Extending threat and vulnerability management to more devices

Published Feb 02 2021 10:00 AM 7,638 Views
Microsoft

As Microsoft Defender for Endpoint evolves, we are continuously expanding threat and vulnerability management to cover additional devices, OS platforms, and channels to inform customers. Today, we’re excited to share the latest updates.

 

Threat and vulnerability management for macOS is now generally available

Vulnerability assessment for macOS devices is now generally available to all customers. This capability expansion enables organizations to discover, prioritize, and remediate both software and operating system vulnerabilities on devices running macOS.

 

After onboarding your macOS devices to Microsoft Defender for Endpoint, you'll get the latest security recommendations, review recently discovered vulnerabilities in installed applications, and issue remediation tasks, just like you can with Windows devices.

 

Picture1.png

 

Support for Windows 8.1 devices in public preview

As we continue to enrich threat and vulnerability management with new features and capabilities, we are committed to help all customers running a variety of platforms to protect their organizations and resolve vulnerabilities.

 

We’re excited to announce that we're extending vulnerability assessment and security configuration assessment capabilities to devices running the Windows 8.1 operating system. This has been an ask from some of our top customers and we’re happy to be able to deliver the capability. In public preview as of today, customers will see Windows 8.1 devices contribute to Microsoft Secure Score for Devices and be included in threat and vulnerability dashboards such as Security recommendations, Software inventory, Remediation, Weaknesses, and Event timeline. Windows 8.1 devices will be included in prioritized recommendations and customers can kick off remediation actions like they can with Windows 10 devices. You can see detailed information about threat and vulnerability management support for operating systems versions and platforms in the documentation.

 

To get started with Microsoft Defender for Endpoint public preview capabilities, we encourage customers to turn on preview features in Microsoft Defender Security Center.

 

Introducing email notifications for vulnerability events in public preview

Security admins need to stay up to date on the exposure level of their organization and be informed of any new threat that affects the security posture and compliance of their devices.

 

Threat and vulnerability management continuously monitors your devices and provides real-time information on new threats affecting your organization. These vulnerable events, like new public exploits, are available today through the recently added Event timeline feature.

 

We’ve introduced the ability to set up email notification rules in threat and vulnerability management, so that all appropriate stakeholders will immediately be informed of these new vulnerability events by email.

 

Follow these steps to create an email notification rule:

Picture2.png

 

Set the vulnerability events that trigger notifications and specify device groups.

Picture3.png

 

Add specific recipients who’ll be informed immediately when vulnerability events occur so they can act accordingly.

Picture4.png

 

Recipients who receive the email notification can view basic information about the vulnerability event. There will also be links to filtered views of the threat and vulnerability management Security recommendations and Weaknesses pages so they can further investigate. For example, they could get a list of all exposed devices or get additional details about the vulnerability.

Picture5.png

 

Threat and vulnerability management takes a disruptive, risk-driven approach to help organizations reduce and remediate software vulnerabilities and system misconfigurations. Threat and vulnerability management is one of many Microsoft Defender for Endpoint capabilities that empowers organizations to reduce their cybersecurity threat exposure and accelerate the maturity of their vulnerability management program.

 

If you’re not yet taking advantage of Microsoft’s industry leading endpoint security solution, sign up for a free Microsoft Defender for Endpoint trial today.

%3CLINGO-SUB%20id%3D%22lingo-sub-2111253%22%20slang%3D%22en-US%22%3EExtending%20threat%20and%20vulnerability%20management%20to%20more%20devices%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2111253%22%20slang%3D%22en-US%22%3E%3CP%3EAs%20Microsoft%20Defender%20for%20Endpoint%20evolves%2C%20we%20are%20continuously%20expanding%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fnext-gen-threat-and-vuln-mgt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ethreat%20and%20vulnerability%20management%3C%2FA%3E%20to%20cover%20additional%20devices%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-supported-os%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EOS%20platforms%3C%2FA%3E%2C%20and%20channels%20to%20inform%20customers.%20Today%2C%20we%E2%80%99re%20excited%20to%20share%20the%20latest%20updates.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EThreat%20and%20vulnerability%20management%20for%20macOS%20is%20now%20generally%20available%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EVulnerability%20assessment%20for%20macOS%20devices%20is%20now%20%3CSTRONG%3Egenerally%20available%3C%2FSTRONG%3E%20to%20all%20customers.%20This%20capability%20expansion%20enables%20organizations%20to%20discover%2C%20prioritize%2C%20and%20remediate%20both%20software%20and%20operating%20system%20vulnerabilities%20on%20devices%20running%20macOS.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAfter%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fonboarding%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eonboarding%3C%2FA%3E%20your%20macOS%20devices%20to%20Microsoft%20Defender%20for%20Endpoint%2C%20you'll%20get%20the%20latest%20security%20recommendations%2C%20review%20recently%20discovered%20vulnerabilities%20in%20installed%20applications%2C%20and%20issue%20remediation%20tasks%2C%20just%20like%20you%20can%20with%20Windows%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture1.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251404i4F85F57565978E60%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture1.png%22%20alt%3D%22Picture1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESupport%20for%20Windows%208.1%20devices%20in%20public%20preview%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAs%20we%20continue%20to%20enrich%20threat%20and%20vulnerability%20management%20with%20new%20features%20and%20capabilities%2C%20we%20are%20committed%20to%20help%20all%20customers%20running%20a%20variety%20of%20platforms%20to%20protect%20their%20organizations%20and%20resolve%20vulnerabilities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20excited%20to%20announce%20that%20we're%20extending%20vulnerability%20assessment%20and%20security%20configuration%20assessment%20capabilities%20to%20devices%20running%20the%20Windows%208.1%20operating%20system.%20This%20has%20been%20an%20ask%20from%20some%20of%20our%20top%20customers%20and%20we%E2%80%99re%20happy%20to%20be%20able%20to%20deliver%20the%20capability.%20In%20public%20preview%20as%20of%20today%2C%20customers%20will%20see%20Windows%208.1%20devices%20contribute%20to%20Microsoft%20Secure%20Score%20for%20Devices%20and%20be%20included%20in%20threat%20and%20vulnerability%20dashboards%20such%20as%20Security%20recommendations%2C%20Software%20inventory%2C%20Remediation%2C%20Weaknesses%2C%20and%20Event%20timeline.%20Windows%208.1%20devices%20will%20be%20included%20in%20prioritized%20recommendations%20and%20customers%20can%20kick%20off%20remediation%20actions%20like%20they%20can%20with%20Windows%2010%20devices.%20You%20can%20see%20detailed%20information%20about%20threat%20and%20vulnerability%20management%20support%20for%20operating%20systems%20versions%20and%20platforms%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-supported-os%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20get%20started%20with%20Microsoft%20Defender%20for%20Endpoint%20public%20preview%20capabilities%2C%20we%20encourage%20customers%20to%20turn%20on%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fpreview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Epreview%20features%3C%2FA%3E%20in%20Microsoft%20Defender%20Security%20Center.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIntroducing%20email%20notifications%20for%20vulnerability%20events%20in%20public%20preview%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurity%20admins%20need%20to%20stay%20up%20to%20date%20on%20the%20exposure%20level%20of%20their%20organization%20and%20be%20informed%20of%20any%20new%20threat%20that%20affects%20the%20security%20posture%20and%20compliance%20of%20their%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThreat%20and%20vulnerability%20management%20continuously%20monitors%20your%20devices%20and%20provides%20real-time%20information%20on%20new%20threats%20affecting%20your%20organization.%20These%20vulnerable%20events%2C%20like%20new%20public%20exploits%2C%20are%20available%20today%20through%20the%20recently%20added%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fintroducing-event-timeline-an-innovative-new-way-to-manage-your%2Fba-p%2F1505208%22%20target%3D%22_self%22%3EEvent%20timeline%3C%2FA%3E%20feature.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99ve%20introduced%20the%20ability%20to%20set%20up%20email%20notification%20rules%20in%20threat%20and%20vulnerability%20management%2C%20so%20that%20all%20appropriate%20stakeholders%20will%20immediately%20be%20informed%20of%20these%20new%20vulnerability%20events%20by%20email.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFollow%20these%20steps%20to%20create%20an%20email%20notification%20rule%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture2.png%22%20style%3D%22width%3A%20292px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251409i387C0A0540BBD1F9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture2.png%22%20alt%3D%22Picture2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESet%20the%20vulnerability%20events%20that%20trigger%20notifications%20and%20specify%20device%20groups.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture3.png%22%20style%3D%22width%3A%20640px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251410i93E38E88FA804DD4%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture3.png%22%20alt%3D%22Picture3.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAdd%20specific%20recipients%20who%E2%80%99ll%20be%20informed%20immediately%20when%20vulnerability%20events%26nbsp%3B%3CSPAN%3Eoccur%20so%20they%20can%20act%20accordingly.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture4.png%22%20style%3D%22width%3A%20604px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251411i9B6C63E3B1783C12%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture4.png%22%20alt%3D%22Picture4.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERecipients%20who%20receive%20the%20email%20notification%20can%20view%20basic%20information%20about%20the%20vulnerability%20event.%20There%20will%20also%20be%20links%20to%20filtered%20views%20of%20the%20threat%20and%20vulnerability%20management%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-security-recommendation%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%20recommendations%3C%2FA%3E%26nbsp%3Band%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-weaknesses%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EWeaknesses%3C%2FA%3E%26nbsp%3Bpages%20so%20they%20can%20further%20investigate.%20For%20example%2C%20they%20could%20get%20a%20list%20of%20all%20exposed%20devices%20or%20get%20additional%20details%20about%20the%20vulnerability.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture5.png%22%20style%3D%22width%3A%20485px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251412i2F38A4A4A8C905F6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture5.png%22%20alt%3D%22Picture5.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThreat%20and%20vulnerability%20management%20takes%20a%20disruptive%2C%20risk-driven%20approach%20to%20help%20organizations%20reduce%20and%20remediate%20software%20vulnerabilities%20and%20system%20misconfigurations.%20Threat%20and%20vulnerability%20management%20is%20one%20of%20many%20Microsoft%20Defender%20for%20Endpoint%20capabilities%20that%20empowers%20organizations%20to%20reduce%20their%20cybersecurity%20threat%20exposure%20and%20accelerate%20the%20maturity%20of%20their%20vulnerability%20management%20program.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%E2%80%99re%20not%20yet%20taking%20advantage%20of%20Microsoft%E2%80%99s%20industry%20leading%20endpoint%20security%20solution%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fendpoint-defender%3Frtc%3D1%3Frtc%3D1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Esign%20up%20for%20a%20free%20Microsoft%20Defender%20for%20Endpoint%20trial%3C%2FA%3E%20today.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2111253%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TVMblog.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251481iA115047C5909D9C2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TVMblog.png%22%20alt%3D%22TVMblog.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThreat%20and%20vulnerability%20management%20now%20offers%20support%20for%20macOS%2C%20Windows%208.1%20devices%2C%20and%20email%20notifications.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2111253%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EmacOS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ETVM%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EVulnerability%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Evulnerability%20assessment%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWindows%208.1%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Feb 02 2021 06:49 PM
Updated by: