%99s%20%3CA%20href%3D%22https%3A%2F%2Fcloudblogs.microsoft.com%2Fmicrosoftsecure%2F2018%2F12%2F03%2Finsights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eindustry-leading%20optics%20and%20detection%20capabilities%3C%2FA%3E%3F%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fwindowsforbusiness%2Fwindows-atp%3Focid%3Dcx-blog-mmpc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESign%20up%20for%20free%20trial%3C%2FA%3E%3CSPAN%3E%20today.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20inherit%3B%20font-family%3A%20inherit%3B%20font-size%3A%2024px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20normal%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.2%3B%20margin-bottom%3A%2012px%3B%20margin-top%3A%2024px%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20id%3D%22toc-hId-284177535%22%20id%3D%22toc-hId-284177535%22%20id%3D%22toc-hId-284177535%22%3EUpdate%20(July%202%2C%202019)%3A%20General%20availability%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3EAs%20of%20June%2030%2C%202019%2C%20Threat%20%26amp%3B%20Vulnerability%20Management%20is%20generally%20available.%20Read%20the%20announcement%3A%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F07%2F02%2Fmicrosofts-threat-vulnerability-management-now-helps-thousands-of-customers-to-discover-prioritize-and-remediate-vulnerabilities-in-real-time%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EMicrosoft%E2%80%99s%20Threat%20%26amp%3B%20Vulnerability%20Management%20now%20helps%20thousands%20of%20customers%20to%20discover%2C%20prioritize%2C%20and%20remediate%20vulnerabilities%20in%20real%20time%3C%2FSTRONG%3E%3C%2FA%3E%3CEM%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20italic%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3E.%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EMicrosoft%20Defender%20ATP%20team%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-377845%22%20slang%3D%22en-US%22%3E%3CP%3EWe%E2%80%99re%20delighted%20to%20announce%20%3CSTRONG%3EThreat%20and%20Vulnerability%20Management%3C%2FSTRONG%3E%2C%20a%20new%20built-in%20capability%20that%20uses%20a%20risk-based%20approach%20to%20the%20discovery%2C%20prioritization%2C%20and%20remediation%20of%20endpoint%20vulnerabilities%20and%20misconfigurations.%20This%20capability%20is%20coming%20to%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%2C%20our%20industry-leading%20unified%20endpoint%20security%20platform%20with%20an%20updated%20name%20that%20reflects%20the%20newly%20announced%20expanded%20coverage.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F93985i7255288ECA563727%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%220_teaser.jpg%22%20title%3D%220_teaser.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-738530%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20risk-based%20approach%20to%20threat%20and%20vulnerability%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-738530%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20looks%20like%20a%20great%20addition%20to%20the%20product!%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

We’re delighted to announce Threat and Vulnerability Management, a new built-in capability that uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. This capability is coming to Microsoft Defender Advanced Threat Protection (ATP), our industry-leading unified endpoint security platform with an updated name that reflects the newly announced expanded coverage.

 

Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat & Vulnerability Management serves as an infrastructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. Furthermore, it bridges security stakeholders—security administrators, security operations, and IT administrators—by allowing them to collaborate and seamlessly remediate threats.

 

Threat & Vulnerability Management is a new component of Microsoft Defender ATP, and provides both security administrators and security operations teams with unique value, including:

  • Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities
  • Invaluable machine vulnerability context during incident investigations
  • Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager

 

 

How this new Threat & Vulnerability Management changes the game

 

With Threat & Vulnerability Management in Microsoft Defender ATP, we are introducing a new set of advanced, agentless, cloud-powered capabilities that provide continuous, real-time, risk-based vulnerability management.

 

Real-time discovery

 

To discover endpoint vulnerabilities and misconfiguration, Threat & Vulnerability Management uses the same agentless built-in Microsoft Defender ATP sensors to reduce cumbersome network scans and IT overhead, and provides:

 

  • Real-time device inventory. Devices onboarded to Microsoft Defender ATP automatically report and push vulnerability and security configuration data to the dashboard.
  • Visibility into software and vulnerabilities. Optics into the organization’s software inventory, as well as software changes like installations, uninstallations, and patches. Newly discovered vulnerabilities are reported with actionable mitigation recommendations for 1st and 3rd party applications.
  • Application runtime context. Constant visibility into application usage patterns for better prioritization and decision-making. Critical dependencies, such as vulnerable runtime libraries being loaded by other applications, are made visible.
  • Configuration posture. Visibility into organizational security configuration, surfacing issues like disabled antivirus, enabled SMBv1, or misconfigurations that could allow escalation of privileges. Issues are reported in the dashboard with actionable security recommendations.

 

Intelligence-driven prioritization

 

Threat & Vulnerability Management helps customers prioritize and focus on those weaknesses that pose the most urgent and the highest risk to the organization. Rather than using static prioritization by severity scores, Threat & Vulnerability Management in Microsoft Defender ATP highlights the most critical weaknesses that need attention by fusing its security recommendations with dynamic threat and business context:

 

  • Exposing emerging attacks in the wild. Through its advanced cyber data and threat analytics platform, Threat & Vulnerability Management dynamically aligns the prioritization of its security recommendations to focus on vulnerabilities that are currently being exploited in the wild and emerging threats that pose the highest risk.
  • Pinpointing active breaches. Microsoft Defender ATP correlates Threat & Vulnerability Management and EDR insights to provide the unique ability to prioritize vulnerabilities that are currently being exploited in an active breach within the organization.
  • Protecting high-value assets. Microsoft Defender ATP’s integration with Azure Information Protection allows Threat & Vulnerability Management to call attention to exposed machines with business-critical applications, confidential data, or high-value users.

 

Seamless remediation

 

Microsoft Defender ATP’s Threat & Vulnerability Management allows security administrators and IT administrators to collaborate seamlessly to remediate issues.

 

  • One-click remediation requests to IT. Through Microsoft Defender ATP’s integration with Microsoft Intune and System Center Configuration Manager (SCCM), security administrators can create a remediation task in Microsoft Intune with one click. We plan to expand this capability to other IT security management platforms.
  • Alternate mitigations. Threat & Vulnerability Management provides insights on additional mitigations, such as configuration changes that can reduce risk associated with software vulnerabilities.
  • Real-time remediation status. Microsoft Defender ATP provides real-time monitoring of the status and progress of remediation activities across the organization.

 

How Microsoft Defender ATP’s Threat & Vulnerability Management works

 

We designed Threat & Vulnerability Management with the primary goal of helping organizations reduce exposure to threats and increase organizational resilience. To do this, we’re introducing two new metrics:

 

  • Exposure score reflects the current exposure associated with devices in the organization based on dynamic vulnerabilities, threat, and business context.
  • Configuration score shows the collective security configuration posture of devices based on security best practices.

 

The Threat & Vulnerability Management dashboard provides real-time visual of these scores, which are continuously assessed based on environmental changes.

 

1_scored.jpg

 

The weaknesses identified in the environment are mapped to actionable security recommendations and prioritized by their impact on the organizational exposure score.

 

2_recommendations.jpg

 

Each security recommendation includes an actionable remediation recommendation, which can be pushed into the IT task queue through a built-in integration with Microsoft Intune and SCCM.

 

3_recommendation_side_panel.jpg

 

The status and progress of these remediation activities can be monitored through the dashboard.

 

4_Remediation_tasks.jpg

 

Threat & Vulnerability Management also provides real-time visibility into the software inventory, with important information like vulnerabilities associated with software versions installed on devices, related exploits and threats, and impact to exposure score.

 

5_Software inventory.jpg

 

When pivoting to a specific machine, Threat & Vulnerability Management provides machine exposure level, security recommendations, vulnerabilities identified on the machine, and other critical information. This data, together with alerts and incidents data provides security operations with a much clearer picture during incident investigations.  

 

7_1 - 007g - Machine.jpg

 

Preview available soon

 

Threat & Vulnerability Management is just the latest innovation to be added to Microsoft Defender ATP, which continues to evolve to provide customers with powerful, real-time, and integrated means to discover, prioritize, and remediate threats. Customers who have turned on Microsoft Defender ATP preview features will see this game-changing capability in their dashboard within the next month.

 

Not yet enjoying the benefits of Microsoft Defender ATP’s industry-leading optics and detection capabilities? Sign up for free trial today.

 

Update (July 2, 2019): General availability

 

As of June 30, 2019, Threat & Vulnerability Management is generally available. Read the announcement: Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioriti....

 

 

Microsoft Defender ATP team

7 Comments
Senior Member
I can't wait for this. It looks very interesting.
Occasional Contributor

Still waiting :)

Senior Member

c-montgomery-burns_197x282.jpg

Occasional Visitor

Just curious to know how this will get integrated with Azure environment, ACP dashboards to have a single view of security posture.

Occasional Visitor

Just curious to know how this will get integrated with Azure environment, ASC (Azure Security Center) dashboards to have a single view of security posture.

Senior Member

I agree with Taslet. We have several one-stop overviews of security between Azure, WDATP/MDATP, and O365. Some of them overlap features with other, and some features get orphaned when consoles get reorganized. I love the direction MS is going with delivering value for telemetry we are already sending. The tiering and the product sales structure are getting in the way of operational management, though. But I'm a big fan of the feature announced in the original post here - it is very welcome!

Senior Member

This looks like a great addition to the product!