%3CLINGO-SUB%20id%3D%22lingo-sub-1505208%22%20slang%3D%22en-US%22%3EIntroducing%20event%20timeline%20%E2%80%93%20an%20innovative%2C%20new%20way%20to%20manage%20your%20security%20exposure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1505208%22%20slang%3D%22en-US%22%3E%3CP%3EEffectively%20discovering%2C%20prioritizing%2C%20and%20remediating%20endpoint%20weaknesses%20is%20pivotal%20in%20running%20a%20healthy%20security%20program%20and%20reducing%20organizational%20risk.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fnext-gen-threat-and-vuln-mgt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThreat%20and%20vulnerability%20management%2C%3C%2FA%3E%20which%20is%20part%20of%20Microsoft%20Defender%20ATP%2C%20redefines%20how%20security%20and%20IT%20teams%20reduce%20organizational%20exposure%2C%20harden%20endpoint%20surface%20areas%2C%20and%20increase%20organizational%20resilience.%20One%20of%20the%20key%20metrics%20admins%20track%20is%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-exposure-score%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eexposure%20score%3C%2FA%3E%20in%20their%20organization%20%E2%80%93%20it%20helps%20them%20understand%20how%20exposed%20their%20organization%20is%20to%20threats%20as%20a%20result%20of%20vulnerabilities%20on%20devices%20they%20manage.%20The%20lower%20the%20score%2C%20the%20less%20risk%20exists.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EToday%2C%20we%E2%80%99re%20excited%20to%20announce%20public%20preview%20of%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fthreat-and-vuln-mgt-event-timeline%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eevent%20timeline%3C%2FA%3E%2C%20a%20new%2C%20industry-first%20way%20for%20admins%20to%20interpret%20how%20risk%20got%20introduced%20into%20their%20organization%2C%20and%20what%20mitigation%20needs%20to%20take%20place%20to%20reduce%20it.%20Let%E2%80%99s%20see%20how%20it%20works%20in%20real%20life!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMeet%20Emily%2C%20a%20security%20admin%20who%20uses%20threat%20and%20vulnerability%20management%20to%20help%20manage%20and%20reduce%20her%20organization%E2%80%99s%20exposure%20to%20security%20risks.%20It%E2%80%99s%20pretty%20easy%20for%20Emily%20to%20get%20a%20quick%20view%20of%20the%20current%20exposure%20of%20devices%20right%20from%20the%20-ERR%3AREF-NOT-FOUND-dashboard.%20Emily%20left%20the%20office%20on%20Friday%20afternoon%20with%20a%20low%20exposure%20score%2C%20feeling%20pretty%20confident%20about%20her%20organizational%20exposure%20to%20outside%20threats.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_2-1594063088375.png%22%20style%3D%22width%3A%20342px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203617iD848B3F02F51423A%2Fimage-dimensions%2F342x281%3Fv%3D1.0%22%20width%3D%22342%22%20height%3D%22281%22%20title%3D%22shirfeldman_2-1594063088375.png%22%20alt%3D%22shirfeldman_2-1594063088375.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20Emily%20sits%20down%20at%20her%20desk%20on%20Monday%20morning%2C%20she%E2%80%99s%20shocked%20to%20see%20a%20large%20spike%20in%20exposure.%20What%20happened%20over%20the%20weekend%3F%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_1-1594041975331.png%22%20style%3D%22width%3A%20336px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203509i1AC05259A2355595%2Fimage-dimensions%2F336x274%3Fv%3D1.0%22%20width%3D%22336%22%20height%3D%22274%22%20title%3D%22shirfeldman_1-1594041975331.png%22%20alt%3D%22shirfeldman_1-1594041975331.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEmily%20hovers%20over%20the%20exposure%20score%20graph%20to%20view%20the%20score%20and%20top%20events%20from%20the%20past%20few%20days.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_2-1594041975351.png%22%20style%3D%22width%3A%20384px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203511iD315E9587B6973F5%2Fimage-dimensions%2F384x548%3Fv%3D1.0%22%20width%3D%22384%22%20height%3D%22548%22%20title%3D%22shirfeldman_2-1594041975351.png%22%20alt%3D%22shirfeldman_2-1594041975351.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EShe%20quickly%20discovers%20that%20new%20software%20vulnerabilities%20were%20found%20over%20the%20weekend%2C%20which%20impacted%20some%20of%20her%20organization%E2%80%99s%20devices.%20But%20what%20exactly%20happened%20and%20which%20of%20these%20vulnerabilities%20should%20she%20tackle%20first%3F%20This%20is%20where%20the%20event%20timeline%20steps%20in%20to%20help.%3C%2FP%3E%0A%3CP%3EShe%20selects%20%3CSTRONG%3EShow%20all%20events%20from%20this%20day%20%3C%2FSTRONG%3Eand%20is%20taken%20to%20the%20event%20timeline%20page.%26nbsp%3BEmily%20can%20now%20easily%20see%20a%20list%20of%20events%2C%20the%20date%2C%20related%20component%2C%20the%20number%20of%20originally%20impacted%20machines%2C%20and%20the%20type%20of%20event%2C%20all%20in%20chronological%20order.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_4-1594041975368.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203514i9BC3810AFF31528F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22shirfeldman_4-1594041975368.png%22%20alt%3D%22shirfeldman_4-1594041975368.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20dig%20a%20little%20deeper%2C%20she%20opens%20the%20filters%20panel%20and%20filters%20out%20lower%20impacting%20events.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_5-1594041975374.png%22%20style%3D%22width%3A%20196px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203513i5E5BCB45980C0513%2Fimage-dimensions%2F196x253%3Fv%3D1.0%22%20width%3D%22196%22%20height%3D%22253%22%20title%3D%22shirfeldman_5-1594041975374.png%22%20alt%3D%22shirfeldman_5-1594041975374.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBy%20filtering%20out%20the%20lower%20impact%20events%2C%20Emily%20finds%20that%20several%20applications%20have%20new%20vulnerabilities%20and%20even%20an%20exploit%20that%20was%20verified.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EShe%20selects%20one%20event%20to%20take%20a%20closer%20look%20and%20can%20see%20that%20this%20event%20is%20impacting%20a%20large%20percentage%20of%20her%20devices.%20This%20must%20be%20the%20main%20source%20of%20the%20increase%20to%20her%20exposure%20score!%20She%20needs%20to%20act%20quickly%20to%20address%20this%20new%20vulnerability.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_6-1594041975382.png%22%20style%3D%22width%3A%20455px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203515iA818638D8CAC9F6B%2Fimage-dimensions%2F455x561%3Fv%3D1.0%22%20width%3D%22455%22%20height%3D%22561%22%20title%3D%22shirfeldman_6-1594041975382.png%22%20alt%3D%22shirfeldman_6-1594041975382.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDetermined%20to%20tackle%20this%20immediately%2C%20Emily%20selects%20%3CSTRONG%3EGo%20to%20related%20security%20recommendation%3C%2FSTRONG%3E%20which%20takes%20her%20to%20the%20-ERR%3AREF-NOT-FOUND-security%20recommendations%20page%20and%20the%20recommendation%20that%20will%20address%20the%20new%20software%20vulnerability.%20After%20reading%20the%20description%20and%20vulnerability%20details%20in%20the%20security%20recommendation%2C%20she%20decides%20to%20submit%20a%20remediation%20request.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_7-1594041975390.png%22%20style%3D%22width%3A%20476px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203516i9937ECEEE4A7994F%2Fimage-dimensions%2F476x399%3Fv%3D1.0%22%20width%3D%22476%22%20height%3D%22399%22%20title%3D%22shirfeldman_7-1594041975390.png%22%20alt%3D%22shirfeldman_7-1594041975390.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMaking%20a%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-security-recommendation%23request-remediation%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eremediation%20request%3C%2FA%3E%20in%20threat%20and%20vulnerability%20management%20is%20easy.%20Emily%20selects%20%3CSTRONG%3ERemediation%20options%3C%2FSTRONG%3E%20and%20fills%20out%20the%20form%20to%20open%20a%20remediation%20request%20for%20the%20IT%20team%20via%20Intune.%20She%E2%80%99s%20able%20to%20include%20notes%20to%20the%20IT%20team%20to%20explain%20the%20context%20for%20the%20request%20and%20why%20it%E2%80%99s%20critical%20for%20them%20to%20perform%20the%20remediation%20quickly.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_8-1594041975399.png%22%20style%3D%22width%3A%20452px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203517i60F44E922F27D37F%2Fimage-dimensions%2F452x563%3Fv%3D1.0%22%20width%3D%22452%22%20height%3D%22563%22%20title%3D%22shirfeldman_8-1594041975399.png%22%20alt%3D%22shirfeldman_8-1594041975399.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20IT%20team%20receives%20the%20request%2C%20and%20immediately%20sets%20to%20work%20patching%20the%20vulnerable%20application.%20Throughout%20the%20day%2C%20Emily%20is%20able%20to%20easily%20monitor%20their%20progress%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-remediation%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eremediation%20page%3C%2FA%3E%3CSPAN%3E%20and%20have%20peace%20of%20mind%20that%20the%20IT%20team%20is%20taking%20care%20of%20it%3C%2FSPAN%3E%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_9-1594041975409.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203519i6833EA7471C0467F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22shirfeldman_9-1594041975409.png%22%20alt%3D%22shirfeldman_9-1594041975409.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20the%20remediation%20activities%20are%20complete%2C%20the%20exposure%20score%20returns%20to%20a%20low%20state%20and%20Emily%20breathes%20a%20sigh%20of%20relief.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22shirfeldman_2-1594063088375.png%22%20style%3D%22width%3A%20342px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203617iD848B3F02F51423A%2Fimage-dimensions%2F342x281%3Fv%3D1.0%22%20width%3D%22342%22%20height%3D%22281%22%20title%3D%22shirfeldman_2-1594063088375.png%22%20alt%3D%22shirfeldman_2-1594063088375.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20that%20incident%20complete%2C%20Emily%20can%20start%20her%20week%20with%20the%20confidence%20that%20she%20can%20address%20whatever%20new%20security%20issues%20arise.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECustomer%20feedback%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20thrilled%20to%20be%20bringing%20to%20you%20this%20latest%20innovation%20in%20vulnerability%20management%20and%20assessment.%20Early%20feedback%20shared%20by%20customers%20was%20positive%2C%20acknowledging%20that%20this%20feature%20will%20help%20them%20more%20quickly%20understand%20changes%20in%20their%20exposure%20score%2C%20and%20that%20they%20welcome%20being%20able%20to%20attribute%20changes%20in%20the%20score.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBen%20Watt%2C%20an%20End%20User%20Computing%20Manager%20at%20The%20James%20Hutton%20Institute%20said%3A%3C%2FP%3E%0A%3CP%3E%3CEM%3E%E2%80%9CGreat%20enhancement%20%E2%80%93%20just%20tried%20it%20out%20right%20now%20%E2%80%93%20makes%20things%20a%20lot%20easier%20in%20keeping%20track%20of%20new%20vulnerabilities%20and%20exploits%20that%20threat%20and%20vulnerability%20management%20has%20detected.%20I%20like%20it!%E2%80%9D%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EAnamika%20Sharma%2C%20IT%20Security%20Specialist%20at%20Saxo%20Bank%20said%3A%3C%2FP%3E%0A%3CP%3E%3CEM%3E%E2%80%9CWe%20really%20liked%20the%20timeline%20feature%20in%20the%20threat%20and%20vulnerability%20management%20module.%20We%20are%20managing%20our%20Vulnerability%20Management%20process%20from%20this%20feature%20entirely%E2%80%9D%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-style%3A%20normal%20!msorm%3B%22%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EHow%20to%20get%20started%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ETo%20start%20trying%20out%20the%20event%20timeline%2C%20we%20encourage%20you%20to%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fpreview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eturn%20on%20preview%20features%3C%2FA%3E%26nbsp%3Bin%20the%20Microsoft%20Defender%20Security%20Center%20today%20check%20out%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fthreat-and-vuln-mgt-event-timeline%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%20or%20go%20directly%20to%20%3CA%20href%3D%22https%3A%2F%2Fsecuritycenter.windows.com%2Ftvm-event-insights%3Frange%3D3months%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethe%20new%20event%20timeline%20page.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20learn%20more%20about%20threat%20and%20vulnerability%20management%20and%20our%20industry%20disruptive%20approach%20to%20the%20discovery%2C%20prioritization%2C%20and%20remediation%20of%20endpoint%20vulnerabilities%20and%20misconfigurations%2C%20check%20out%20our%20%3CA%20href%3D%22https%3A%2F%2Fwww.sans.org%2Fwebcasts%2F112810%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ewebinar%3C%2FA%3E%20with%20SANS%20or%20visit%20our%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fthreat-vulnerability-management%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eweb%20page%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELooking%20to%20try%20out%20threat%20and%20vulnerability%20management%3F%20It%E2%80%99s%20already%20included%20in%20Microsoft%20Defender%20ATP!%20If%20you%E2%80%99re%20not%20yet%20taking%20advantage%20of%20Microsoft%E2%80%99s%20industry%20leading%20security%20optics%20and%20detection%20capabilities%20for%20endpoints%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fmicrosoft-365%2Fwindows%2Fmicrosoft-defender-atp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esign%20up%20for%20a%20free%20trial%3C%2FA%3E%26nbsp%3Bof%20Microsoft%20Defender%20ATP%20today.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1505208%22%20slang%3D%22en-US%22%3E%3CP%3EAnnouncing%20the%20public%20preview%20of%20event%20timeline%2C%20a%20new%2C%20industry-first%20way%20for%20admins%20to%20interpret%20how%20risk%20got%20introduced%20into%20their%20organization%2C%20and%20what%20mitigation%20needs%20to%20take%20place%20to%20reduce%20it.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22event_timeline_preview.PNG%22%20style%3D%22width%3A%20863px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F203495iEF7384D9463F82B1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22event_timeline_preview.PNG%22%20alt%3D%22event_timeline_preview.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1505208%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1508426%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20event%20timeline%20%E2%80%93%20an%20innovative%2C%20new%20way%20to%20manage%20your%20security%20exposure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1508426%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20new%20feature.%20Saves%20some%20time%20in%20an%20admins%20life.%3C%2FP%3E%3CP%3EWill%20there%20be%20an%20alert%20feature%20(by%20mail)%20in%20the%20future%3F%20So%20more%20push%20than%20pull%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1510872%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20event%20timeline%20%E2%80%93%20an%20innovative%2C%20new%20way%20to%20manage%20your%20security%20exposure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1510872%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F533323%22%20target%3D%22_blank%22%3E%40StephanGee%3C%2FA%3E%2C%20thanks%20for%20your%20comment.%3C%2FP%3E%0A%3CP%3EIndeed%2C%20the%20alerting%20feature%20(by%20email)%20is%20coming%20soon.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Effectively discovering, prioritizing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat and vulnerability management, which is part of Microsoft Defender ATP, redefines how security and IT teams reduce organizational exposure, harden endpoint surface areas, and increase organizational resilience. One of the key metrics admins track is the exposure score in their organization – it helps them understand how exposed their organization is to threats as a result of vulnerabilities on devices they manage. The lower the score, the less risk exists.

 

Today, we’re excited to announce public preview of the event timeline, a new, industry-first way for admins to interpret how risk got introduced into their organization, and what mitigation needs to take place to reduce it. Let’s see how it works in real life!

 

Meet Emily, a security admin who uses threat and vulnerability management to help manage and reduce her organization’s exposure to security risks. It’s pretty easy for Emily to get a quick view of the current exposure of devices right from the dashboard. Emily left the office on Friday afternoon with a low exposure score, feeling pretty confident about her organizational exposure to outside threats.

 

shirfeldman_2-1594063088375.png

 

As Emily sits down at her desk on Monday morning, she’s shocked to see a large spike in exposure. What happened over the weekend?

shirfeldman_1-1594041975331.png

 

Emily hovers over the exposure score graph to view the score and top events from the past few days.

 

shirfeldman_2-1594041975351.png

 

She quickly discovers that new software vulnerabilities were found over the weekend, which impacted some of her organization’s devices. But what exactly happened and which of these vulnerabilities should she tackle first? This is where the event timeline steps in to help.

She selects Show all events from this day and is taken to the event timeline page. Emily can now easily see a list of events, the date, related component, the number of originally impacted machines, and the type of event, all in chronological order.

 

shirfeldman_4-1594041975368.png

 

To dig a little deeper, she opens the filters panel and filters out lower impacting events.

 

shirfeldman_5-1594041975374.png

 

 

By filtering out the lower impact events, Emily finds that several applications have new vulnerabilities and even an exploit that was verified.

 

She selects one event to take a closer look and can see that this event is impacting a large percentage of her devices. This must be the main source of the increase to her exposure score! She needs to act quickly to address this new vulnerability.

 

shirfeldman_6-1594041975382.png

 

 

Determined to tackle this immediately, Emily selects Go to related security recommendation which takes her to the security recommendations page and the recommendation that will address the new software vulnerability. After reading the description and vulnerability details in the security recommendation, she decides to submit a remediation request.

 

shirfeldman_7-1594041975390.png

 

 

Making a remediation request in threat and vulnerability management is easy. Emily selects Remediation options and fills out the form to open a remediation request for the IT team via Intune. She’s able to include notes to the IT team to explain the context for the request and why it’s critical for them to perform the remediation quickly.

 

shirfeldman_8-1594041975399.png

 

 

 

The IT team receives the request, and immediately sets to work patching the vulnerable application. Throughout the day, Emily is able to easily monitor their progress in the remediation page and have peace of mind that the IT team is taking care of it:

 

shirfeldman_9-1594041975409.png

 

 

Once the remediation activities are complete, the exposure score returns to a low state and Emily breathes a sigh of relief.

 

shirfeldman_2-1594063088375.png

 

With that incident complete, Emily can start her week with the confidence that she can address whatever new security issues arise.

 

 

Customer feedback

We’re thrilled to be bringing to you this latest innovation in vulnerability management and assessment. Early feedback shared by customers was positive, acknowledging that this feature will help them more quickly understand changes in their exposure score, and that they welcome being able to attribute changes in the score.

 

Ben Watt, an End User Computing Manager at The James Hutton Institute said:

“Great enhancement – just tried it out right now – makes things a lot easier in keeping track of new vulnerabilities and exploits that threat and vulnerability management has detected. I like it!”


Anamika Sharma, IT Security Specialist at Saxo Bank said:

“We really liked the timeline feature in the threat and vulnerability management module. We are managing our Vulnerability Management process from this feature entirely”

 

 

How to get started

To start trying out the event timeline, we encourage you to turn on preview features in the Microsoft Defender Security Center today check out the documentation or go directly to the new event timeline page.

 

To learn more about threat and vulnerability management and our industry disruptive approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations, check out our webinar with SANS or visit our web page.

 

Looking to try out threat and vulnerability management? It’s already included in Microsoft Defender ATP! If you’re not yet taking advantage of Microsoft’s industry leading security optics and detection capabilities for endpoints, sign up for a free trial of Microsoft Defender ATP today.

2 Comments
Frequent Contributor

Great new feature. Saves some time in an admins life.

Will there be an alert feature (by mail) in the future? So more push than pull?

Microsoft

Hi @StephanGee, thanks for your comment.

Indeed, the alerting feature (by email) is coming soon.