Home
%3CLINGO-SUB%20id%3D%22lingo-sub-172086%22%20slang%3D%22en-US%22%3ENEW%20threat%20analytics%20dashboard%20for%20Spectre%20and%20Meltdown%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-172086%22%20slang%3D%22en-US%22%3E%3CP%3ETo%20help%20mitigate%20the%20risks%20posed%20by%20%3CA%20href%3D%22https%3A%2F%2Fcloudblogs.microsoft.com%2Fmicrosoftsecure%2F2018%2F01%2F09%2Funderstanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ESpectre%20and%20Meltdown%3C%2FA%3E%2C%20Microsoft%20has%20released%20OS-specific%20mitigations%20with%20the%20%3CA%20href%3D%22https%3A%2F%2Fportal.msrc.microsoft.com%2Fen-us%2Fsecurity-guidance%2Freleasenotedetail%2F858123b8-25ca-e711-a957-000d3a33cf99%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EJanuary%202018%20Security%20Updates%3C%2FA%3E.%20In%20parallel%2C%20we%20are%20working%20to%20incorporate%20more%20%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4090007%2Fintel-microcode-updates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ECPU%20processor%20microcode%20updates%20into%20the%20Microsoft%20Update%20Catalog%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3EThe%20multivendor%20mitigation%20process%20%2C%20however%2C%20continues%20to%20be%20complex%E2%80%94some%20machines%20require%20OS%20updates%2C%20some%20require%20microcode%20updates%2C%20and%20others%20require%20both.%3C%2FP%3E%0A%3CP%3EWhile%20working%20to%20successfully%20roll%20out%20all%20the%20necessary%20mitigations%2C%20Windows%20Defender%20ATP%20customers%20can%20now%20use%20the%20new%20Threat%20analytics%20dashboard%20to%20continually%20assess%20their%20risk%20exposure%20to%20Spectre%20and%20Meltdown.%20With%20the%20charts%20on%20this%20new%20dashboard%2C%20customers%20can%20quickly%20identify%20machines%20with%20or%20without%20the%20necessary%20mitigations.%3C%2FP%3E%0A%3CP%3EThe%20charts%20include%3A%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EOS%20mitigation%3A%3C%2FSTRONG%3E%20Identifies%20machines%20that%20have%20installed%20the%20January%202018%20Security%20Updates%20from%20Microsoft%20and%20have%20not%20explicitly%20disabled%20any%20of%20the%20OS%20mitigations%20provided%20with%20these%20updates%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EMicrocode%20mitigation%3A%3C%2FSTRONG%3E%20Identifies%20machines%20that%20have%20installed%20the%20necessary%20microcode%20updates%20or%20those%20that%20do%20not%20require%20them%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EOverall%20mitigation%20status%3A%20%3C%2FSTRONG%3EIdentifies%20the%20completeness%20by%20which%20machines%20have%20mitigated%20against%20the%20Spectre%20and%20Meltdown%20exploits.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20664px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F30394i9CFEC53A335DC20F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22ThreatAnaliticsPage.jpg%22%20title%3D%22ThreatAnaliticsPage.jpg%22%20%2F%3E%3C%2FSPAN%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-atp%2Fthreat-analytics-windows-defender-advanced-threat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EMore%20about%20the%20dashboard%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fsecuritycenter.windows.com%2Fthreatanalytics%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAccess%20the%20Threat%20analytics%20dashboard%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

To help mitigate the risks posed by Spectre and Meltdown, Microsoft has released OS-specific mitigations with the January 2018 Security Updates. In parallel, we are working to incorporate more CPU processor microcode updates into the Microsoft Update Catalog.

The multivendor mitigation process , however, continues to be complex—some machines require OS updates, some require microcode updates, and others require both.

While working to successfully roll out all the necessary mitigations, Windows Defender ATP customers can now use the new Threat analytics dashboard to continually assess their risk exposure to Spectre and Meltdown. With the charts on this new dashboard, customers can quickly identify machines with or without the necessary mitigations.

The charts include: 

  • OS mitigation: Identifies machines that have installed the January 2018 Security Updates from Microsoft and have not explicitly disabled any of the OS mitigations provided with these updates
  • Microcode mitigation: Identifies machines that have installed the necessary microcode updates or those that do not require them
  • Overall mitigation status: Identifies the completeness by which machines have mitigated against the Spectre and Meltdown exploits.ThreatAnaliticsPage.jpg

     

More about the dashboard 

Access the Threat analytics dashboard