%3CLINGO-SUB%20id%3D%22lingo-sub-1827448%22%20slang%3D%22en-US%22%3EIntroducing%20a%20new%20threat%20and%20vulnerability%20management%20report%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1827448%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20excited%20to%20announce%20a%20new%20built-in%20report%20for%20Microsoft%20Defender%20for%20Endpoint%E2%80%99s%20threat%20and%20vulnerability%20management%20capability%2C%20the%20%3CSTRONG%3Evulnerable%3C%2FSTRONG%3E%20%3CSTRONG%3Edevices%3C%2FSTRONG%3E%20%3CSTRONG%3Ereport%3C%2FSTRONG%3E!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHave%20you%20ever%20wondered%20which%20devices%20have%20the%20most%20critical%20vulnerabilities%3F%20Or%20which%20devices%20have%20the%20oldest%20or%20most%20exploitable%20vulnerabilities%3F%20Our%20new%20report%20is%20now%20in%20public%20preview%20to%20give%20you%20those%20answers%2C%20and%20much%20more!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-vulnerable-devices-report%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EVulnerable%20devices%20report%26nbsp%3B%3C%2FA%3Eprovides%20extensive%20insights%20into%20your%20organization%E2%80%99s%20vulnerable%20devices%20with%20summaries%20of%20the%20current%20status%20and%20customizable%20trends%20over%20time.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EReport%20insights%20include%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EDevice%20vulnerability%20severity%20levels%20(e.g.%20all%20the%20devices%20with%20critical%20vulnerabilities)%3C%2FLI%3E%0A%3CLI%3EDevice%20exploit%20availability%20(e.g.%20all%20the%20devices%20with%20vulnerabilities%20that%20have%20verified%20exploits)%3C%2FLI%3E%0A%3CLI%3EDevice%20vulnerability%20age%20(e.g.%20devices%20with%20vulnerabilities%20that%20were%20published%20over%2090%20days%20ago)%3C%2FLI%3E%0A%3CLI%3EVulnerable%20devices%20by%20operating%20system%3C%2FLI%3E%0A%3CLI%3EVulnerable%20devices%20by%20Windows%2010%20version%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22vulrep1.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229809i06F5A6AAFE281626%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22vulrep1.png%22%20alt%3D%22vulrep1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22vulrep2.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229811iE288E296A7131682%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22vulrep2.png%22%20alt%3D%22vulrep2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorshirfeldman_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3ELet%E2%80%99s%20take%20some%20examples%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EIf%20there%20are%20a%20lot%20of%20devices%20with%20old%20vulnerabilities%2C%20you%20might%20want%20to%20learn%20about%20the%20MTTR%20(mean%20time%20to%20remediate)%20process%20in%20your%20organization.%3C%2FLI%3E%0A%3CLI%3EIf%20you%20see%20multiple%20devices%20with%20%3CSTRONG%3ECritical%3C%2FSTRONG%3E%20or%20%3CSTRONG%3EHigh%3C%2FSTRONG%3E%26nbsp%3Bvulnerabilities%2C%20you%20might%20want%20to%20prioritize%20those%20devices%20first.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIs%20there%20an%20insight%20you%20want%20to%20explore%20further%3F%20Select%20the%20bar%20chart%20to%20drill%20down%20and%20view%20a%20list%20of%20relevant%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22vulrep3.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229812iD0DE0D9DDF8E6DCD%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22vulrep3.png%22%20alt%3D%22vulrep3.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22vulrep4.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229814i3CF899AC9A10B820%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22vulrep4.png%22%20alt%3D%22vulrep4.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20also%20use%20the%20graphs%20and%20granular%20filtering%20capabilities%20to%20easily%20learn%20about%20your%20security%20posture%20and%20the%20vulnerable%20devices%20in%20the%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAre%20you%20ready%3F%20If%20you%E2%80%99ve%20enabled%20public%20preview%20features%2C%20you%20can%20%3CA%20href%3D%22https%3A%2F%2Fsecuritycenter.windows.com%2Freports%2Ftvm%2Fvulnerability%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Echeck%20out%20the%20new%20report%3C%2FA%3E%20today!%20If%20not%2C%20we%20encourage%20you%20to%20turn%20on%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fpreview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Epreview%20features%3C%2FA%3E%20in%20Microsoft%20Defender%20Security%20Center%20to%20get%20access%20to%20the%20newest%20capabilities.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EIf%20you%E2%80%99re%20not%20yet%20taking%20advantage%20of%20Microsoft%E2%80%99s%20industry-leading%20security%20optics%20and%20detection%20capabilities%20for%20endpoints%2C%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fendpoint-defender%3Frtc%3D1%3Frtc%3D1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esign%20up%20for%20a%20free%20trial%3C%2FA%3E%3C%2FSPAN%3E%20of%20Microsoft%20Defender%20for%20Endpoint%20today.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20welcome%20your%20feedback.%20If%20you%20have%20any%20comments%20or%20questions%2C%20let%20us%20know!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1827448%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3EWe%20are%20excited%20to%20announce%20a%20new%20built-in%20report%20for%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EM%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3Eicrosoft%20Defender%20for%20Endpoint%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%E2%80%99s%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3Et%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3Ehreat%20and%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3Ev%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3Eulnerability%20management%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ecapability%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%2C%20the%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3EV%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3Eulnerable%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3Edevices%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3Ereport%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E!%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22TextRun%20SCXW168399067%20BCX0%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW168399067%20BCX0%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-right%22%20image-alt%3D%22vulnerableDevices.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229808i4D891852E28EFE1D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22vulnerableDevices.PNG%22%20alt%3D%22vulnerableDevices.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1827448%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1828852%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20new%20threat%20and%20vulnerability%20management%20report%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1828852%22%20slang%3D%22en-US%22%3E%3CP%3EExcellent%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1841229%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20new%20threat%20and%20vulnerability%20management%20report%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1841229%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%2C%20does%20it%20cover%20all%20vulnerabilities%20in%20CVE%20or%20the%20only%20one%20for%20Microsoft%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1928133%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20new%20threat%20and%20vulnerability%20management%20report%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1928133%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F13441%22%20target%3D%22_blank%22%3E%40Reza%20Ameri%3C%2FA%3E%26nbsp%3Byes%2C%20it%20covers%20%3CSTRONG%3Eall%3C%2FSTRONG%3E%20vulnerabilities%2C%20not%20only%20for%20Microsoft.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1928180%22%20slang%3D%22pt-BR%22%3ERe%3A%20Introducing%20a%20new%20threat%20and%20vulnerability%20management%20report%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1928180%22%20slang%3D%22pt-BR%22%3E%3CP%3EWonderful%2C%20but%20the%20big%20problem%20here%20in%20Brazil%20is%20the%20lack%20of%20awareness%20of%20big%20businessmen%20and%20even%20the%20government%20to%20continue%20using%20Windows%20and%20countless%20pirated%20software.%20Unfortunate.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1929807%22%20slang%3D%22zh-CN%22%3EReply%3A%20Introducing%20a%20new%20threat%20and%20security%20management%20report%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1929807%22%20slang%3D%22zh-CN%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CU%3EPlease%20adapt%20all%20the%20features%20of%20Windows%2010%20in%20China!%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Fhtml%2Fimages%2Femoticons%2Fcry_40x40.gif%22%20alt%3D%22%3Acry%3A%22%20title%3D%22%3Acry%3A%22%20%2F%3E%3C%2FU%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1931520%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20new%20threat%20and%20vulnerability%20management%20report%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1931520%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F444844%22%20target%3D%22_blank%22%3E%40Shir_Feldman%3C%2FA%3E%26nbsp%3Bfor%20clarification%20and%20excited%20about%20this%20feature.%3C%2FP%3E%3CP%3EThe%20only%20limitation%20is%20because%20it%20is%20cloud%20solutions%2C%20in%20case%20company%20required%20on-premise%20%2C%20they%20need%20to%20relay%20on%20third-party.%3C%2FP%3E%3CP%3EIt%20would%20have%20been%20nice%20to%20see%20on-premise%20solution%20too.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

We are excited to announce a new built-in report for Microsoft Defender for Endpoint’s threat and vulnerability management capability, the vulnerable devices report!

 

Have you ever wondered which devices have the most critical vulnerabilities? Or which devices have the oldest or most exploitable vulnerabilities? Our new report is now in public preview to give you those answers, and much more!

 

The Vulnerable devices report provides extensive insights into your organization’s vulnerable devices with summaries of the current status and customizable trends over time. 

 

Report insights include:

  • Device vulnerability severity levels (e.g. all the devices with critical vulnerabilities)
  • Device exploit availability (e.g. all the devices with vulnerabilities that have verified exploits)
  • Device vulnerability age (e.g. devices with vulnerabilities that were published over 90 days ago)
  • Vulnerable devices by operating system
  • Vulnerable devices by Windows 10 version

vulrep1.png

 

vulrep2.png

 

 

Let’s take some examples:

  • If there are a lot of devices with old vulnerabilities, you might want to learn about the MTTR (mean time to remediate) process in your organization.
  • If you see multiple devices with Critical or High vulnerabilities, you might want to prioritize those devices first.

Is there an insight you want to explore further? Select the bar chart to drill down and view a list of relevant devices.

 

vulrep3.png

 vulrep4.png

 

You can also use the graphs and granular filtering capabilities to easily learn about your security posture and the vulnerable devices in the organization.

 

Are you ready? If you’ve enabled public preview features, you can check out the new report today! If not, we encourage you to turn on preview features in Microsoft Defender Security Center to get access to the newest capabilities.


If you’re not yet taking advantage of Microsoft’s industry-leading security optics and detection capabilities for endpoints, sign up for a free trial of Microsoft Defender for Endpoint today.

 

We welcome your feedback. If you have any comments or questions, let us know!

 

8 Comments
New Contributor

Excellent

New Contributor

Hello @Shir_Feldman ,

Cool stuff from Microsoft. 

But does Microsoft Defender has the capability to find out other well known software vulnerabilities and also can have the remediation for those? 

Will non-corporate user will have this benefit? Why does not this Defender is included with paid genuine Windows 10 Pro with EDR! 

By the way, thank you for this share. 

Valued Contributor

Great, does it cover all vulnerabilities in CVE or the only one for Microsoft?

Microsoft

@Reza Ameri yes, it covers all vulnerabilities, not only for Microsoft.

Occasional Visitor

Wonderful, but the big problem here in Brazil is the lack of awareness of big businessmen and even the government to continue using Windows and countless pirated software. Unfortunate.

Occasional Visitor

请在中国适配Windows10的所有功能!:cry:

Valued Contributor

Thank you @Shir_Feldman for clarification and excited about this feature.

The only limitation is because it is cloud solutions, in case company required on-premise , they need to relay on third-party.

It would have been nice to see on-premise solution too.

New Contributor

Is there a way to see which vulnerabilities are classified as (for example) critical? Lets say you see a device with 5 critical vulnerabilites, and many high and medium. How can you identify which are classified as critical?