Home
%3CLINGO-SUB%20id%3D%22lingo-sub-978145%22%20slang%3D%22en-US%22%3EReducing%20risk%20with%20new%20Threat%20%26amp%3B%20Vulnerability%20Management%20capabilities%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-978145%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Ignite%20is%20always%20an%20exciting%20event%20for%20us%20at%20Microsoft%20--for%20one%20whole%20week%20we%20make%20many%20important%20product%20announcements%20from%20different%20teams%20across%20the%20company.%26nbsp%3BHere%20on%20the%20Microsoft%20Defender%20ATP%20team%2C%20we've%20been%20working%20on%20new%2C%20exciting%20capabilities%20for%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Defender-ATP%2FMDATP-Threat-amp-Vulnerability-Management-now-publicly-available%2Fba-p%2F460977%22%20target%3D%22_blank%22%20rel%3D%22%26quot%3BnoopenerThreat%20noopener%22%3EThreat%20and%20Vulnerability%20Management%20(TVM)%3C%2FA%3E%20that%20are%20designed%20to%20improve%20time%20to%20detection%20and%20remediation%2C%20integration%20across%20platforms%2C%20and%20automated%20user-impact%20analysis.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe're%20excited%20to%20announce%20the%20following%20new%20capabilities%20that%20will%20go%20into%20public%20preview%20this%20month%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EVulnerability%20Assessment%20(VA)%20support%20for%20Windows%20Servers%202008%20R2%20and%20above%3C%2FLI%3E%0A%3CLI%3EIntegration%20with%20ServiceNow%20for%20improved%20IT%2FSecurity%20communication%3C%2FLI%3E%0A%3CLI%3EAdvanced%20hunting%20across%20vulnerabilities%20and%20security%20alerts%3C%2FLI%3E%0A%3CLI%3ERole-based%20access%20controls%20(RBAC)%20for%20teams%20focusing%20on%20vulnerability%20management%3C%2FLI%3E%0A%3CLI%3EAutomated%20user-impact%20analysis%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1655175855%22%20id%3D%22toc-hId-1655175855%22%3EVulnerability%20Assessment%20(VA)%20support%20for%20Windows%20Server%202008%20R2%20and%20later%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEffectively%20identifying%2C%20assessing%2C%20and%20remediating%20endpoint%20weaknesses%20is%20pivotal%20in%20running%20a%20healthy%20security%20program%20and%20reducing%20organizational%20risk.%20Threat%20and%20Vulnerability%20Management%20already%20does%20this%20for%20Windows%2010%20endpoints%20today%2C%20but%20when%20it%20comes%20to%20vulnerability%20detection%20and%20remediation%2C%20servers%20are%20just%20as%20important.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe're%20extending%20our%20vulnerability%20assessment%20capabilities%20to%20cover%20Windows%20Servers%202008%20R2%2C%202012%20R2%2C%202016%2C%20and%202019.%20With%20this%20expansion%2C%20customers%20can%20now%20discover%2C%20prioritize%20and%20remediate%20Windows%20server%20vulnerabilities%20across%20the%20entire%20stack%2C%20including%20OS%20components%2C%20Microsoft%20apps%2C%20and%20third-party%20software.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F154609iF91C018530722CBB%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Machine%20page%20-%20Server.jpg%22%20title%3D%22Machine%20page%20-%20Server.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--896981106%22%20id%3D%22toc-hId--896981106%22%3EIntegration%20with%20ServiceNow%20for%20improved%20communication%20and%20a%20transparent%20remediation%20process%20across%20teams%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEffective%20communication%20between%20security%20and%20IT%20teams%20is%20key%20to%20reducing%20the%20time%20to%20mitigate%20vulnerabilities%20and%20to%20improve%20the%20overall%20security%20posture.%20With%20TVM%2C%20we%20introduced%20the%20unique%20ability%20to%20open%20security%20tasks%20for%20the%20IT%20team%20in%20Microsoft%20Intune%20via%20a%20one-click%20remediation%20request.%20We're%20extending%20this%20capability%20to%20natively%20support%20the%20ticketing%20system%2C%20ServiceNow.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20this%20new%20integration%2C%20the%20security%20team%20can%20open%20change%20management%20tickets%20in%20ServiceNow%20directly%20from%20the%20Microsoft%20Defender%20Security%20Center%20to%20ask%20the%20IT%20team%20to%20remediate%20vulnerabilities%20and%20misconfigurations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20596px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F154611iD308B2B26DAC7B16%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Remediation%20request%20-%20less%20white%20space.jpg%22%20title%3D%22Remediation%20request%20-%20less%20white%20space.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-845829229%22%20id%3D%22toc-hId-845829229%22%3EAdvanced%20hunting%20with%20vulnerability%20data%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERich%20vulnerability%20data%20can%20now%20be%20queried%20through%20advanced%20hunting%20capabilities%2C%20providing%20customers%20extensive%20flexibility%20in%20slicing%20and%20dicing%20vulnerability%20and%20misconfiguration%20data.%20Four%20new%20data%20schemata%20have%20been%20added%20to%20give%20customers%20the%20entities%20necessary%20for%20advanced%20hunting%20queries%20around%20vulnerabilities%20and%20misconfiguration%3A%20%3CI%3EVulnerability%3C%2FI%3E%2C%20%3CI%3ESoftware%3C%2FI%3E%2C%20%3CI%3ERecommendation%3C%2FI%3E%2C%20and%20%3CI%3EScore%3C%2FI%3E.%20This%20also%20allows%20customers%20to%20correlate%20vulnerability%20data%20with%20endpoint%20detection%20and%20response%20(EDR)%20signals%20to%20create%20unique%20security%20insights.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWant%20to%20know%20which%20machines%20have%20a%20critical%20vulnerability%20with%20a%20public%20exploit%2C%20or%20with%20the%20firewall%20or%20AV%20disabled%3F%20Want%20to%20view%20all%20machines%20that%20have%20a%20critical%20vulnerability%20with%20an%20associated%20active%20alert%3F%20Interested%20in%20seeing%20the%20top%20five%20most%20vulnerable%20applications%20installed%20across%20the%20organization%3F%20These%20and%20more%20can%20now%20be%20easily%20done%2C%20and%20can%20even%20be%20plugged%20into%20customized%20PowerBI%20dashboards.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20347px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F154617i7B71C6F849664575%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22TVMSchema.png%22%20title%3D%22TVMSchema.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1706327732%22%20id%3D%22toc-hId--1706327732%22%3ERole-based%20access%20controls%20(RBAC)%20for%20teams%20focusing%20on%20vulnerability%20management%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20duty%20of%20mitigating%20vulnerabilities%20and%20reducing%20the%20risk%20of%20the%20organization%20is%20often%20split%20between%20multiple%20teams%2C%20and%20each%20of%20these%20teams%20needs%20access%20to%20different%20tools%2C%20data%20and%20insights.%20With%20Microsoft%20Defender%20ATP%20we%20provide%20all%20security%20teams%20across%20the%20organization%20with%20a%20single%20console%20for%20better%20correlation%20and%20insights.%20This%20comes%20with%20the%20need%20to%20allow%20individual%20teams%20to%20only%20see%20certain%20data%20or%20perform%20certain%20tasks.%20Now%20you%20can%20do%20that%2C%20and%20more!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20have%20enriched%20the%20Microsoft%20Defender%20ATP%20role-based%20access%20model%20with%20new%20TVM%20permissions%20that%20allow%20customers%20to%20specify%20which%20data%20can%20be%20viewed%20and%20what%20actions%20can%20be%20performed%20for%20different%20roles.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20new%20addition%20provides%20you%20maximum%20flexibility%20to%20create%20SecOps-oriented%20roles%2C%20TVM-oriented%20roles%2C%20or%20hybrid%20roles%20so%20only%20authorized%20users%20are%20accessing%20specific%20data%20to%20perform%20their%20task.%20In%20addition%2C%20customers%20can%20achieve%20even%20further%20granularity%20by%20specifying%20whether%20a%20TVM%20role%20can%20only%20view%20vulnerability-related%20data%2C%20or%20also%20create%20and%20manage%20remediation%20and%20exceptions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20497px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F154618i776D12F05BE2530D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22RBAC.png%22%20title%3D%22RBAC.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-36482603%22%20id%3D%22toc-hId-36482603%22%3EAutomated%20user-impact%20analysis%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUnderstanding%20the%20potential%20impact%20of%20applying%20software%20patches%20or%20changing%20configurations%20on%20endpoints%20to%20user%20productivity%20(for%20example%2C%20enabling%20an%20attack%20surface%20reduction%20(ASR)%20rule)%20is%20vital%20information%20for%20both%20Security%20and%20IT%20administrators%20to%20avoid%20breaking%20critical%20user%20and%20business%20processes.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThrough%20new%20intelligent%20data%20cloud%20analysis%20of%20signals%20from%20the%20past%2030%20days%2C%20Microsoft%20Defender%20ATP%20can%20now%20automatically%20determine%20which%20machines%20are%20considered%20safe%20for%20configuration%20change%20without%20impacting%20user%20productivity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe're%20not%20only%20providing%20these%20insights%20as%20part%20of%20the%20TVM%20security%20recommendation%2C%20we%20also%20incorporated%20a%20seamless%20way%20to%20initiate%20remediation%20requests%20only%20for%20machines%20that%20are%20considered%20safe.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EInsights%20on%20user%20impact%20will%20be%20initially%20available%20for%20TVM%20security%20recommendations%20related%20to%20ASR%20rules%20and%20will%20gradually%20be%20extended%20to%20additional%20security%20recommendation%20categories.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20961px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F154619i2A4EC54DC964A5E5%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22User%20impact.jpg%22%20title%3D%22User%20impact.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAll%20these%20new%20capabilities%20continue%20to%20make%20Microsoft%20Defender%20ATP's%20Threat%20%26amp%3B%20Vulnerability%20Management%20a%20unique%2C%20game-changing%20solution.%20These%20capabilities%20are%20going%20to%20be%20available%20for%20you%20to%20try%20out%20in%20the%20coming%20weeks.%20You%20can%20follow%20our%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2FwindowsATP%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETwitter%20account%3C%2FA%3E%20to%20stay%20up%20to%20date.%20As%20always%2C%20please%20share%20your%20feedback%20with%20us%20in%20the%20comment%20section%20below%20or%20use%20the%20feedback%20mechanism%20in%20Microsoft%20Defender%20Security%20Center.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-978145%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3EW%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Ee%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3E%E2%80%99ve%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Ebeen%20working%20on%20new%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3E%2C%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Eexciting%20capabilities%20for%20%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Underlined%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3EThreat%20%26amp%3B%20Vulnerability%20Management%20(TVM)%3C%2FSPAN%3E%3C%2FSPAN%3E%26nbsp%3B%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Ethat%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eare%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Edesigned%20to%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Eimprove%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Etime%20to%20detection%20and%20remediation%2C%20integration%20across%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Eplatforms%2C%20and%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3Eautomated%20user-impact%20analysis%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3E.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXW98683147%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW98683147%20BCX0%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20701px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F154712i24C4A1F799417969%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22TVM-server.png%22%20title%3D%22TVM-server.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-978145%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAdvanced%20hunting%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Microsoft Ignite is always an exciting event for us at Microsoft --for one whole week we make many important product announcements from different teams across the company. Here on the Microsoft Defender ATP team, we've been working on new, exciting capabilities for Threat and Vulnerability Management (TVM) that are designed to improve time to detection and remediation, integration across platforms, and automated user-impact analysis.

 

We're excited to announce the following new capabilities that will go into public preview this month:

  • Vulnerability Assessment (VA) support for Windows Servers 2008 R2 and above
  • Integration with ServiceNow for improved IT/Security communication
  • Advanced hunting across vulnerabilities and security alerts
  • Role-based access controls (RBAC) for teams focusing on vulnerability management
  • Automated user-impact analysis

 

Vulnerability Assessment (VA) support for Windows Server 2008 R2 and later

 

Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat and Vulnerability Management already does this for Windows 10 endpoints today, but when it comes to vulnerability detection and remediation, servers are just as important.

 

We're extending our vulnerability assessment capabilities to cover Windows Servers 2008 R2, 2012 R2, 2016, and 2019. With this expansion, customers can now discover, prioritize and remediate Windows server vulnerabilities across the entire stack, including OS components, Microsoft apps, and third-party software.

 

Machine page - Server.jpg

 

Integration with ServiceNow for improved communication and a transparent remediation process across teams

 

Effective communication between security and IT teams is key to reducing the time to mitigate vulnerabilities and to improve the overall security posture. With TVM, we introduced the unique ability to open security tasks for the IT team in Microsoft Intune via a one-click remediation request. We're extending this capability to natively support the ticketing system, ServiceNow.

 

With this new integration, the security team can open change management tickets in ServiceNow directly from the Microsoft Defender Security Center to ask the IT team to remediate vulnerabilities and misconfigurations.

 

Remediation request - less white space.jpg

 

Advanced hunting with vulnerability data

 

Rich vulnerability data can now be queried through advanced hunting capabilities, providing customers extensive flexibility in slicing and dicing vulnerability and misconfiguration data. Four new data schemata have been added to give customers the entities necessary for advanced hunting queries around vulnerabilities and misconfiguration: Vulnerability, Software, Recommendation, and Score. This also allows customers to correlate vulnerability data with endpoint detection and response (EDR) signals to create unique security insights.

 

Want to know which machines have a critical vulnerability with a public exploit, or with the firewall or AV disabled? Want to view all machines that have a critical vulnerability with an associated active alert? Interested in seeing the top five most vulnerable applications installed across the organization? These and more can now be easily done, and can even be plugged into customized PowerBI dashboards.

 

TVMSchema.png

 

Role-based access controls (RBAC) for teams focusing on vulnerability management

 

The duty of mitigating vulnerabilities and reducing the risk of the organization is often split between multiple teams, and each of these teams needs access to different tools, data and insights. With Microsoft Defender ATP we provide all security teams across the organization with a single console for better correlation and insights. This comes with the need to allow individual teams to only see certain data or perform certain tasks. Now you can do that, and more!

 

We have enriched the Microsoft Defender ATP role-based access model with new TVM permissions that allow customers to specify which data can be viewed and what actions can be performed for different roles.

 

This new addition provides you maximum flexibility to create SecOps-oriented roles, TVM-oriented roles, or hybrid roles so only authorized users are accessing specific data to perform their task. In addition, customers can achieve even further granularity by specifying whether a TVM role can only view vulnerability-related data, or also create and manage remediation and exceptions.

 

RBAC.png

 

Automated user-impact analysis

 

Understanding the potential impact of applying software patches or changing configurations on endpoints to user productivity (for example, enabling an attack surface reduction (ASR) rule) is vital information for both Security and IT administrators to avoid breaking critical user and business processes.

 

Through new intelligent data cloud analysis of signals from the past 30 days, Microsoft Defender ATP can now automatically determine which machines are considered safe for configuration change without impacting user productivity.

 

We're not only providing these insights as part of the TVM security recommendation, we also incorporated a seamless way to initiate remediation requests only for machines that are considered safe.

 

Insights on user impact will be initially available for TVM security recommendations related to ASR rules and will gradually be extended to additional security recommendation categories.

 

User impact.jpg

 

 

All these new capabilities continue to make Microsoft Defender ATP's Threat & Vulnerability Management a unique, game-changing solution. These capabilities are going to be available for you to try out in the coming weeks. You can follow our Twitter account to stay up to date. As always, please share your feedback with us in the comment section below or use the feedback mechanism in Microsoft Defender Security Center.