<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender Vulnerability Management Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/bg-p/Vulnerability-Management</link>
    <description>Microsoft Defender Vulnerability Management Blog articles</description>
    <pubDate>Sat, 25 Apr 2026 17:00:19 GMT</pubDate>
    <dc:creator>Vulnerability-Management</dc:creator>
    <dc:date>2026-04-25T17:00:19Z</dc:date>
    <item>
      <title>From Vulnerability Fatigue to Action: How SKF Operationalized MDVM with a Custom Dashboard</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/from-vulnerability-fatigue-to-action-how-skf-operationalized/ba-p/4495271</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In today’s rapidly evolving digital landscape, organizations must proactively manage security risk and stay ahead of emerging threats to keep systems and data secure. However, many teams face “vulnerability fatigue”;&amp;nbsp;remediation&amp;nbsp;doesn’t&amp;nbsp;get easier as environments grow, Mean Time to Remediate (MTTR) increases, and Mean Time to Exploit continues to shrink.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt; (&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;References: CyberMindr, “Average Time-to-Exploit in 2025”; “MTTR: The Most Important Security Metric”).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender Vulnerability Management (MDVM) transforms vulnerability management into a holistic, risk-based practice—with a single place to discover exposure, prioritize what matters most, and drive remediation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;MDVM surfaces a large volume of vulnerability data. To help customers focus time and resources effectively, it applies a risk-based approach that maps&amp;nbsp;identified&amp;nbsp;weaknesses to actionable security recommendations, prioritized by impact. Each recommendation includes practical remediation guidance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;How SKF Approaches Recommendations&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;SKF, a global enterprise with thousands of assets, has taken significant steps to strengthen its security posture by&amp;nbsp;leveraging&amp;nbsp;Microsoft Defender Vulnerability Management. MDVM is available as part of Microsoft Defender for Endpoint, which is deployed across SKF’s environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;SKF’s patch management model spans multiple owning teams (for example, the Windows team, business application teams, and device owners responsible for patching non-managed applications). SKF uses the MDVM API together with its Configuration Management Database Application Portfolio Management (CMDB APM) to export vulnerability data—along with application name and owner—to external dashboards. These dashboards visualize the data in near real time, enabling each asset or application owner to see only what they own and&amp;nbsp;take action&amp;nbsp;on the recommendations assigned to them.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 1: Vulnerability dashboard&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this blog, we will focus on the external dashboard SKF customized to meet its organizational needs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Building a Vulnerability Dashboard&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A&amp;nbsp;dashboard is beneficial for organizations where remediation actions are the accountability of different departments or application owners outside of the security organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;dashboard is built using MDVM data, which is pulled via the MDVM API. It allows for exporting software vulnerabilities assessments per device through Microsoft Defender for Endpoint.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api/get-assessment-software-vulnerabilities" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Export software vulnerabilities assessment per device - Microsoft Defender for Endpoint | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;SKF took the follow series of steps to build out this dashboard include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Design: Identifying key metrics for the dashboard to address the vulnerability &amp;amp; defining the RBAC role of each category of user&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Data Source Integration: Microsoft Defender API, Microsoft Graph API, CMDBAPM and Entra&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;CMDB allows connecting between application owners and device owners and share application vulnerabilities along with remediation steps to take&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Integrated Data Modeling: Schema defined to map multiple variables &amp;amp; defined relationships between data points&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Access Implementation: RBAC applied in Power BI&amp;amp; assigned roles for controlled exposure of data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Visualization and UX: Build interactive dashboards with dynamic filtering and contextual data displays to improve user engagement and data insights&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Testing &amp;amp; Deployment: Persona based validation &amp;amp; Data integrity tested, verified &amp;amp; deployed&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Subtitle"&gt;Solution Capabilities&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The solution allows a dynamic, real-time, distributed, and visualized risk-based approach that correlates organizational weaknesses with accountable personas.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The solution supports:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Near&amp;nbsp;real-time updates reflecting asset vulnerability status&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;CMDB integration to match devices to device owners, application names&amp;nbsp;&amp;amp;application owners&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;CMDB&amp;nbsp;has also been&amp;nbsp;used to&amp;nbsp;retrieve assets criticality information. Critical assets will&amp;nbsp;be prioritized and will be handled in shorter SLA&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;An RBAC (Role-Based Access Control) model, ensuring that each manager, application owner,&amp;nbsp;or department can view only their data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Dynamic filtering to refine data by application owners,&amp;nbsp;location,&amp;nbsp;device groups,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;CVE data, Business specific information&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;etc.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;While&amp;nbsp;filtering on specific device group or owner,&amp;nbsp;Risk&amp;nbsp;exposure score will dynamically&amp;nbsp;change&amp;nbsp;and reflect the exposure of the selected devices. This&amp;nbsp;enables&amp;nbsp;each team owner or device owner to understand the risk on their assts&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="7" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Comparative insights, allowing teams to benchmark their risk against organizational averages&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="8" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Filters:&amp;nbsp;Can be configured in the dashboard itself and in the Filters section&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 2: Data search by device type or device info.&lt;/img&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;SKF's&amp;nbsp;Vulnerability Management Process&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;SKF is now advancing its vulnerability management strategy with automation-driven enhancements to reduce Mean Time to Remediate (MTTR)&amp;nbsp;by activating the following:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Each application owner or device owner responsibility to log into the dashboard and view required actions to take&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Automated email notification to asset owners for critical activities&amp;nbsp;required&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;SLA enforcement-&amp;nbsp;Defined&amp;nbsp;SLA per vulnerability severity&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;this&amp;nbsp;includes&amp;nbsp;network&amp;nbsp;enforcement in case the SLA is not met&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Patch automation – there are various methods to implement automatic patch automation. This can be implement using&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/mem/intune/fundamentals/intune-add-ons#microsoft-intune-enterprise-app-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Intune enterprise application management&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;or&amp;nbsp;any management system or using&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftintuneblog/stay-ahead-of-evolving-threats-with-the-latest-ai-in-intune/4395079" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;AI agent&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Subtitle"&gt;Summary&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Combining MDVM's&amp;nbsp;risk-based prioritization model and clear RACI ownership helps organizations manage and remediate vulnerabilities more effectively. By translating exposure into concrete, actionable recommendations—and aligning those recommendations to the right teams—SKF improved coordination, accountability, and overall security outcomes.&amp;nbsp;The following was&amp;nbsp;observed&amp;nbsp;at SKF:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Role-specific views of the data, so each audience sees only what is relevant to them&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Non-security device and application owners can still prioritize remediation using business- and risk-context signals such as exposure score, exploitability, application criticality, and more&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The custom dashboard also helps track and improve risk-reduction KPIs over time—at the individual level and across departments, regions, and the broader organization.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Subtitle"&gt;Appendix&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Dashboard&amp;nbsp;Required Permissions&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender for Endpoint API&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Vulnerability.Read.All&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Machine.Read.All&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;SecurityRecommendation.Read.All&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Graph API&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;User.Read.All&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Group.Read.All&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Directory.Read.All&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Mar 2026 18:38:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/from-vulnerability-fatigue-to-action-how-skf-operationalized/ba-p/4495271</guid>
      <dc:creator>Ayelet_Artzi</dc:creator>
      <dc:date>2026-03-31T18:38:08Z</dc:date>
    </item>
    <item>
      <title>MDVM Guidance for CVE-2025-53786: Exchange Hybrid Privilege Escalation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/mdvm-guidance-for-cve-2025-53786-exchange-hybrid-privilege/ba-p/4442337</link>
      <description>&lt;H2&gt;&lt;STRONG&gt;Executive Summary&lt;/STRONG&gt;&lt;/H2&gt;
&lt;H3&gt;Vulnerability Description&lt;/H3&gt;
&lt;P&gt;CVE-2025-53786 is an Elevation of Privilege (EoP) flaw in hybrid Microsoft Exchange Server deployments. Attackers with administrative rights on an on-premises Exchange Server can exploit the shared service principal trust to gain control of the connected Exchange Online environment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Affected Products and Versions&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Exchange Server 2016 (Hybrid deployments)&lt;/LI&gt;
&lt;LI&gt;Microsoft Exchange Server 2019 (Hybrid deployments)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Severity&lt;/STRONG&gt;: CVSS v3.1 score 8.0 (High)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Exploit Status&lt;/STRONG&gt;: No active exploitation observed yet&lt;/P&gt;
&lt;P&gt;This vulnerability illustrates how a trusted hybrid connection can be weaponized for total domain compromise. To mitigate:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Use MDVM to detect, track, and prioritize remediation&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Patch promptly&lt;/STRONG&gt; with April 2025 hotfix or newer patch&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deploy dedicated hybrid app&lt;/STRONG&gt; and reset shared credentials reliably&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Isolate or disconnect unsupported servers&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Detection&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Defender Vulnerability Management solution provides comprehensive vulnerability assessment across all your devices. You can search for this vulnerability in the search bar or navigate directly to the &lt;A href="https://security.microsoft.com/vulnerabilities/vulnerability/CVE-2025-53786/overview" target="_blank" rel="noopener"&gt;CVE page&lt;/A&gt; to view the detailed list of the exposed devices within your organization:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use &lt;A href="https://security.microsoft.com/v2/advanced-hunting" target="_blank" rel="noopener"&gt;Advanced Hunting&lt;/A&gt; in MDVM to find devices vulnerable to CVE-2025-53786, focusing on those in hybrid configurations that are missing the required hotfixes:&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;DeviceTvmSoftwareVulnerabilities
| where CveId == "CVE-2025-53786"
| summarize by DeviceName, CveId&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use this link to run it directly in your environment: &lt;A href="https://security.microsoft.com/v2/advanced-hunting?query=H4sIAPVzmGgAA12OuwrCUBBETy34D8FaQZSojZWxsLFR0vu4YiBRSKJB8eM9BgSRZe4Ms8vMTQjcyTjIW1XBhisnahp2lLopN3IuqlJn720uahGoiOjS4SU3nNuboF6YFFhxVM-diJ5eypIBI4YiVsWMmTJj4vabUtlWOJ_ujGebtufhm_z8dO2-kPt_XW8LsZnWzgAAAA&amp;amp;timeRangeId=month" target="_blank" rel="noopener"&gt;https://security.microsoft.com/v2/advanced-hunting?query=H4sIAPVzmGgAA12OuwrCUBBETy34D8FaQZSojZWxsLFR0vu4YiBRSKJB8eM9BgSRZe4Ms8vMTQjcyTjIW1XBhisnahp2lLopN3IuqlJn720uahGoiOjS4SU3nNuboF6YFFhxVM-diJ5eypIBI4YiVsWMmTJj4vabUtlWOJ_ujGebtufhm_z8dO2-kPt_XW8LsZnWzgAAAA&amp;amp;timeRangeId=month&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;Mitigation and Best Practices&lt;/H3&gt;
&lt;H4&gt;Patch and Upgrade&lt;/H4&gt;
&lt;P&gt;Install the April 2025 Hotfix (or newer) to enable the Dedicated Exchange Hybrid App or upgrade to the latest cumulative update:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Exchange Server 2019 Cumulative Update 14 - &lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=108146" target="_blank" rel="noopener"&gt;Update&lt;/A&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Microsoft Exchange Server 2016 Cumulative Update 23- &lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=108147" target="_blank" rel="noopener"&gt;Update&lt;/A&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Microsoft Exchange Server 2019 Cumulative Update 15- &lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=108144" target="_blank" rel="noopener"&gt;Update&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Microsoft Exchange Server Subscription Edition RTM - &lt;A href="https://www.microsoft.com/download/details.aspx?id=108244" target="_blank" rel="noopener"&gt;Update&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Reconfigure Hybrid Trust&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Goal&lt;/STRONG&gt;: Replace the legacy shared service principal trust with the Dedicated Exchange Hybrid App in Entra ID, then remove the leftover trust.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Deploy and Enable the Dedicated Hybrid App&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Recommended script:&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;.\ConfigureExchangeHybridApplication.ps1 -FullyConfigureExchangeHybridApplication&lt;/LI-CODE&gt;
&lt;P&gt;Or split steps:&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;.\ConfigureExchangeHybridApplication.ps1 -CreateExchangeHybridApplication

.\ConfigureExchangeHybridApplication.ps1 -EnableExchangeHybridApplication&lt;/LI-CODE&gt;
&lt;P&gt;Alternative via Hybrid Configuration Wizard (HCW):&lt;BR /&gt;Run the updated HCW to create the dedicated app, then enable it manually.&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://aka.ms/ConfigureExchangeHybridApplication-Docs" target="_blank"&gt;https://aka.ms/ConfigureExchangeHybridApplication-Docs&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Remove the Legacy Shared Trust&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;After the dedicated app is active, run the script in clean-up mode:&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;.\ConfigureExchangeHybridApplication.ps1 -ResetFirstPartyServicePrincipalKeyCredentials&lt;/LI-CODE&gt;
&lt;P&gt;Details: &lt;A href="https://aka.ms/ConfigureExchangeHybridApplication-Docs#service-principal-clean-up-mode" data-hyperlink="{&amp;quot;url&amp;quot;:&amp;quot;https://aka.ms/ConfigureExchangeHybridApplication-Docs#service-principal-clean-up-mode&amp;quot;}" target="_blank"&gt;https://aka.ms/ConfigureExchangeHybridApplication-Docs#service-principal-clean-up-mode&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Verify&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Confirm the dedicated app is enabled for on-prem servers and that the shared service principal no longer has your key credentials. Re-run clean-up if HCW is executed again.&lt;/P&gt;
&lt;H3&gt;Conclusion&lt;/H3&gt;
&lt;P&gt;CVE-2025-53786 is a high-impact vulnerability in the hybrid trust model. While no exploitation has been confirmed, the potential for full domain compromise requires immediate action:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Apply the latest patches&lt;/LI&gt;
&lt;LI&gt;Enable the dedicated hybrid app&lt;/LI&gt;
&lt;LI&gt;Remove shared trust keys&lt;/LI&gt;
&lt;LI&gt;Verify configuration&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Use MDVM to continuously surface lagging servers, track remediation, and monitor for regressions such as HCW re-execution. Embed these steps into standard procedures to prevent future exposure.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Aug 2025 12:46:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/mdvm-guidance-for-cve-2025-53786-exchange-hybrid-privilege/ba-p/4442337</guid>
      <dc:creator>MotiBani</dc:creator>
      <dc:date>2025-08-12T12:46:35Z</dc:date>
    </item>
    <item>
      <title>Supporting CVSS V4 score for CVE for Enhanced Vulnerability Assessment</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/supporting-cvss-v4-score-for-cve-for-enhanced-vulnerability/ba-p/4391439</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Why transition to CVSS v4?&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Common Vulnerability Scoring System (CVSS) is the global standard for assessing vulnerability severity. As leading institutions like the National Vulnerability Database (NVD) transition to CVSS v4, Microsoft is embracing this enhanced scoring model to ensure better alignment and more actionable insights.&lt;/P&gt;
&lt;P&gt;CVSS v4 addresses the limitations of its predecessor, CVSS v3, introducing features that provide a more granular and accurate assessment of vulnerabilities. For an in-depth overview, refer to the &lt;A href="https://www.first.org/cvss/specification-document" target="_blank"&gt;CVSS v4.0 Specification&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Benefits of CVSS v4 for organizations using Defender Vulnerability Management&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;CVSS v4 offers significant improvements over CVSS v3, including:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Enhanced Exploitability Assessment&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp;&amp;nbsp; Introduction of the Attack Requirements (AR) metric, distinguishing vulnerabilities that require specific conditions (e.g., configurations) versus those that don’t.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp;&amp;nbsp; More nuanced User Interaction (UI) values:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Passive (P): Normal user actions.&lt;/LI&gt;
&lt;LI&gt;Active (A): Unusual actions or those subverting security protocols.&lt;/LI&gt;
&lt;LI&gt;None (N): No conditions&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Refined Impact Metrics&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp;&amp;nbsp; Replacement of the Scope metric with separate impact metrics for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Vulnerable Systems: Confidentiality, Integrity, and Availability impacts.&lt;/LI&gt;
&lt;LI&gt;Subsequent Systems: Granular downstream effects.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These changes allow for a more detailed and precise analysis of vulnerability impact and exploitability.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important Considerations&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;While CVSS v4 improves scoring precision, it is critical to account for additional contextual insights available in the Defender Vulnerability Management portal, such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;EPSS&lt;/STRONG&gt; (Exploit Prediction Scoring System) scores: Predicting the likelihood of exploitation in the near future.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Threat Intelligence&lt;/STRONG&gt;: Insights into known exploits and active attacks in the wild, leveraging Microsoft vast proprietary knowledge.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exposure Metrics&lt;/STRONG&gt;: Includes the number of critical devices affected and whether vulnerabilities are Internet-facing.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;| Best Practice&lt;/STRONG&gt;: Use CVSS v4 scores alongside EPSS and Threat Intelligence data to prioritize vulnerabilities effectively and manage your exposure risk. See more info in the additional resources below.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to Expect?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;No action is required on your part. Once the transition is complete:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Existing CVEs with available CVSS v4 scores, likely affecting your environment) will automatically use the updated scoring standard.&lt;/LI&gt;
&lt;LI&gt;This will likely cause a one-time adjustment to your organization’s Exposure Score, reflected as a single event in the Exposure Score Trend and the Event Timeline.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;We apologize for any inconvenience caused and appreciate your understanding as we enhance our scoring capabilities.You can view the CVSS version and vector string in the CVE side panel. The large majority of CVEs added in the future will display CVSS v4 scores by default.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Recommended read: &lt;A href="https://techcommunity.microsoft.com/blog/vulnerability-management/enhancing-vulnerability-prioritization-with-asset-context-and-epss---now-in-publ/4212480" target="_blank"&gt;Enhancing vulnerability prioritization with asset context and EPSS. &lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.first.org/cvss/v4.0/specification-document#CVSS-v4-0-Scoring" target="_blank"&gt;CVSS v4 Specification Document&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.first.org/cvss/v4-0/user-guide" target="_blank"&gt;https://www.first.org/cvss/v4-0/user-guide&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 17:06:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/supporting-cvss-v4-score-for-cve-for-enhanced-vulnerability/ba-p/4391439</guid>
      <dc:creator>Yuval_Fisher</dc:creator>
      <dc:date>2025-03-20T17:06:46Z</dc:date>
    </item>
    <item>
      <title>Guidance for CVE-2024-0012, CVE-2024-9474 affecting PAN-OS using Microsoft Security capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/guidance-for-cve-2024-0012-cve-2024-9474-affecting-pan-os-using/ba-p/4338896</link>
      <description>&lt;P&gt;A new critical vulnerability affecting PAN-OS has been identified and published last week, putting organizations using Palo Alto Networks’ firewalls at risk. In this blog post, we will demonstrate how you can use Microsoft Security tools discover assets in your organization that are vulnerable to the new critical unauthenticated Remote Code Execution (RCE) flaws in PAN-OS and provide guidelines on remediation. Additionally, we will show you how to use the capabilities of Attack Path analysis together with the Microsoft Security tools to identify how attackers could potentially gain access and reach critical assets in your organizations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;TABLE width="97.2059%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="27.581%"&gt;
&lt;P&gt;&lt;STRONG&gt;Severity&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="72.3819%"&gt;
&lt;P&gt;CVSS V4 B: 9.3 (CVSS V3: 9.8)&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="27.581%"&gt;
&lt;P&gt;&lt;STRONG&gt;Description of vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="72.3819%"&gt;
&lt;P&gt;An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to obtain administrator privileges, modify configurations, or exploit other vulnerabilities such as CVE-2024-9474&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="27.581%"&gt;
&lt;P&gt;&lt;STRONG&gt;Does it have an Exploit?&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="72.3819%"&gt;
&lt;P&gt;Yes, Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability.&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="27.581%"&gt;
&lt;P&gt;&lt;STRONG&gt;Affected Versions&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="72.3819%"&gt;
&lt;P&gt;This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;H2&gt;Impact&lt;/H2&gt;
&lt;P&gt;These vulnerabilities pose significant risks to organizations using PAN-OS. The authentication bypass vulnerability could allow unauthorized access to sensitive data and systems, while the privilege escalation vulnerability could enable attackers to gain higher-level permissions, potentially leading to full system compromise. When combined, these vulnerabilities can be particularly dangerous, as an attacker could first gain access through the authentication bypass and then escalate their privileges, maximizing the potential damage.&amp;nbsp; It is crucial for organizations to promptly assess and mitigate these vulnerabilities to protect their network infrastructure and maintain security integrity.&lt;/P&gt;
&lt;H2&gt;&lt;SPAN class="lia-text-color-21"&gt;Recommendations for Mitigation and Best Practices&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Upgrade to the latest version&lt;/STRONG&gt; of PAN-OS&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Secure Management Interface Access - &lt;/STRONG&gt;Restrict access to the management interface to trusted IP addresses only, enhancing security by limiting potential attack vectors. Use features like JIT (just in time access) for reducing the risk of exploitation. &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-usage" target="_blank" rel="noopener"&gt;Read more&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Minimize Exposure&lt;/STRONG&gt;: JIT access ensures that the management interface is not continuously exposed, reducing the risk of unauthorized access&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Mapping CVE-2024-0012 and CVE-2024-9474 vulnerabilities in your organization&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;The first step in managing an incident is to identify and map affected software within your organization’s assets.&lt;/P&gt;
&lt;H2&gt;Using Microsoft Defender Vulnerability Management&lt;/H2&gt;
&lt;P&gt;Defender Vulnerability Management solution provides a comprehensive vulnerability assessment across all your devices. You can search the vulnerability by either searching for the CVE or for Pan-OS in the search function of Vulnerability Management weaknesses page, and then view the detailed list of the affected software within your organization&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Find the vulnerabilities in weaknesses page&lt;/img&gt;
&lt;H2&gt;Using Advanced Hunting&lt;/H2&gt;
&lt;P&gt;To map the presence of CVE-2024-0012 or CVE-2024-9474 in your environment, you can use the following KQL query or &lt;A class="lia-external-url" href="https://security.microsoft.com/v2/advanced-hunting?query=H4sIAJIzQ2cAA22QQQuCQBCF3znoP4inAgOLIDpnhy4VFN7TVhI0Qa0o-vF9bhFisczu29k3M-9tIKOrUsWce1CunQolqnXTQSXZUBdlOoNKMhHcjKgJo0p99fSUA_tkGQa8oI_RSkdwSqWjgVyyoZYaaSKfmIJ81hjsyoPzjzFnnxGuht9JFXpyVqMu1cNOjHRnD1pe1rznnF4n36jybJea-hhWjboNrrf4am4J_ktq35qcj7qGEVqHFZ0KXA1tvvtb7bm_P9mufwEpatQ8egEAAA&amp;amp;timeRangeId=month" target="_blank" rel="noopener"&gt;this link&lt;/A&gt;. This query searches software vulnerabilities related to the specified CVE and summarizes them by device name, OS version and device ID:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;DeviceTvmSoftwareVulnerabilities | where CveId in ("CVE-2024-0012", "CVE-2024-9474") | summarize by DeviceName, DeviceId, strcat(OSPlatform, " ", OSVersion), SoftwareName, SoftwareVersion&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Using Defender for Cloud&lt;/H2&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;EM&gt;Cloud Security Explorer&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt; &lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/H3&gt;
&lt;P&gt;You can use the Cloud Security Explorer feature within Defender for Cloud to perform queries related to your posture across Azure, AWS, GCP, and code repositories. This allows you to investigate the specific CVE, identify affected machines, and understand the associated risks.&lt;/P&gt;
&lt;P&gt;We have created specific queries for this CVE that help you to easily get an initial assessment of the threat this vulnerability creates for your organization, with choices for customization:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22family%22%2C%22properties%22%3A%7B%22source%22%3A%22virtual_machine%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22vulnerabilities%22%2C%22properties%22%3A%7B%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22or%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-0012%22%5D%7D%7D%2C%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-9474%22%5D%7D%7D%5D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D" target="_blank" rel="noopener"&gt;Vulnerable virtual machines&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22K8s-pod%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22connection%22%2C%22properties%22%3A%7B%22name%22%3A%22is%20running%22%2C%22direction%22%3A%22outgoing%22%2C%22target%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22K8s-container%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22connection%22%2C%22properties%22%3A%7B%22name%22%3A%22is%20running%22%2C%22direction%22%3A%22outgoing%22%2C%22target%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22container-image%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22vulnerabilities%22%2C%22properties%22%3A%7B%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22or%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-0012%22%5D%7D%7D%2C%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-9747%22%5D%7D%7D%5D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D" target="_blank" rel="noopener"&gt;Vulnerable pods&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Searching cloud security explorer for the two CVEs&lt;/img&gt;
&lt;H2&gt;Defender for Cloud Attack path’s:&lt;/H2&gt;
&lt;P&gt;Using attack path analysis, you can easily find all your exposed machines that are also potentially accessible for attackers. Use the following attack path title to filter the view only for exposed machines:&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Internet exposed Azure VM with PAN-OS vulnerabilities (CVE-2024-0012, CVE-2024-9474)&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Note: These attack path updates are rolling out and should be available for all customers within hours&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Recommendations for Mitigation and Best Practices&lt;/H1&gt;
&lt;P&gt;Mitigating risks associated with vulnerabilities requires a combination of proactive measures and real-time defenses. Here are some recommendations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Apply Patches and Updates:&lt;/STRONG&gt; Regularly update all software to fix known vulnerabilities. Use Defender Vulnerability Management for monitoring and enforcing patch compliance.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application Blocking:&lt;/STRONG&gt; Use Defender Vulnerability Management to block vulnerable or malicious software when a CVE is assigned. Available only in Defender Vulnerability Management premium plans. (&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-vulnerability-management/tvm-block-vuln-apps#version-requirements" target="_blank" rel="noopener"&gt;learn more&lt;/A&gt;).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Remediate vulnerabilities&lt;/STRONG&gt;: Follow Defender for Cloud’s recommendations to fix affected VMs and containers across your multi-cloud environment. (&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management" target="_blank" rel="noopener"&gt;learn more&lt;/A&gt;).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;The "Emerging Threat" risk factor: &lt;/STRONG&gt;Utilize Defender for Cloud’s risk factor to prioritize patching vulnerable resources. This factor is regularly updated to stay relevant.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exposure Management:&lt;/STRONG&gt; Adopt a proactive security mindset by learning how Exposure Management can help you gain cross organizational visibility of your attack surface and any attack paths that come up due to new threats or vulnerabilities.
&lt;UL&gt;
&lt;LI&gt;Keep monitoring your environment using attack path analysis to block possible attack routes, using either the visualization tool under Exposure Management in Security.microsoft.com portal or the ‘graph-match’ KQL command (&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsecurityandcompliance/microsoft-security-exposure-management-graph-unveiling-the-power/4148546" target="_blank" rel="noopener" data-lia-auto-title="learn more" data-lia-auto-title-active="0"&gt;learn more&lt;/A&gt;).&lt;/LI&gt;
&lt;LI&gt;Proactively use Vulnerability Assessment security initiative in Exposure Management to aid in prioritization of critical assets.&amp;nbsp;&lt;A class="lia-external-url" style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); font-size: var(--lia-bs-font-size-base);" href="https://aka.ms/exposuremanagement/blogs" target="_blank" rel="noopener"&gt;(learn more&lt;/A&gt;)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;By following these guidelines and utilizing end-to-end integrated Microsoft Security products, organizations can better prepare for, prevent and respond to attacks, ensuring a more secure and resilient environment. &lt;/STRONG&gt;&amp;nbsp;While the preceding process provides a comprehensive approach to protecting your organization, continual monitoring, updating, and adapting to new threats are essential for maintaining robust security.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 18:11:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/guidance-for-cve-2024-0012-cve-2024-9474-affecting-pan-os-using/ba-p/4338896</guid>
      <dc:creator>BrjannBrekkan</dc:creator>
      <dc:date>2024-11-26T18:11:49Z</dc:date>
    </item>
    <item>
      <title>Guidance for handling CUPS remote code execution vulnerability using Microsoft Security capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/guidance-for-handling-cups-remote-code-execution-vulnerability/ba-p/4260542</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;A new critical Remote code execution (RCE) vulnerability affecting CUPS (Common Unix Printing System) has been identified published last week, putting at risk organizations with Unix (Linux, Gnu and other systems). In this blogpost we will demonstrate how you can easily discover if your organization is vulnerable to the new critical unauthenticated RCE flaws in CUPS printing systems and view guidelines on remediation.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Affected versions:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;CVE-2024-47176: cups-browsed binds on UDP port 631, accepting packets from any source. (cups-browsed ≤ 2.0.1)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;CVE-2024-47076: libcupsfilters does not validate IPP attributes, allowing attacker-controlled data (libcupsfilters ≤ 2.1b1)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;CVE-2024-47175: libppd does not sanitize IPP attributes, enabling data injection. (libppd ≤ 2.1b1)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;CVE-2024-47177: foomatic-rip allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter. (cups-filters ≤ 2.0.)*&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;* Coverage for this vulnerability is expected shortly.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Impact&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A remote attacker can replace or install printers with malicious IPP URLs, leading to arbitrary command execution when a print job is started.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;We will demonstrate how organizations can harness the capabilities of Attack Path analysis together with Microsoft Defender suite of products to pinpoint and neutralize threats arising from such events. Our examination will center on: mapping vulnerabilities, evaluating affected assets, gauging potential impact via blast radius analysis, and implementing efficacious mitigations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="2"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="2"&gt;&lt;STRONG&gt;Recommendations for Mitigation and Best Practices&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Mitigating risks associated with vulnerabilities requires a combination of proactive measures and real-time defenses. Here are some recommendations:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Update the CUPS package.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Disable and remove the cups-browsed service if not needed.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Block traffic to UDP port 631 and DNS-SD traffic if not necessary.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Mapping the CUPS vulnerability in Your Organization:&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The first step in managing an incident is to map affected software within your organization’s assets. Defender Vulnerability Management solution provides a comprehensive vulnerability assessment across all your devices.&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;img /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;You can also use the following KQL query or &lt;A href="https://security.microsoft.com/v2/advanced-hunting?query=H4sIACx8-WYAA42RwWrCUBBFz7rQf5CuFBRUtF11VbvopgpKtlJtRMEoJFGp-PGe93QRlIKEycy7c9_NzM2AlD0r5uaJVcaYLQtKDvyQiybsWLOxykVmctdGaaQU1HjmiZP5wDJyUusPlVK--LVeeqtg6nvDn-c6L_YTPmnRpW30rHq80TFe7TZl_cdpP8AJOn27jcp0hVtkPmGnFcc45SzOM6g48G0_Mzdv8LBJwIa6865Wqcpcbuk2ARvpSTgt9C5X4TJd6zpnYCTRm0K9rT40In7rdPXr93-her_GGQP3qbS4AQAA&amp;amp;timeRangeId=month" target="_blank" rel="noopener"&gt;this link&lt;/A&gt;&lt;STRONG&gt;, &lt;/STRONG&gt;this query searches software vulnerabilities related to the specified CVEs and summarizes them by device name, OS version and device ID:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="applescript"&gt;DeviceTvmSoftwareVulnerabilities
| where CveId has_any ("CVE-2024-47176", "CVE-2024-47076", "CVE-2024-47175")
| summarize by DeviceName, DeviceId, OS=strcat(OSPlatform, "-", OSVersion), SoftwareName, SoftwareVersion&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Using Cloud Security Explorer&lt;/STRONG&gt;&lt;EM&gt; &lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;You can use the Cloud Security Explorer feature within Defender for Cloud to perform queries related to your posture across Azure, AWS, GCP, and code repositories. This allows you to investigate the specific CVE, identify affected machines, and understand the associated risks.&lt;/P&gt;
&lt;P&gt;We have created specific queries for this CVE that help you to easily get an initial assessment of the threat this vulnerability creates for your organization, with choices for customization:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://ms.portal.azure.com#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22family%22%2C%22properties%22%3A%7B%22source%22%3A%22Virtual%20machines%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22vulnerabilities%22%2C%22properties%22%3A%7B%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22or%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-47076%22%5D%7D%7D%2C%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-47175%22%5D%7D%7D%2C%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-47176%22%5D%7D%7D%2C%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-47177%22%5D%7D%7D%5D%7D%7D%7D%7D%2C%7B%22type%22%3A%22insights%22%2C%22properties%22%3A%7B%22name%22%3A%221f24d55a-df0f-4772-9090-4629c2d6bfff%22%2C%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22port%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22631%22%5D%7D%7D%5D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D" target="_blank" rel="noopener"&gt;Virtual machines vulnerable to OpenPrinting CUPS&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A style="background-color: #ffffff;" href="https://ms.portal.azure.com#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22K8s-pod%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22insights%22%2C%22properties%22%3A%7B%22name%22%3A%221f24d55a-df0f-4772-9090-4629c2d6bfff%22%2C%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22port%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22631%22%5D%7D%7D%5D%7D%7D%7D%7D%2C%7B%22type%22%3A%22connection%22%2C%22properties%22%3A%7B%22name%22%3A%2222f2a139-1009-4a13-b15b-67ea057a8efe%22%2C%22direction%22%3A%22outgoing%22%2C%22target%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22container%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22connection%22%2C%22properties%22%3A%7B%22name%22%3A%2222f2a139-1009-4a13-b15b-67ea057a8efe%22%2C%22direction%22%3A%22outgoing%22%2C%22target%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22container-image%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22vulnerabilities%22%2C%22properties%22%3A%7B%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22or%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22oper" target="_blank" rel="noopener"&gt;Container images with OpenPrinting CUPS critical vulnerabilities&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Understanding potential impact with Microsoft Security Exposure Management&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Attack paths:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Automated attack path analysis maps out potential attacks starting from exposed resources and tracing the possible routes an attacker might take to compromise critical assets. The analysis identifies exposed cloud compute resources, such virtual machines and Kubernetes containers, that are vulnerable to remote code execution vulnerabilities and the possible lateral movement steps the adversary might take in the environment. The attack paths are presented for all the supported cloud environments (Azure, AWS and GCP). To present the paths filter the view by the following example titles:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Internet exposed Azure VM with RCE vulnerabilities&lt;/LI&gt;
&lt;LI&gt;Internet exposed GCP compute instance with RCE vulnerabilities&lt;/LI&gt;
&lt;LI&gt;Internet exposed AWS EC2 instance with RCE vulnerabilities&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Attack path analysis is available both in Microsoft Security Exposure Management and Microsoft Defender for Cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Critical assets:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;It is also advisable to filter for critical assets (devices that were identified as sensitive by the Critical Asset Protection rule engine) that are affected by the vulnerabilities, using the following query or &lt;A href="https://security.microsoft.com/v2/advanced-hunting?query=H4sIAGsM-WYAA42SW0vDQBCF51nwP-RBqIKtF6p56pMEEUoRFN_bJCbRpilJ6gX88X4zSdqmjVjC7uzOnJmdcyaefMlSMilkJbmEcs8-xRPLBG-ApxCH71iO5Af7SSQ0pLNGPHLPyFF_KUmdE1NHbU98_IlFfHxzO3_LGNwHaw7ivxfG5M0M65C9YD8lK7WKuXWfyStVB9wz_EvYlOAveCGxrlb2csruU19raJc9Oa873M4aWLzgPMX6LWTI_boD0cQDY5W0fFp9Ydjq3Vz6nLSXaAvVxSZGp5mpF-wx2-dy1tLxDXyl1bvZQEZmqw5UQe_P2Xugo3qOuzN5IkPxyrCZz4S81KKb6dzJC3X6qHXJGnIaisvZlds1527MFevmAMwhdVzTZaOMU3-Z9XnCPxHWWjdcHtgdtBpZXLWPYK-IZ1jmpkvZQv8C2oVHoEQDAAA&amp;amp;timeRangeId=month" target="_blank" rel="noopener"&gt;this link&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="applescript"&gt;ExposureGraphNodes 
| where NodeProperties has 'criticalityLevel' 
| where NodeLabel in ('microsoft.compute/virtualmachines', 'compute.instances', 'ec2.instance', 'device', 'container-image', 'microsoft.hybridcompute/machines') 
| join kind=inner (ExposureGraphEdges | where SourceNodeName in ('CVE-2024-47076', 'CVE-2024-47175', 'CVE-2024-47176', 'CVE-2024-47177')) 
    on $left.NodeId == $right.TargetNodeId
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Asset exposure:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Asset&amp;nbsp;Exposure provides a complementary perspective by revealing all the routes leading to vulnerable entities. Using this capability according to the guidelines provided &lt;SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-security-exposure-management-graph-prioritization-is/ba-p/4160316" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;/SPAN&gt;, enables to identify potential areas of the attack surface that can lead to vulnerable resources. Strengthening&amp;nbsp;the attack surface reduces the risk of internal vulnerable resources being discovered and exploited.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;By following these guidelines and utilizing end-to-end integrated Microsoft Security products, organizations can better prepare for, prevent and respond to attacks, ensuring a more secure and resilient environment. &amp;nbsp;While the above process provides a comprehensive approach to protecting your organization, continual monitoring, updating, and adapting to new threats are essential for maintaining robust security.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Oct 2024 09:56:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/guidance-for-handling-cups-remote-code-execution-vulnerability/ba-p/4260542</guid>
      <dc:creator>Efrat Kliger</dc:creator>
      <dc:date>2024-10-06T09:56:42Z</dc:date>
    </item>
    <item>
      <title>Research Analysis and Guidance: Ensuring Android Security Update Adoption</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/research-analysis-and-guidance-ensuring-android-security-update/ba-p/4216714</link>
      <description>&lt;P&gt;Microsoft researchers analyzed anonymized and aggregated security patch level data from millions of Android devices enrolled with Microsoft Intune to better understand Android security update availability and adoption across Android device models. In this post, we describe our analysis, and we provide guidance to users and enterprises to keep their devices up to date against discovered vulnerabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Mobile devices are today’s most prevalent end-user computing platform, and their unique attributes (portability, ubiquitous network connectivity, frequent physical proximity to their owner, sensors such as microphone, camera, GPS) make them valuable targets. Threat actors use mobile devices as attack vectors to pivot into access to enterprise systems and resources. Microsoft brings its expertise, visibility, and resources to provide end-to-end threat protection, including to the broad range of endpoint platforms.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Android security patch lifecycle concerns are often raised in mobile security discussions. Android is an extensible platform with a diversity of devices from many original equipment manufacturers (OEMs), bringing security update complexities.&amp;nbsp;Just as with any popular endpoint platform, security vulnerabilities are discovered in Android. If devices are not patched, these vulnerabilities can potentially be exploited.&amp;nbsp;&lt;A href="https://www.srlabs.de/blog-post/android-patch-gap-2020" target="_blank" rel="noopener"&gt;Others&lt;/A&gt;&amp;nbsp;in the security community have previously&amp;nbsp;&lt;A href="https://www.android-device-security.org/talks/" target="_blank" rel="noopener"&gt;examined&lt;/A&gt; Android security update adoption, and in this post, we contribute to this important discussion by analyzing data from Intune-enrolled Android devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Overall, we conclude that security updates for popular Android device models are typically made available and installed in a timely manner. Based on our analysis, we recommend these best practices for ensuring that Android devices are kept up to date with the latest security updates:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;When users and enterprises are choosing makes and models of Android devices to purchase, we recommend ensuring that the OEM has committed to provide security updates on a timely basis until a defined End-of-Life date. Several examples for informational purposes without endorsement:&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/surface-duo/surface-lifecycle-android-devices" target="_blank" rel="noopener"&gt;Surface Lifecycle for Android-based devices - Surface Duo | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A href="https://support.google.com/pixelphone/answer/4457705?hl=en" target="_blank" rel="noopener"&gt;Learn when you'll get software updates on Google Pixel phones - Pixel Phone Help&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A href="https://security.samsungmobile.com/workScope.smsb" target="_blank" rel="noopener"&gt;Security Updates Scope | Samsung Mobile Security&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Enterprises should consider blocking or limiting access (for example, using &lt;A href="https://docs.microsoft.com/en-us/mem/intune/protect/conditional-access" target="_blank" rel="noopener"&gt;Conditional Access&lt;/A&gt;) from devices, both personal-owned and enterprise-owned, when the security patch level is out-of-date by a defined time or longer. Intune provides the ability to define a &lt;A href="https://learn.microsoft.com/en-us/mem/intune/protect/compliance-policy-create-android-for-work#operating-system-version" target="_blank" rel="noopener"&gt;minimum security patch level compliance policy&lt;/A&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Available security updates should be installed as quickly as feasible. Users or enterprises that delay updates should carefully consider the risks of leaving devices susceptible to exploitation by publicly known vulnerabilities.&amp;nbsp;Intune allows you to minimize disruption caused by update rollouts in your organization, through &lt;A href="https://learn.microsoft.com/en-us/mem/intune/configuration/device-restrictions-android-for-work#general" target="_self"&gt;device restrictions policies&lt;/A&gt; or &lt;A href="https://learn.microsoft.com/en-us/mem/intune/protect/fota-updates-android" target="_self"&gt;additional update management controls for supported OEMs&lt;/A&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Users and enterprises should replace devices that are End-of-Life or are otherwise known to no longer be receiving security updates.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Highlights of our analysis:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;The majority of the top 100 (by Intune enrollment) &lt;/SPAN&gt;&lt;SPAN&gt; device models had security updates made available during the month of Google's Android security bulletin release or the following month.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;The majority of these Intune-enrolled devices had the updates installed during the same or following month that they became available from the OEM. However, for some device models, despite a recent update appearing to be available, many devices had not been recently updated.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Device models for which the OEM had strongly committed to ensuring security updates (e.g., by participating in Google's Android Enterprise Recommended device program) were more likely to have the most recent Android security updates available &amp;amp; installed.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;EM&gt;Vulnerability Management&lt;/EM&gt;&lt;/H2&gt;
&lt;P&gt;As organizations increasingly rely on mobile devices, the importance of robust vulnerability management for these endpoints cannot be overstated. This is where &lt;A href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management" target="_self"&gt;Microsoft Defender Vulnerability Management&lt;/A&gt;&amp;nbsp;Mobile support comes into play. Its comprehensive risk-based vulnerability management across an enterprise's assets alerts administrators to security posture issues, including those on mobile endpoints. Providing severity and exploit availability information enables informed risk decisions, thereby helping to prevent mobile devices—such as those running Android—from becoming attack vectors. In this blog, we take an in-depth look at Android security update availability and adoption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Mobile device exploitation through device vulnerabilities is not just theoretical. Google’s Threat Analysis Group in February &lt;A href="https://blog.google/threat-analysis-group/commercial-surveillance-vendors-google-tag-report/" target="_blank" rel="noopener"&gt;published a detailed report&lt;/A&gt; with numerous examples of Android and iOS device exploitation. Microsoft has &lt;A href="https://www.microsoft.com/en-us/security/blog/2023/04/11/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia/" target="_blank" rel="noopener"&gt;investigated mobile malware samples such as KingsPawn&lt;/A&gt;, which targeted iOS and had indications of Android being targeted by the author as well. CISA’s &lt;A href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener"&gt;Known Exploited Vulnerabilities (KEV) catalog&lt;/A&gt; includes Android vulnerabilities. Security updates are necessary to address vulnerabilities and prevent their exploitation.&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;Understanding The Android Security Update Lifecycle&lt;/EM&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Stakeholders involved in bringing Android devices to market and distributing updates may include Google, original equipment manufacturers (OEMs), and mobile carriers.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Although the base Android operating system is open source and anyone can build upon it, Google provides proprietary &lt;A href="https://www.android.com/gms/" target="_blank" rel="noopener"&gt;Google Mobile Services&lt;/A&gt; (GMS) components, such as the Google Play Store, for officially licensed Android devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Google has been &lt;A href="https://source.android.com/docs/security/bulletin" target="_blank" rel="noopener"&gt;releasing security bulletins and monthly security patches since at least 2015&lt;/A&gt;. The security bulletins describe the set of vulnerabilities that have been fixed not just within Android itself but may also include Linux kernel patches and patches from component manufacturers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Each Android security bulletin released by Google contains a list of security vulnerabilities along with one or more security patch level dates. Device users and administrators can check the security patch level on their devices, which is an assertion by the OEM that the device has been patched against all corresponding vulnerabilities in the bulletins through that date. Microsoft Defender Vulnerability Management can help administrators understand known vulnerabilities that their unpatched devices may be susceptible to.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Each OEM must create device-specific builds using Google’s updates, which can introduce delays, despite OEMs receiving advance notice from Google before security bulletins are made public. In some cases, the OEM may no longer be supporting the device, and updates may not be forthcoming at all. Transparency into these practices may vary widely between OEMs, but these practices are critical for users and administrators to understand to make appropriate risk decisions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;OEMs and mobile carriers may add additional code to their devices, and vulnerabilities in this code may not be reflected in Google’s Android security bulletins. Users and administrators can &lt;A href="https://source.android.com/docs/security/bulletin/asb-overview" target="_blank" rel="noopener"&gt;consult the vendors for more information&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Over the last few years, Google has &lt;A href="https://www.xda-developers.com/android-project-mainline-modules-explanation/" target="_blank" rel="noopener"&gt;improved its ability&lt;/A&gt;&amp;nbsp;to update some components of Android devices, even in cases where an OS update has not been installed (and hence the Android security patch level has not been updated). These updates provide some degree of protection, depending on the specifics of the vulnerabilities.&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;Analyzing Security Update Adoption Using Microsoft Intune Data&lt;/EM&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;Microsoft Intune is used by enterprises to manage millions of devices, both personally owned and enterprise owned. By analyzing enrollment data in aggregate, without use of any user or enterprise unique identifiers, we can make statistically meaningful conclusions of security update adoption across manufacturers and models while maintaining Microsoft’s privacy commitments to our customers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For each Android device in Google's &lt;A href="https://support.google.com/googleplay/answer/1727131" target="_self"&gt;supported device model list&lt;/A&gt; enrolled in Intune that checked in during a one-week period in January 2024, we gathered the reported OEM, model, OS version, and Android security patch level. We similarly gathered the model and OS version of all enrolled iOS/iPadOS devices for comparison. Our overall findings were validated by sampling data across several previous months.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are several caveats to be aware of in our data analysis:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Intune enrolled devices do not represent the overall Android device population.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;The Android security patch level may not account for OEM/carrier-specific vulnerabilities.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Android’s device diversity means that not all devices are susceptible to all vulnerabilities.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;We did not check if individual devices are running unofficial firmware images, which could potentially provide incorrect version and patch level information.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We analyzed the data in several ways:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Latest Android Security Patch Level and median Android Security Patch Level across the top 100 (by Intune enrollment) device models – this gives an estimation of the most recent available update, as well as the rate of adoption of updates for the most popular devices.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Patch level comparison between “knowledge worker” and “rugged” &lt;A href="https://androidenterprisepartners.withgoogle.com/devices/" target="_blank" rel="noopener"&gt;Android Enterprise Recommended devices&lt;/A&gt;&lt;/SPAN&gt; (AER) and enrolled Android devices overall. The AER &lt;SPAN&gt;program requires devices to “&lt;A href="https://blog.google/products/android-enterprise/android-enterprise-recommended-raising-the-bar-of-excellence-for-enterprise-mobility/" target="_blank" rel="noopener"&gt;meet an elevated set of specifications&lt;/A&gt;" for security updates.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;iOS/iPadOS version adoption for comparison.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;Android Security Patch Levels of Top Devices&lt;/EM&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;For each unique Play Protect certified device model, we examined both the latest patch level (the most recent patch level reported by devices, with outlying patch levels reported by three or fewer devices excluded) and the median patch level, normalizing each patch level date to the first day of the month. The results highlight the importance of ensuring that device OEMs provide a documented commitment to security updates, and that users and enterprises stop using devices that are beyond the advertised security update support period.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We calculated the age of the patch levels by subtracting the patch level date from the first day of the current month (e.g., a patch issued during the current month would have an age of zero). Using this data, we can determine (assuming we have a large enough device population of that manufacturer/model enrolled in Intune) both when a security update was last issued for a particular manufacturer/model, and how widely the security update has been adopted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the figures below, we consider the 100 most popular Android device models enrolled in Intune. The top 100 models reflected 44% of the total number of Play Protect certified Android devices enrolled in Intune. Our data supports that most popular Android devices release security updates in a timely manner:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;61 of the 100 models have a security update available with a patch level of one month ago or less.&lt;/LI&gt;
&lt;LI&gt;81 of the 100 models have a security update available with a patch level of three months ago or less.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some models have an age of zero for the latest patch level, meaning that there is a security update available from the current month. Some models have an age of -1, meaning some devices are running a security update dated next month (possibly an upcoming release being tested).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We examined in further detail the five device models in the top 100 where the latest observed patch level was at least 10 months old. For each device model, we searched online for any security update commitment made by the OEM:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For three of the device models (Device Models 9, 24, and 68), the OEM promised four years of security updates after release, and they met that commitment - the devices had been released over four years ago.&lt;/LI&gt;
&lt;LI&gt;For the other two devices (Device Models 46 and 100), the newest updates we could find were 33 and 31 months respectively after the initial device releases (43 and 53 months ago). We could not find any documented OEM update commitment for those two devices.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Across the 100 device models, the adoption of updates (the median patch level) varies widely. This discrepancy can be seen on the graph as the difference between the orange bars (median patch level) and their corresponding blue bars (latest patch level):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;32 device models have a difference of two months or more.&lt;/LI&gt;
&lt;LI&gt;Six of those device models have a difference of 10 months or more.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At least three of the device models with a difference of 10 months or more are non-consumer models intended for use in commercial environments. We speculate that large differences between median and latest patch level are business-critical environments where update deployment is carefully controlled. Other reasons could include use in environments with unstable Internet connections and cases where mobile carriers manage the update but have not yet published it.&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;Android Enterprise Recommended (AER) Device Models&lt;/EM&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Google’s Android Enterprise Recommended (AER) program provides a list of devices that according to Google meet “an elevated set of specifications” for security updates and other properties. Originally, “[d]elivery of Android security updates within 90 days of release from Google, for a minimum of three years” was required, but the requirements have since changed. The AER device list is divided into two categories: “knowledge worker” and “rugged.”&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Each AER device entry states an advertised End-of-Life (EoL) date that the vendor intends to provide updates until. In the most recent requirements (Android 12), knowledge worker device OEMs “must publish security update information on their websites” including an EoL date for updates, with no requirement to deliver updates in a specific timeframe and no specific EoL length requirement. Rugged device OEMs must support “90-day security updates” and the same EoL requirements as knowledge worker devices.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;We analyzed the latest and median patch levels for the top 50 (by Intune enrollment) non-EoL knowledge worker and the top 25 non-EoL rugged device models.&lt;/FONT&gt;&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;AER Knowledge Worker Device Models&lt;/EM&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;We analyzed the top 50 (by Intune enrollment) AER Knowledge Worker device models (representing 77% of the AER Knowledge Worker devices enrolled in Intune), finding that recent security updates were available for all. We identified a security update with a patch level of one month or newer available for 48 device models, and a security update with a patch level of two months ago for the remaining two device models.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Examining the difference between the median and latest patch levels for each model, we observed that for 47 out of 50 device models, the median device had updates applied within two months of release.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Beyond the top 50, we analyzed all 296 device models that had at least 1000 devices enrolled in Intune. For 290 of those device models, we identified a security update three months old or less, with the majority of device models (177) having a security update dated within the past month.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the remaining 6 device models, we verified on either the OEM or mobile carrier websites that there did not appear to be recent security updates available, even though the device AER entries indicated they should still be supported with updates. Overall, device models on the AER list have good security update availability but some caution may still be appropriate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;AER Rugged Device Models&lt;/EM&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;Our analysis shows much greater variation in both security update availability and security update deployment for the AER rugged device models. We included only the 25 AER rugged device models that have 1000 or more devices enrolled in Intune.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The variability may be due to the use of these device models in business-critical environments where the OEM may impose more requirements before publishing updates, and the device owner may impose requirements before deploying updates. Enterprises should take care to obtain assurances of security update availability and should carefully weigh the risks of delaying update deployments.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;Comparing Android and iOS Update Adoption&lt;/EM&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;In the below plots, we compare update adoption by showing across months the cumulative number of Intune-enrolled devices running an Android security patch level from that month, or for Apple mobile devices, an iOS/iPadOS version released during that month. We show all Play Protect-certified Android devices, all AER Knowledge Worker devices, and all iOS/iPadOS devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The data shows the rapid adoption of new versions of iOS/iPadOS versus Android overall, but it also shows that the gap is significantly narrowed for AER knowledge worker devices.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;Conclusion&lt;/EM&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;Our data shows that while security update availability and adoption vary, most popular Android device models have good security update practices. With proper precautions and care taken by users and enterprises when choosing devices to use, Android devices can likely be relied upon to have security updates available in a timely manner to provide protection from known vulnerabilities. Enterprises should consider enforcing minimum Android security patch levels for devices to access enterprise resources, with an understanding that this will exclude some device models.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Apurva Kumar and Michael Peck&lt;/P&gt;
&lt;P&gt;Microsoft Threat Intelligence Community&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 15:53:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/research-analysis-and-guidance-ensuring-android-security-update/ba-p/4216714</guid>
      <dc:creator>michaelpeck</dc:creator>
      <dc:date>2024-08-27T15:53:44Z</dc:date>
    </item>
    <item>
      <title>Enhancing vulnerability prioritization with asset context and EPSS - Now globally available</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/enhancing-vulnerability-prioritization-with-asset-context-and/ba-p/4212480</link>
      <description>&lt;P&gt;Vulnerability prioritization is a critical component of an effective Vulnerability Risk Management (VRM) program. &lt;BR /&gt;It involves identifying and ranking security weaknesses in an organization's systems based on their potential impact and exploitability. &lt;BR /&gt;Given the vast number of potential vulnerabilities, it is impossible to address all of them at once. Effective prioritization ensures that the most critical vulnerabilities are addressed first, maximizing security efforts. &lt;BR /&gt;This approach is crucial for defending against cyberattacks, as it helps allocate resources effectively, reduce the attack surface, and protect sensitive data more efficiently.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are excited to announce the addition of three crucial factors to our prioritization process in Microsoft Defender Vulnerability Management, aimed at improving accuracy and efficiency. These factors include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Information about critical assets (defined in &lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/microsoft-security-exposure-management" target="_blank" rel="noopener"&gt;Microsoft Security Exposure Management&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;Information about internet-facing device&lt;/LI&gt;
&lt;LI&gt;Exploit Prediction Scoring System (EPSS) score&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In this article, you can learn more about each of these enhancements, how they contribute to a more robust vulnerability prioritization process, and how you can use them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Critical devices&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;In&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/microsoft-security-exposure-management" target="_blank" rel="noopener"&gt; Microsoft Security Exposure Management&lt;/A&gt; (preview), you can define and manage resources as critical assets.&lt;/P&gt;
&lt;P&gt;Identifying critical assets helps ensure that the most important assets in your organization are protected against risk of data breaches and operational disruptions. Critical asset identification contributes to availability and business continuity. Exposure Management provides an out-of-the-box catalog of predefined critical asset classifications and ability to create your custom definitions, in addition to the capability to manually tag devices as critical to your organization.&lt;A href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/critical-asset-protection-with-microsoft-security-exposure/ba-p/4122645" target="_blank" rel="noopener"&gt; Learn more about critical asset management in this deep dive blog.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now in preview, you can prioritize security recommendations, and remediation steps to focus on critical assets first. &lt;BR /&gt;A new column displaying the sum of critical assets for each recommendation has been added to the security recommendations page, as shown in figure 1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM style="font-family: inherit;"&gt;&lt;SPAN style="font-size: small;"&gt;Figure 1. New column in the recommendations page that displays the number of critical devices that are correlated to each recommendation (all criticality levels).&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, in the exposed device lists (found throughout the Microsoft Defender portal), you can view device criticality, as shown in figure 2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: small;"&gt;Figure 2. Exposed devices with their criticality level in the recommendation object.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also use the critical devices filter to display only recommendations that involve critical assets, as shown in figure 3.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: small;"&gt;Figure 3. Capability to filter and display only recommendations that involves critical assets.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The sum of critical assets (in any criticality level) for each recommendation is now consumable through the &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api/get-all-recommendations?view=o365-worldwide" target="_blank" rel="noopener"&gt;recommendations API&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This is the first factor we are incorporating from Exposure Management, and we plan to expand this feature to include more context from the enterprise graph for prioritization enhancements. This will enable a more comprehensive understanding and management of security risks, ensuring that critical areas are addressed with the highest priority.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Internet facing devices&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;As threat actors continuously scan the web for exposed devices to exploit, Microsoft Defender for Endpoint automatically identifies and flags onboarded, exposed, internet-facing devices in the Microsoft Defender portal. This critical information enhances visibility into your organization's external attack surface and provides insights into asset exploitability. Devices that are successfully connected via TCP or are identified as host reachable through UDP are flagged as internet-facing in the portal.&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/internet-facing-devices" target="_blank" rel="noopener"&gt; Learn more about devices flagged as internet-facing&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The internet-facing device tag is now integrated into Defender Vulnerability Management experiences. This allows you to filter and see only weaknesses or security recommendations that impact internet-facing devices. The tag is displayed in the &lt;STRONG&gt;tags&lt;/STRONG&gt; column, as shown in figure 4, for all relevant devices in the exposed device lists found throughout the Microsoft Defender portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: small;"&gt;&lt;EM&gt;Figure 4. Internet-facing tag on the CVE object and on the relevant device.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Exploit Prediction Scoring System (EPSS)&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;The Exploit Prediction Scoring System (EPSS) is a data-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild. EPSS uses current threat information from CVE and real-world exploit data. &amp;nbsp;The EPSS model produces for each CVE a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited. &lt;A href="https://www.first.org/epss/" target="_blank" rel="noopener"&gt;Learn more about EPSS&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;In the Microsoft Defender portal, you can see the EPSS score for each weakness, as shown in figure 5.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: small;"&gt;Figure 5. Screenshot showing EPSS score.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the EPSS is greater than 0.9, the bug tip is highlighted to reflect the urgency of mitigation, as shown in figure 6.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN style="font-size: small;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: small;"&gt;&lt;EM&gt;Figure 6. On the weaknesses page: the bug tip is highlighted for this CVE as EPSS &amp;gt; 0.9.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EPSS is designed to help you enrich your knowledge of weaknesses, understand exploit probability, and enable you to prioritize accordingly. The EPSS score is also consumable through the &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api/get-all-vulnerabilities?view=o365-worldwide#api-description" target="_blank" rel="noopener"&gt;Vulnerability API&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Note that if the EPSS score is smaller than 0.001, it’s considered to be 0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Try the new capabilities&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Incorporating asset context and EPSS into Defender Vulnerability Management marks a significant advancement in our vulnerability prioritization capabilities. These new features—critical asset identification, internet-facing device tagging, and EPSS scoring—provide a more accurate and efficient approach to managing security risks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By leveraging these tools, you can better protect your organization’s most valuable assets, reduce their attack surface, and stay ahead of potential threats. We invite you to explore these new capabilities and see how they can help with prioritization and enhance your security posture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information, see the following articles:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management" target="_blank" rel="noopener"&gt;What’s new in Microsoft Defender Vulnerability Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/microsoft-security-exposure-management" target="_blank" rel="noopener"&gt;What is Microsoft Security Exposure Management?&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/machines-view-overview" target="_blank" rel="noopener"&gt;Device inventory&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api/management-apis" target="_blank" rel="noopener"&gt;Overview of management and APIs&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 18:34:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/enhancing-vulnerability-prioritization-with-asset-context-and/ba-p/4212480</guid>
      <dc:creator>Yael_Ben_Ari</dc:creator>
      <dc:date>2025-03-03T18:34:54Z</dc:date>
    </item>
    <item>
      <title>Using Export API with Defender Vulnerability Management</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/using-export-api-with-defender-vulnerability-management/ba-p/4191046</link>
      <description>&lt;P&gt;Microsoft Defender Vulnerability Management helps organizations identify and remediate security vulnerabilities in their environment.&lt;/P&gt;
&lt;P&gt;It provides a centralized view of vulnerabilities across all device types in an organization and prioritizes them based on severity and exploitability.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Defender Vulnerability Management provides an export API that allows programmatic access to vulnerability data. The API can be used to automate vulnerability management tasks, integrate vulnerability data with other security tools, and generate custom reports and dashboards.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this blog, we will share guidance and best practices for using Defender Vulnerability Management Export API including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Overview of the Export API&lt;/LI&gt;
&lt;LI&gt;Available API methods using Export API&lt;/LI&gt;
&lt;LI&gt;Using API Explorer &amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Managing large data sets and ensuring exports are up to date&lt;/LI&gt;
&lt;LI&gt;Use Export API to build custom dashboards/reports&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Defender Vulnerability Management data integrated in other tools&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Overview of the Export API data types&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Export API is used for publishing raw data of all known software vulnerabilities and their details for devices in the organization.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;There are two export API methods: JSON response and files. &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;TABLE width="861px"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="178.854px"&gt;
&lt;P&gt;&lt;STRONG&gt;Method&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="681.302px"&gt;
&lt;P&gt;&lt;STRONG&gt;Explanation&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="178.854px"&gt;
&lt;P&gt;JSON response&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="681.302px"&gt;
&lt;UL&gt;
&lt;LI&gt;Can be used to get Defender Vulnerability Management snapshot of all data in the organization&amp;nbsp;or can be used to query delta changes in the last X days (where X is up to 15 days)&lt;/LI&gt;
&lt;LI&gt;Delta export indicates per CVE record the CVE status (New, Updated or Resolved)&lt;/LI&gt;
&lt;LI&gt;Can be saved as excel file, opened in Notepad or VScode, and can be extracted using different scripts&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="178.854px"&gt;
&lt;P&gt;Files&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="681.302px"&gt;
&lt;UL&gt;
&lt;LI&gt;Can be used to get Defender Vulnerability Management snapshot of all data in the organization&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Recommended for large organizations with more than 100K devices&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Each file contains 100K records&lt;/LI&gt;
&lt;LI&gt;To get the next results batch, use skip token (@odata.nextLink&amp;nbsp;field)&lt;/LI&gt;
&lt;LI&gt;Result in files format is valid for 3 hours to download (sass URL)&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The files also contain information about devices that are not yet onboarded to Defender&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Export software vulnerabilities assessment filter options: &lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;RbacName&lt;/SPAN&gt;&lt;/SPAN&gt;, $skiptoken, $top, pageSize&lt;/LI&gt;
&lt;LI&gt;Delta export software vulnerabilities assessment filter options: RbacName&amp;nbsp;, &amp;nbsp;$skiptoken, $top, pageSize, sinceTime&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;More details can be seen here: &lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/get-assessment-software-vulnerabilities?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export software vulnerabilities assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Available API methods using Export API&lt;/STRONG&gt;&lt;/H2&gt;
&lt;H3&gt;&lt;U&gt;via files:&lt;/U&gt;&lt;/H3&gt;
&lt;TABLE width="862px"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="330.052px" height="30px"&gt;
&lt;P&gt;&lt;STRONG&gt;API Method&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="30px"&gt;
&lt;P&gt;&lt;STRONG&gt;Details&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="30px"&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="75px"&gt;
&lt;P&gt;SoftwareVulnerabilitiesExport&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="75px"&gt;
&lt;P&gt;Software vulnerabilities data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="75px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-software-vulnerabilities?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export software vulnerabilities assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="75px"&gt;
&lt;P&gt;SoftwareInventoryExport&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="75px"&gt;
&lt;P&gt;software data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="75px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-software-inventory?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export software inventory assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="75px"&gt;
&lt;P&gt;InfoGatheringExport&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="75px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="75px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-information-gathering?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export information gathering assessment | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="85px"&gt;
&lt;P&gt;SoftwareInventoryNonCpeExport&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="85px"&gt;
&lt;P&gt;non cpe products by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="85px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-non-cpe-software-inventory?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export non product code software inventory assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="75px"&gt;
&lt;P&gt;SecureConfigurationsAssessmentExport&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="75px"&gt;
&lt;P&gt;SCA data by machine(configurations)&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="75px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-secure-config?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export secure configuration assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="90px"&gt;
&lt;P&gt;HardwareFirmwareInventoryExport&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="90px"&gt;
&lt;P&gt;firmware data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="90px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/export-firmware-hardware-assessment?view=o365-worldwide" target="_blank" rel="noopener"&gt;Hardware and firmware assessment methods and properties per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="75px"&gt;
&lt;P&gt;BrowserExtensionsInventoryExport&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="75px"&gt;
&lt;P&gt;browser extensions by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="75px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-browser-extensions?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export browser extensions assessment | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="75px"&gt;
&lt;P&gt;BaselineComplianceAssessmentExport&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="75px"&gt;
&lt;P&gt;Baseline data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="75px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/export-security-baseline-assessment?view=o365-worldwide" target="_blank" rel="noopener"&gt;Security baseline assessment methods and properties per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="330.052px" height="76px"&gt;
&lt;P&gt;CertificateAssessmentExport&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="185.938px" height="76px"&gt;
&lt;P&gt;certificates data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="345.169px" height="76px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/export-certificate-inventory-assessment?view=o365-worldwide" target="_blank" rel="noopener"&gt;Certificate assessment methods and properties per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;U&gt;JSON response:&amp;nbsp;&lt;/U&gt;&lt;/H3&gt;
&lt;TABLE width="865px"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="30px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="30px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="30px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 75px;"&gt;
&lt;TD width="334.427px" height="75px"&gt;
&lt;P&gt;SoftwareVulnerabilitiesByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="75px"&gt;
&lt;P&gt;vulnerabilities data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="75px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-software-vulnerabilities?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export software vulnerabilities assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="65px"&gt;
&lt;P&gt;SecureConfigurationsAssessmentByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="65px"&gt;
&lt;P&gt;SCA data by machine(configurations)&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="65px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-secure-config?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export secure configuration assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="65px"&gt;
&lt;P&gt;SoftwareVulnerabilityChangesByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="65px"&gt;
&lt;P&gt;delta&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="65px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-software-vulnerabilities?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export software vulnerabilities assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="65px"&gt;
&lt;P&gt;SoftwareInventoryByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="65px"&gt;
&lt;P&gt;software data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="65px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-software-inventory?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export software inventory assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="75px"&gt;
&lt;P&gt;SoftwareInventoryNoProductCodeByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="75px"&gt;
&lt;P&gt;non cpe products by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="75px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-non-cpe-software-inventory?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export non product code software inventory assessment per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="60px"&gt;
&lt;P&gt;BrowserExtensionsInventoryByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="60px"&gt;
&lt;P&gt;browser extensions by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="60px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-browser-extensions?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export browser extensions assessment | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="70px"&gt;
&lt;P&gt;HardwareFirmwareInventoryByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="70px"&gt;
&lt;P&gt;firmware data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="70px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/export-firmware-hardware-assessment?view=o365-worldwide" target="_blank" rel="noopener"&gt;Hardware and firmware assessment methods and properties per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="70px"&gt;
&lt;P&gt;BaselineComplianceAssessmentByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="70px"&gt;
&lt;P&gt;baseline data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="70px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/export-security-baseline-assessment?view=o365-worldwide" target="_blank" rel="noopener"&gt;Security baseline assessment methods and properties per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="334.427px" height="70px"&gt;
&lt;P&gt;CertificateAssessmentByMachine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.875px" height="70px"&gt;
&lt;P&gt;certificates data by machine&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="342.865px" height="70px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/export-certificate-inventory-assessment?view=o365-worldwide" target="_blank" rel="noopener"&gt;Certificate assessment methods and properties per device | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Using API Explorer from security portal&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;With the API Explorer, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Run requests for any method and see responses in real-time&lt;/LI&gt;
&lt;LI&gt;Quickly browse through the API samples and learn what parameters they support&lt;/LI&gt;
&lt;LI&gt;Make API calls with ease&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To start, Open Defender portal and navigate to ‘Endpoints-Partners and API-API Explorer ‘&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on the required data to explore, add the suffix to the API call.&lt;/P&gt;
&lt;P&gt;In the example, we will use software vulnerabilities:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://api.security.microsoft.com/api/machines/SoftwareVulnerabilitiesExport" target="_blank" rel="noopener"&gt;https://api.security.microsoft.com/api/machines/SoftwareVulnerabilitiesExport&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Run the query&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;To check its working and export to excel:&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Copy one of the files URL from the results:&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Open it in website and save the JSON file&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Extract the JSON file&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Open excel , click on ‘Data’ tab-&amp;gt;get data-&amp;gt;from file-&amp;gt;from JSON and choose the file you saved above&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Managing large data sets and ensuring exports are up to date&amp;nbsp;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;In case of large amounts of data, Organizations can use the below steps to avoid pulling all defender vulnerability management data every day and still ensure data in export is up to date: &amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.Pull ‘Export software vulnerabilities assessment’ once a week&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.Pull ‘Delta export software vulnerabilities assessment’ once a day&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3.Join the full snapshot with the delta file based on Device ID, Software name and version&amp;nbsp;and CVE ID&lt;/P&gt;
&lt;P&gt;4.Latest ‘Event time stamp’ indicate on the latest status of a specific CVE&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Use Export API to build custom dashboards/reports&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Using Defender Vulnerability Management Export API customers can build custom reports and dashboards per the organization needs. We have seen organizations build anything executive or management reports to detailed vulnerability management dashboards.&lt;/P&gt;
&lt;P&gt;There are variety of methods to use the API such as &amp;nbsp;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api-microsoft-flow" target="_blank" rel="noopener"&gt;Power-Automate&lt;/A&gt;&lt;/SPAN&gt;, &lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api/api-power-bi" target="_blank" rel="noopener"&gt;Power BI&lt;/A&gt;&lt;/SPAN&gt;, , &lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api/run-advanced-query-sample-python" target="_blank" rel="noopener"&gt;Advanced hunting using Python&lt;/A&gt;&lt;/SPAN&gt;, &lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api/run-advanced-query-sample-powershell" target="_blank" rel="noopener"&gt;Advanced hunting using PowerShell&lt;/A&gt;&lt;/SPAN&gt;, &lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/api/exposed-apis-odata-samples" target="_blank" rel="noopener"&gt;Using OData queries&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One example to get started is to use Defender Vulnerability Management Power BI templates which enable out of the box reports such as Organization existing vulnerabilities, Software inventory, Missing Windows security updates and more.&lt;/P&gt;
&lt;P&gt;You can download the templates&amp;nbsp;&lt;A id="LPlnk343729" title="https://github.com/microsoft/MicrosoftDefenderForEndpoint-PowerBI/blob/master/TVM/TVM report templates June 2021/vulnerabilities_report_V6_full_dataset.pbit" href="https://github.com/microsoft/MicrosoftDefenderForEndpoint-PowerBI/blob/master/TVM/TVM%20report%20templates%20June%202021/vulnerabilities_report_V6_full_dataset.pbit" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Defender Vulnerability Management data integrated in other tools&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Defender Vulnerability Management data can be integrated in other security tools. Below examples of both Microsoft and non-Microsoft tools:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Intune&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Integration with Microsoft Intune allows customers to ‘Request Remediation’ to vulnerability &lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-vulnerability-management/tvm-security-recommendation" target="_blank" rel="noopener"&gt;security recommendations&lt;/A&gt;&lt;/SPAN&gt;. This will create an Intune package deployment request and remediation activity item within the security portal, which can be used for monitoring the remediation progress for this recommendation.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;ServiceNow Vulnerability Response&lt;/STRONG&gt;&lt;/H3&gt;
&lt;DIV&gt;For organization using ServiceNow to manage assets, ServiceNow VR can import data from different resources such as assets information, vulnerabilities information and more.&lt;/DIV&gt;
&lt;DIV&gt;ServiceNow integration synchronizes vulnerability findings from Defender Vulnerability Management and orchestrates the remediation workflow in ServiceNow.&lt;/DIV&gt;
&lt;DIV&gt;To learn more, see blog describing the integration,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;U&gt;&lt;A id="OWA93397b5d-a8f5-9456-25a3-1450981d35a8" class="OWAAutoLink" href="https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/threat-amp-vulnerability-management-integrates-with-servicenow/ba-p/2454065" target="_blank" rel="noopener"&gt;Microsoft vulnerability management integrates with ServiceNow VR&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;U&gt;&lt;A id="OWAd5ca3ab9-562c-230c-0adb-3a46b2471271" class="OWAAutoLink" href="https://docs.servicenow.com/bundle/washingtondc-security-management/page/product/secops-integration-vr/mstvm/concept/mstvm-integration.html" target="_blank" rel="noopener"&gt;Understanding the Microsoft Threat and Vulnerability Management Vulnerability integration (servicenow.com)&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Use Sentinel to store Defender Vulnerability Management history data. This can be used to integrate vulnerability data with other XDR workflows data, build a custom dashboard and as part of it reflect vulnerability management trends and more. To store Defender Vulnerability Management data, please follow the below:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/M365Defender-VulnerabilityManagement" target="_blank" rel="noopener"&gt;Azure-Sentinel/DataConnectors/M365Defender-VulnerabilityManagement at master · Azure/Azure-Sentinel (github.com)&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Please make sure any analytic rules/hunting queries/workbooks or any content that is related to Defender Vulnerability Management data is directed to the tables you have created.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Microsoft Security Exposure Management &lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Exposure Management integrates with Defender Vulnerability Management helping security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization's digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track and delegate vulnerabilities within the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;To learn more about, see &lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/initiatives" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt; about security initiatives or &lt;A href="https://aka.ms/exposuremanagement/blogs" target="_blank" rel="noopener"&gt;blog series&lt;/A&gt; introducing Exposure Management.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for additional Defender Vulnerability Management, please visit&amp;nbsp;&lt;A title="https://learn.microsoft.com/en-us/defender-vulnerability-management/defender-vulnerability-management" href="https://learn.microsoft.com/en-us/defender-vulnerability-management/defender-vulnerability-management" target="_blank" rel="noopener"&gt;Documentation page&lt;/A&gt;&lt;A title="https://learn.microsoft.com/en-us/defender-vulnerability-management/defender-vulnerability-management" href="https://learn.microsoft.com/en-us/defender-vulnerability-management/defender-vulnerability-management" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;and&amp;nbsp;&lt;/SPAN&gt;&lt;A id="LPlnk531938" title="https://techcommunity.microsoft.com/t5/blogs/blogworkflowpage/blog-id/Vulnerability-Management/article-id/222" href="https://techcommunity.microsoft.com/t5/blogs/blogworkflowpage/blog-id/Vulnerability-Management/article-id/222" target="_blank" rel="noopener"&gt;Ninja page&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 08:24:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/using-export-api-with-defender-vulnerability-management/ba-p/4191046</guid>
      <dc:creator>Ayelet_Artzi</dc:creator>
      <dc:date>2024-07-24T08:24:53Z</dc:date>
    </item>
    <item>
      <title>Guidance for handling “regreSSHion” (CVE-2024-6387) using Microsoft Security capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/guidance-for-handling-regresshion-cve-2024-6387-using-microsoft/ba-p/4185940</link>
      <description>&lt;P&gt;&lt;SPAN class="TextRun SCXW107179235 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy" data-ccp-parastyle-defn="{&amp;quot;ObjectId&amp;quot;:&amp;quot;0eb207c6-3f8e-404a-aa6c-377fe8da17da|76&amp;quot;,&amp;quot;ClassId&amp;quot;:1073872969,&amp;quot;Properties&amp;quot;:[469775450,&amp;quot;Body Copy&amp;quot;,201340122,&amp;quot;2&amp;quot;,134234082,&amp;quot;true&amp;quot;,134233614,&amp;quot;true&amp;quot;,469778129,&amp;quot;BodyCopy&amp;quot;,335572020,&amp;quot;6&amp;quot;,469777841,&amp;quot;Segoe UI&amp;quot;,469777842,&amp;quot;Segoe UI&amp;quot;,469777843,&amp;quot;Times New Roman&amp;quot;,469777844,&amp;quot;Segoe UI&amp;quot;,469769226,&amp;quot;Segoe UI,Times New Roman&amp;quot;,335551500,&amp;quot;0&amp;quot;,268442635,&amp;quot;20&amp;quot;,335559739,&amp;quot;120&amp;quot;,335559738,&amp;quot;120&amp;quot;,201342447,&amp;quot;5&amp;quot;,201342448,&amp;quot;1&amp;quot;,335559704,&amp;quot;1025&amp;quot;,335559705,&amp;quot;1033&amp;quot;,335551547,&amp;quot;1033&amp;quot;]}"&gt;Investigating and assessing vulnerabilities within the software &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;inventory&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt; is crucial, especially in light of&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt; high&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;-&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;severity vulnerabilities like&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt; the recent &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;OpenSSH&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;regreSSHion&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt; vulnerability&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;. Such security risks are becoming increasingly common, often exploiting software dependencies and third-party services. The notoriety of incidents like the TeamViewer breach and the XZ Utils backdoor underscores the urgency for comprehensive vulnerability management and strategies to minimize the attack surface&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;. &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;In this blog post, we delve into the methodology for probing such incidents. We will demonstrate how organizations can harness the capabilities of Attack Path analysis &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;together with Microsoft Defender suite of products&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;to pinpoint and neutralize threats arising from &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;such events&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun CommentStart SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;.&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt; Our examination will center &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;on&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;:&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt;mapping&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW107179235 BCX8" data-ccp-parastyle="Body Copy"&gt; vulnerabilities, evaluating affected assets, gauging potential impact via blast radius analysis, and implementing efficacious mitigations.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW107179235 BCX8" data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Mapping Vulnerabilities and Impacted Assets&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:228}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The first step in managing an incident is to map affected software within your organization’s assets. Defender Vulnerability Management solution provides a comprehensive vulnerability assessment across all your devices.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Example: Mapping the regreSSHion vulnerability&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN data-contrast="none"&gt;To map the presence of the regreSSHion vulnerability (CVE-2024-6387) in your environment, you can use the following KQL query in &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Advanced Hunting in Microsoft Defender portal:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="csharp"&gt;DeviceTvmSoftwareVulnerabilities
| where CveId == "CVE-2024-6387"
| summarize by DeviceName, DeviceId, strcat(OSPlatform, " ", OSVersion), SoftwareName, SoftwareVersion&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;This query searches software vulnerabilities related to the specified CVE and summarizes them by device name and id, you can use&amp;nbsp;&lt;A href="https://security.microsoft.com/v2/advanced-hunting?query=H4sIAKqLj2YAA2WQwQrCMBBE31nwH4onhQqiol48WQ9eVFB6t5piobXQRkXx450EhFIJm0wms7O7iTA8yDjrPAoVHChJsTw5UYmNuZNzE6rEJNLmCqsw1HTp8CGQ-uoVRnglH8OGi_BSK6AnLmbNkDEjxVRoxoQFc739PGpVKrRc3Yy390p4aY8aXW71XugMW7yrF3oXq_yzVJY-O82zV8fulmqySrmh78iFQ04R-95rOZWadOD59j806_7_UTP_C0YZWmlUAQAA&amp;amp;timeRangeId=day" target="_self"&gt;this link&lt;/A&gt; to open the query in your environment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Example: Mapping devices with vulnerable OpenSSH version installed&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Utilizing software inventory to map devices is advisable even when a CVE hasn’t been officially published or when there’s a specific requirement to upgrade a particular package and version.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="csharp"&gt;DeviceTvmSoftwareInventory 
| where SoftwareName has "openssh"
| extend ParsedSoftwareVersion = extract(@"(\b(\d\.\d)|(\b\d\.\d))", 0, SoftwareVersion) // extract version number (e.g. "1:8.9p1-3ubuntu0.5" &amp;gt; "8.9")
| where 
    // filter for potentially vulnerable versions only
    toreal(ParsedSoftwareVersion) &amp;lt; 4.4 or 
    toreal(ParsedSoftwareVersion) &amp;gt;= 8.5 and toreal(ParsedSoftwareVersion) &amp;lt; 9.8
| project DeviceId, DeviceName, SoftwareName, SoftwareVersion, ParsedSoftwareVersion, SoftwareVendor&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;This query searches for devices that have the vulnerable OpenSSH versions installed, you can use &lt;A href="https://security.microsoft.com/v2/advanced-hunting?query=H4sIAHWLj2YAA6WTzU8CMRDF39nE_6HhBAmiREwWo8QDFy7GROPJCx-LYBaW7LIiiX-8v84CWT4kIaRpp52-vpm-adsK9a2x-tg3ZhO9KtZQcy3UVYK3oyn-kHHOTqKlnC51oV_sQiN2PMrtnXvGTmxnxCzFlkDMjCmljViveUL9cNLvDFi9GEPKerDH-m7xUjKOQTs9bk4nIPrYsp5gLutDPRsH9JrZCrFy_7a3Ar4Kz42NxyNWQFzTdqM606iY2VQZ9--Z1xE3JN4n3etQ170C5k30qOtKt2B7dK9xRh413YFyahk6R5aIfUh373Orlmc2JIfI9ExsFZudYeerOo7JOqItLe-M2dTQXbKIjHX7Nr563voTxXj5iwiNrXxC3byKD_QGN2sYd7Jzk3OYW_YqAlPRgcpf1bm5NuELNhWYgYj1BTKvfrvwjzpwVnd8699w6IUd29vOpXrS7_iPz-vhtfgDHcnnWvwDAAA&amp;amp;timeRangeId=day" target="_self"&gt;this link&lt;/A&gt; to open the query in your environment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Understanding Potential Impact: Attack Path Analysis&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:228}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Understanding the blast radius of impacted devices is critical for assessing the potential impact on your organization. Microsoft Security offers attack path analysis to visualize possible lateral movement steps an adversary might take.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Leveraging Microsoft Defender for Cloud&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Defender for Cloud (MDC) discovers all cloud resources affected by the vulnerability which are also exposed to the internet through SSH ports. MDC highlights them in the ‘attack path analysis’ tool:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Using attack path analysis, you can easily find all your exposed machines that are also potentially accessible for attackers. Use the following attack path title to filter the view only for exposed machines:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="43" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Internet exposed Azure VM with OpenSSH regreSSHion vulnerability (CVE-2024-6387)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="43" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Internet exposed AKS pod is running a container with OpenSSH regreSSHion vulnerability (CVE-2024-6387)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="43" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Internet exposed EKS pod is running a container with OpenSSH regreSSHion vulnerability (CVE-2024-6387)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Note: These attack path updates are rolling out and should be available for all customers shortly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Using Cloud Security Explorer&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;You can use the Cloud Security Explorer feature within Defender for Cloud to perform queries related to your posture across Azure, AWS, GCP, and code repositories. This allows you to investigate the specific CVE, identify affected machines, and understand the associated risks.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;We have created specific queries for this CVE that help you to easily get an initial assessment of the threat this vulnerability creates for your organization, with choices for customization:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22family%22%2C%22properties%22%3A%7B%22source%22%3A%22Virtual%20machines%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22vulnerabilities%22%2C%22properties%22%3A%7B%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-6387%22%5D%7D%7D%5D%7D%7D%7D%7D%2C%7B%22type%22%3A%22insights%22%2C%22properties%22%3A%7B%22name%22%3A%221f24d55a-df0f-4772-9090-4629c2d6bfff%22%2C%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22port%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%2222%22%5D%7D%7D%5D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D" target="_self"&gt;&lt;SPAN&gt;VMs with regreSSHion critical vulnerability (CVE-2024-6387)&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22K8s-pod%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22insights%22%2C%22properties%22%3A%7B%22name%22%3A%221f24d55a-df0f-4772-9090-4629c2d6bfff%22%2C%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22port%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%2222%22%5D%7D%7D%5D%7D%7D%7D%7D%2C%7B%22type%22%3A%22connection%22%2C%22properties%22%3A%7B%22name%22%3A%2222f2a139-1009-4a13-b15b-67ea057a8efe%22%2C%22direction%22%3A%22outgoing%22%2C%22target%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22container%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22connection%22%2C%22properties%22%3A%7B%22name%22%3A%2222f2a139-1009-4a13-b15b-67ea057a8efe%22%2C%22direction%22%3A%22outgoing%22%2C%22target%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22container-image%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22vulnerabilities%22%2C%22properties%22%3A%7B%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22oper" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Container images with regreSSHion critical vulnerability (CVE-2024-6387)&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22family%22%2C%22properties%22%3A%7B%22source%22%3A%22Code%20repositories%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22vulnerabilities%22%2C%22properties%22%3A%7B%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-6387%22%5D%7D%7D%5D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Code repositories affected by CVE-2024-6387&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;A href="https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22family%22%2C%22properties%22%3A%7B%22source%22%3A%22Code%20repositories%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22connection%22%2C%22properties%22%3A%7B%22name%22%3A%2258c091ac-eff3-4caf-8aa2-f70a02cd0ff3%22%2C%22direction%22%3A%22outgoing%22%2C%22target%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22container-image%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22vulnerabilities%22%2C%22properties%22%3A%7B%22conditions%22%3A%7B%22type%22%3A%22filtergroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22cveId%22%2C%22operator%22%3A%22equals%22%2C%22values%22%3A%5B%22CVE-2024-6387%22%5D%7D%7D%5D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Container images affected by CVE-2024-6387 pushed by code repositories&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Advanced Hunting: Analyzing Attack Paths Across the Organization with Microsoft Security Exposure Management&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To analyze the blast radius (i.e. the potential impact of a compromised device) of the &lt;EM&gt;regreSSHion&lt;/EM&gt; vulnerability across different environments and assets, you can use the powerful `graph-match` KQL command under Advanced Hunting to identify other critical assets that might be at risk.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The following query (wrapped in the &lt;/SPAN&gt;&lt;EM&gt;BlastRadiusAttackPathMapping&lt;/EM&gt; &lt;SPAN data-contrast="none"&gt;function for easier repeated usage) maps and returns possible attack paths an adversary can take. &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;The function receives as an input:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;EM&gt;&lt;STRONG&gt;sourceTypes&lt;/STRONG&gt;:&lt;/EM&gt;&lt;SPAN data-contrast="none"&gt; filter for type of device that can be considered as entry points (e.g. virtual machine, endpoint device)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;EM&gt;sourceProperties&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;EM&gt;:&lt;/EM&gt; filter for properties the above devices must have (e.g. high severity vulnerabilities)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;EM&gt;sourceCveIDs&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;EM&gt;:&lt;/EM&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;filter for specific vulnerabilities (CVE IDs) the above devices must have&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;EM&gt;&lt;STRONG&gt;targetTypes&lt;/STRONG&gt;:&lt;/EM&gt;&lt;SPAN data-contrast="none"&gt; filter for type of device that are considered as the target of the path (e.g. storage account, privileged user, virtual machine, endpoint device)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;EM&gt;targetProperties&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;EM&gt;:&lt;/EM&gt; filter for properties the target devices must have (e.g. critical assets)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;&lt;EM&gt;&lt;STRONG&gt;maxPathLength&lt;/STRONG&gt;:&lt;/EM&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;maximum hops for each attack path&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;&lt;EM&gt;&lt;STRONG&gt;resultCountLimit&lt;/STRONG&gt;:&lt;/EM&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;maximum amount of attack paths calculated&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="csharp"&gt;let BlastRadiusAttackPathMapping = (sourceTypes: dynamic, sourceProperties: dynamic, sourceCveIDs: dynamic 
    , targetTypes: dynamic, targetProperties: dynamic 
    , maxPathLength: long = 6, resultCountLimit: long = 10000)  
{ 
    let edgeTypes               = pack_array
                              (
                                  'has permissions to',
                                  'contains',
                                  'can authenticate as',
                                  'can authenticate to',
                                  'can remote interactive logon to' 
        ,
                                  'can interactive logon to',
                                  'can logon over the network to',
                                  'contains',
                                  'has role on',
                                  'member of'
                              ); 
    let sourceNodePropertiesFormatted = strcat('(', strcat_array(sourceProperties, '|'), ')'); 
    let targetNodePropertiesFormatted = strcat('(', strcat_array(targetProperties, '|'), ')'); 
    let nodes = ( 
        ExposureGraphNodes 
        | project
            NodeId,
            NodeName,
            NodeLabel 
            ,
            SourcePropertiesExtracted = iff(sourceProperties != "[\"\"]", extract_all(sourceNodePropertiesFormatted, tostring(NodeProperties)), pack_array('')) 
            ,
            TargetPropertiesExtracted = iff(targetProperties != "[\"\"]", extract_all(targetNodePropertiesFormatted, tostring(NodeProperties)), pack_array('')) 
            ,
            criticalityLevel = toint(NodeProperties.rawData.criticalityLevel.criticalityLevel) 
        | mv-apply SourcePropertiesExtracted, TargetPropertiesExtracted on ( 
            summarize
                SourcePropertiesExtracted = make_set_if(SourcePropertiesExtracted, isnotempty(SourcePropertiesExtracted)) 
                ,
                TargetPropertiesExtracted = make_set_if(TargetPropertiesExtracted, isnotempty(TargetPropertiesExtracted)) 
            ) 
        | extend
            CountSourceProperties = coalesce(array_length(SourcePropertiesExtracted), 0) 
            ,
            CountTargetProperties = coalesce(array_length(TargetPropertiesExtracted), 0) 
        | extend
            SourceRelevancyByLabel = iff(NodeLabel in (sourceTypes) or sourceTypes == "[\"\"]", 1, 0) 
            ,
            TargetRelevancyByLabel = iff(NodeLabel in (targetTypes) or targetTypes == "[\"\"]", 1, 0) 
            ,
            SourceRelevancyByProperties = iff(CountSourceProperties &amp;gt; 0 or sourceProperties == "[\"\"]", 1, 0) 
            ,
            TargetRelevancyByProperties = iff(CountTargetProperties &amp;gt; 0 or targetProperties == "[\"\"]", 1, 0) 
        | extend
            SourceRelevancy = iff(SourceRelevancyByLabel == 1 and SourceRelevancyByProperties == 1, 1, 0) 
            ,
            TargetRelevancy = iff(TargetRelevancyByLabel == 1 and TargetRelevancyByProperties == 1, 1, 0) 
        ); 
    let edges = ( 
        ExposureGraphEdges 
        | where EdgeLabel in (edgeTypes) 
        | project
            EdgeId,
            EdgeLabel,
            SourceNodeId,
            SourceNodeName,
            SourceNodeLabel,
            TargetNodeId,
            TargetNodeName,
            TargetNodeLabel 
        ); 
    let vulnerableDevices = ( 
        ExposureGraphEdges 
        | where iif(sourceCveIDs == "[\"\"]", true, (SourceNodeName in (sourceCveIDs)) and (EdgeLabel == "affecting")) // filter for CVEs only if listed, otherwise return all nodes 
        | project NodeId=TargetNodeId 
        | distinct NodeId 
        ); 
    let paths = ( 
        edges 
        // Build the graph from all the nodes and edges and enrich it with node data (properties) 
        | make-graph SourceNodeId --&amp;gt; TargetNodeId with nodes on NodeId 
        // Look for existing paths between source nodes and target nodes with up to predefined number of hops 
        | graph-match cycles=none (s)-[e*1 .. maxPathLength]-&amp;gt;(t) 
            // Filter only by paths with relevant sources and targets - filtered by node types and properties 
            where (s.SourceRelevancy == 1 and t.TargetRelevancy == 1) and s.NodeId in (vulnerableDevices) 
            project SourceName                = s.NodeName 
            , SourceType                = s.NodeLabel 
            , SourceId                  = s.NodeId 
            , SourceProperties          = s.SourcePropertiesExtracted 
            , CountSourceProperties     = s.CountSourceProperties 
            , SourceRelevancy           = s.SourceRelevancy 
            , TargetName                = t.NodeName 
            , TargetType                = t.NodeLabel 
            , TargetId                  = t.NodeId 
            , TargetProperties          = t.TargetPropertiesExtracted 
            , CountTargetProperties     = t.CountTargetProperties 
            , TargetRelevancy           = t.TargetRelevancy 
            , EdgeLabels                = e.EdgeLabel 
            , EdgeIds                   = e.EdgeId 
            , EdgeAllTargetIds          = e.TargetNodeId 
            , EdgeAllTargetNames        = e.TargetNodeId 
            , EdgeAllTargetTypes        = e.TargetNodeLabel 
        | extend
            PathLength                    = array_length(EdgeIds) + 1 
            ,
            PathId                        = hash_md5(strcat(SourceId, strcat(EdgeIds), TargetId)) 
        ); 
    let relevantPaths = ( 
        paths 
        | extend
            NodesInPath = array_concat(pack_array(SourceId), EdgeAllTargetIds),
            NodeLabelsInPath = array_concat(pack_array(SourceType), EdgeAllTargetTypes) 
        | extend NodesInPathList = NodesInPath 
        // Wrap the path into meaningful format (can be tweaked as needed) 
        | mv-expand with_itemindex = SortIndex
            EdgeIds to typeof(string),
            EdgeLabels to typeof(string) 
            ,
            NodesInPath to typeof(string),
            NodeLabelsInPath to typeof(string) 
        | sort by PathId, SortIndex asc 
        | extend step = strcat
                ( 
                    iff(isnotempty(NodesInPath), strcat('(', NodeLabelsInPath, ' ', SourceName, ':', NodesInPath, ')'), '') 
            ,
                    iff(CountSourceProperties &amp;gt; 0 and NodesInPath == SourceId, SourceProperties, '') 
            ,
                    iff(CountTargetProperties &amp;gt; 0 and NodesInPath == TargetId, TargetProperties, '') 
            ,
                    iff(isnotempty(EdgeLabels), strcat('-', EdgeLabels, '-&amp;gt;'), '')
                ) 
        | summarize Path = make_list(step), take_any(*) by PathId 
        // Project relevant fields 
        | project
            SourceName,
            SourceType,
            SourceId,
            SourceProperties,
            CountSourceProperties,
            SourceRelevancy 
            ,
            TargetName,
            TargetType,
            TargetId,
            TargetProperties,
            CountTargetProperties,
            TargetRelevancy 
            ,
            PathId,
            PathLength,
            Path 
        | top resultCountLimit by PathLength asc 
        ); 
    relevantPaths 
}; 
// Calling the function starts here  
let sourceTypes         = pack_array('microsoft.compute/virtualmachines', 'compute.instances', 'ec2.instance', 'device', 'container-image', 'microsoft.hybridcompute/machines'); 
let sourceProperties    = pack_array('hasHighOrCritical'); // filter for assets with severe vulnerabilities 
let sourceCveIDs        = pack_array('CVE-2024-6387'); // filter for entry points with regSSHion CVE 
let targetTypes         = pack_array('');  
let targetProperties    = pack_array('criticalityLevel'); // filter for paths that ends with critical assets 
BlastRadiusAttackPathMapping(sourceTypes, sourceProperties, sourceCveIDs, targetTypes, targetProperties) 
| project-reorder SourceType, SourceName, TargetType, TargetName, Path 
| project-keep SourceType, SourceName, TargetType, TargetName, Path &lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;For our purposes we are filtering for “compute” devices (such as servers, VMs, endpoints) with high severity vulnerabilities, specifically the regSSHion CVE ID that can be utilized by adversaries to serve as an entry point for an attack.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;We’re also looking to map paths only to devices that have a critical role in the environment (such as a Domain Controller, user with privileged role, etc.)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;An example for such query results:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The function can be easily reused, the only part that should be modified is the parameters and the function calling, right below &lt;BR /&gt;&lt;EM&gt;Line 177&lt;/EM&gt;&amp;nbsp;&lt;EM&gt;“&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;// Calling the function starts here:“&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Recommendations for Mitigation and Best Practices&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:228}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Mitigating risks associated with vulnerabilities requires a combination of proactive measures and real-time defenses. Here are some recommendations:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Apply Patches and Updates:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Regularly update and patch all software to address known vulnerabilities. Use Defender Vulnerability Management to monitor and enforce patch compliance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Application Blocking:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Once CVE is assigned, utilize Defender Vulnerability Management's application blocking capability to prevent the execution of vulnerable or malicious software. This feature is available in premium plans only (&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-vulnerability-management/tvm-block-vuln-apps#version-requirements" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;learn more&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Remediate vulnerabilities&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;: Use Defender for Cloud ‘remediate vulnerabilities’ recommendations to remediate affected VMs and containers across your multi-cloud environment. (&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;learn more&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Exposure Management:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Keep monitoring your environment using attack path analysis to block possible attack routes, using either the visualization tool under Exposure Management in Security.microsoft.com portal or the ‘graph-match’ KQL command (&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-security-exposure-management-graph-unveiling-the-power/ba-p/4148546" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;learn more&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Secure Management ports &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Use Defender for Cloud ‘Secure management ports’ recommendation to ensure the SSH ports on your machines are closed, or at least protected with just-in-time access control (&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-usage" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;learn more&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Network Segmentation:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Implement network segmentation to limit the spread of an attack and protect critical assets.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Advanced Hunting:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Continuously monitor your environment using advanced hunting queries to detect unusual activities and potential exploitation attempts&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Conclusion&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:228}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;By following these guidelines and utilizing end-to-end integrated Microsoft Security products, organizations can better prepare for, prevent and respond to attacks, ensuring a more secure and resilient environment.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;While the above process provides a comprehensive approach to protecting your organization, continual monitoring, updating, and adapting to new threats are essential for maintaining robust security.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:120}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 20:28:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/guidance-for-handling-regresshion-cve-2024-6387-using-microsoft/ba-p/4185940</guid>
      <dc:creator>BrjannBrekkan</dc:creator>
      <dc:date>2024-07-25T20:28:02Z</dc:date>
    </item>
    <item>
      <title>Defender support for CVE-2024-3400 affecting Palo Alto Networks firewalls</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/defender-support-for-cve-2024-3400-affecting-palo-alto-networks/ba-p/4113917</link>
      <description>&lt;P&gt;&lt;SPAN&gt;On April 12, Palo Alto Networks released a &lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener"&gt;security advisory&lt;/A&gt; on CVE-2024-3400, a critical vulnerability affecting several versions of PAN-OS, the operating system that runs on the company’s firewalls. According to the vendor advisory, the vulnerability may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Starting April 14, 2024, patches are expected to become available.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE width="592px"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="121.689px"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVE&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="273.555px"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Description&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="102.578px"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVSSv4&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="93.5449px"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Severity&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="121.689px"&gt;
&lt;P&gt;&lt;SPAN&gt;CVE-2024-3400&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="273.555px"&gt;
&lt;P&gt;&lt;SPAN&gt;Command Injection Vulnerability in the GlobalProtect Gateway feature of PAN-OS&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="102.578px"&gt;
&lt;P&gt;&lt;SPAN&gt;10.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="93.5449px"&gt;
&lt;P&gt;&lt;SPAN&gt;Critical&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Palo Alto Networks customers are only vulnerable if they are using PAN-OS 10.2, PAN-OS 11.0, and/or PAN-OS 11.1 firewalls with the configurations for both GlobalProtect gateway and/or&amp;nbsp;&lt;SPAN&gt;GlobalProtect portal&lt;/SPAN&gt; and device telemetry enabled.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;BR /&gt;Palo Alto Networks’ &lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_self"&gt;advisory&amp;nbsp;&lt;/A&gt;indicates that CVE-2024-3400 has been exploited in the wild in “a limited number of attacks.” The company has given the vulnerability their highest urgency rating. Palo Alto Networks has released an in-depth&amp;nbsp;&lt;A href="https://unit42.paloaltonetworks.com/cve-2024-3400/" target="_blank" rel="noopener"&gt;blog&lt;/A&gt; on the scope of the attack, indicators of compromise, and adversary behavior observations. We highly recommend reviewing both the blog and the advisory for latest information.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;BR /&gt;&lt;STRONG&gt;Identify affected devices with Defender Vulnerability Management &lt;BR /&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P data-unlink="true"&gt;The following Advanced Hunting query provides a list of the potentially vulnerable devices with PAN-OS affected versions:&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DeviceTvmSoftwareInventory&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;| where&amp;nbsp;SoftwareName has "pan-os"&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;| where SoftwareVersion startswith "11.1." or SoftwareVersion startswith "11.0." or&amp;nbsp;SoftwareVersion startswith "10.2."&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;| summarize by DeviceId, DeviceName, SoftwareName, SoftwareVersion&lt;/P&gt;
&lt;H4&gt;&lt;SPAN class="LineBreakBlob BlobObject DragDrop SCXW134186894 BCX8"&gt;&lt;BR class="SCXW134186894 BCX8" /&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="TextRun SCXW134186894 BCX8" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun CommentStart CommentHighlightPipeClickedV2 CommentHighlightClicked SCXW134186894 BCX8"&gt;Identify affected &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun CommentHighlightClicked SCXW134186894 BCX8"&gt;multi-cloud resources&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun CommentHighlightClicked SCXW134186894 BCX8"&gt; with Defender for Cloud&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="LineBreakBlob BlobObject DragDrop CommentHighlightPipeClickedV2 SCXW134186894 BCX8"&gt;&lt;SPAN class="SCXW134186894 BCX8"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN class="TextRun SCXW134186894 BCX8" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW134186894 BCX8"&gt;&lt;SPAN&gt;To identify affected multi-cloud resources using Defender for Cloud, you can utilize the Security Explorer feature. This will help detect all cloud resources affected by the vulnerability in Azure, AWS, and GCP.&amp;nbsp; To get started,&amp;nbsp;&lt;A href="https://ms.portal.azure.com#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22family%22%2C%22properties%22%3A%7B%22source%22%3A%22Virtual%20machines%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22connection%22%2C%22properties%22%3A%7B%22name%22%3A%22c04a2812-eee9-4d37-90bd-58b410a1219d%22%2C%22direction%22%3A%22outgoing%22%2C%22target%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22software%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22software_name%22%2C%22operator%22%3A%22contains%22%2C%22values%22%3A%5B%22PAN-OS%22%5D%7D%7D%2C%7B%22type%22%3A%22filter%22%2C%22properties%22%3A%7B%22field%22%3A%22software_version%22%2C%22operator%22%3A%22matchesregex%22%2C%22values%22%3A%5B%22%5E((11%5C%5C.%5B01%5D)%7C(10%5C%5C.2))%5C%5C.%22%5D%7D%7D%5D%7D%7D%7D%7D%7D%7D%5D%7D%7D%7D%7D%7D%7D" target="_self"&gt;use this query&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="TextRun SCXW127346396 BCX8" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW127346396 BCX8"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Mitigation guidance&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For additional information and the latest remediation guidance, please see Palo Alto Networks’ advisory.&lt;BR /&gt;This issue is fixed in hotfix releases of PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. Hotfixes for other commonly deployed maintenance releases will also be made available to address this issue. Please see details for ETAs regarding the upcoming hotfixes&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener"&gt;in the security advisory.&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We will update this blog with information and guidance as needed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 14:35:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/defender-support-for-cve-2024-3400-affecting-palo-alto-networks/ba-p/4113917</guid>
      <dc:creator>NimrodRoimy</dc:creator>
      <dc:date>2024-04-15T14:35:35Z</dc:date>
    </item>
    <item>
      <title>Microsoft FAQ and guidance for XZ Utils backdoor</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/microsoft-faq-and-guidance-for-xz-utils-backdoor/ba-p/4101961</link>
      <description>&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;On March 28, 2024 a backdoor was identified in XZ Utils. This vulnerability, &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094" target="_blank" rel="noopener"&gt;CVE-2024-3094&lt;/A&gt; with a CVSS score of 10 is a result of a software supply chain compromise impacting versions 5.6.0 and 5.6.1 of XZ Utils. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recommended organizations to downgrade to a previous non-compromised XZ Utils version. &lt;SPAN&gt;See below details and Microsoft response for this vulnerability.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Change log:&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;4 April: Threat Intelligence, Microsoft Defender Antivirus and Defender for Endpoint added to &lt;STRONG&gt;Guidance on using Microsoft products to assess your exposure to CVE-2024-3094 section.&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;FONT size="5" color="#000000"&gt;&lt;SPAN&gt;Frequently Asked Questions&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;What is XZ Utils and what is the library used for?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;XZ Utils is data compression software included in common Linux distributions that plays a crucial role in compressing various file formats, including release tarballs, software packages, kernel images, and initramfs images.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;Has this backdoor code been exploited?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;A href="https://securityboulevard.com/2024/03/an-accidental-discovery-of-a-backdoor-likely-prevented-thousands-of-infections/" target="_blank" rel="noopener"&gt;Originally found&lt;/A&gt;&lt;SPAN&gt; by a Microsoft employee &lt;/SPAN&gt;Andres Freund&lt;SPAN&gt;, the full extent of this vulnerability impact is still being investigated, we know it can be triggered by remote unprivileged systems connecting to SSH ports. This activation can lead to potentially compromise system integrity and performance&lt;/SPAN&gt;&lt;SPAN&gt; issues.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT size="4"&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;What Linux distributions are affected?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;Please see below the list of impacted Linux distributions. As this is a developing situation, we anticipate we will have further clarity for additional distributions and will continue to update this blog as necessary.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;TABLE style="border-style: solid; width: 726px;" width="724px"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="288.451px" height="57px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;Fedora Rawhide&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="436.706px" height="57px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;A href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users" target="_blank" rel="noopener"&gt;https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="288.451px" height="57px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;Fedora 41&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="436.706px" height="57px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;A href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users" target="_blank" rel="noopener"&gt;https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="288.451px" height="84px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;Debian testing, unstable and experimental distributions versions 5.5.1alpha-0.1 to 5.6.1-1.&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="436.706px" height="84px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;A href="https://lists.debian.org/debian-security-announce/2024/msg00057.html" target="_blank" rel="noopener"&gt;https://lists.debian.org/debian-security-announce/2024/msg00057.html&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="288.451px" height="57px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;openSUSE Tumbleweed and openSUSE MicroOS&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="436.706px" height="57px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;A href="https://news.opensuse.org/2024/03/29/xz-backdoor/" target="_blank" rel="noopener"&gt;https://news.opensuse.org/2024/03/29/xz-backdoor/&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="288.451px" height="30px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;Kali Linux (Discovery supported)&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="436.706px" height="30px"&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;A href="https://www.kali.org/blog/about-the-xz-backdoor/" target="_blank" rel="noopener"&gt;https://www.kali.org/blog/about-the-xz-backdoor/&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;Are there patches or mitigations available?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;CISA recommends developers and users to downgrade XZ Utils to an uncompromised version—such as &lt;/SPAN&gt;&lt;A href="https://github.com/tukaani-project/xz/releases/tag/v5.4.6" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;XZ Utils 5.4.6 Stable.&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; See &lt;/SPAN&gt;&lt;A href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users" target="_blank" rel="noopener"&gt;Red Hat’s advisory&lt;/A&gt;&lt;SPAN&gt; for more information.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;&lt;FONT size="5"&gt;Guidance on using Microsoft products to assess your exposure to CVE-2024-3094&lt;/FONT&gt; &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;In the last few days our teams have worked to provide Microsoft customers with enhancements and guidance to assist in detecting software products in your environments which are affected by the vulnerability and a thorough discovery of the impacted devices which have the vulnerable software version installed. Below you will find guidance on how you can use Defender Vulnerability Management, Defender for Cloud, Microsoft Security Exposure Management, Threat Intelligence, Microsoft Defender Antivirus, Microsoft Defender for Endpoint. We will continue our work and will update this blog with more product updates and guidance.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT size="5" color="#000000"&gt;&lt;SPAN&gt;Microsoft Defender Vulnerability Management&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;With Defender Vulnerability Management you see available information about CVE-2024-3094 in the Weaknesses inventory and can assess the presence of this vulnerability in your organization. &amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="4" color="#000000"&gt;&lt;STRONG&gt;&lt;EM&gt;Note&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;: you may need to change the default view by adding the ‘Doesn’t affect my organization’ filter option (as the vulnerability may not exist in your environment).&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;img /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;The side panel that opens up when you click the CVE includes detailed description of the vulnerability with potential impact and suggested remediation steps and additional CVE metadata.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;img /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;The vulnerability page provides additional insights such as list of &lt;STRONG&gt;Affected software&lt;/STRONG&gt; products, list of &lt;STRONG&gt;Exposed devices&lt;/STRONG&gt; which are directly exposed to the vulnerability, and &lt;STRONG&gt;Security recommendations&lt;/STRONG&gt; to mitigate risk.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;The following advanced hunting queries will allow security teams to perform an immediate assessment of the impact of CVE-2024-3094 on their environment.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;FONT size="4" color="#000000"&gt;This query will provide a list of all installed versions of XZ in your organization:&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;FONT size="4" color="#000000"&gt;&lt;EM&gt;DeviceTvmSoftwareInventory&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;FONT size="4" color="#000000"&gt;&lt;EM&gt;| where SoftwareName startswith “liblzma” or SoftwareName startswith “xz”&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;FONT size="4" color="#000000"&gt;&lt;EM&gt;| summarize dcount(DeviceId) by SoftwareVendor, SoftwareName, SoftwareVersion&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;This query will provide a list of devices with vulnerable version installed:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;FONT size="4" color="#000000"&gt;&lt;EM&gt;DeviceTvmSoftwareInventory&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;FONT size="4" color="#000000"&gt;&lt;EM&gt;| where SoftwareName startswith “liblzma” or SoftwareName startswith “xz”&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;FONT size="4" color="#000000"&gt;&lt;EM&gt;| where SoftwareVersion contains “5.6.0” or SoftwareVersion contains “5.6.1”&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT size="5" color="#000000"&gt;&lt;SPAN&gt;Microsoft Defender for Cloud&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Attack Paths&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;Defender for Cloud discovers all cloud resources affected by the vulnerability which are also exposed to the internet in SSH ports, and highlights them in the ‘attack path analysis’ page:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;Use the following attack path title to filter the view only for exposed machines:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT size="4" color="#000000"&gt;“Internet exposed Azure VM in SSH port with vulnerable XZ Utils version (CVE-2024-3094)”&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;FONT size="4" color="#000000"&gt;Security Explorer queries&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;You can use the Security Explorer feature within Defender for Cloud to perform queries related to your posture management across Azure, AWS &amp;amp; GCP, and investigate this specific CVE to find the affected machines and understand the risk associated with them.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;&amp;nbsp;We have developed dedicated queries for this CVE, which allow you to quickly gain an initial understanding of the risk posed by this vulnerability to your organization, with customization option:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;Virtual machines with vulnerable packages, which exposed on port 22 (&lt;A href="https://aka.ms/MdcXzVM1" target="_self"&gt;Link to query&lt;/A&gt;)&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;Virtual machines with CVE-2024-3094 detected, and exposed on port 22 (&lt;A href="https://aka.ms/MdcXzVM2" target="_self"&gt;Link to query&lt;/A&gt;)&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;Kubernetes pods running vulnerable container images, and exposed on port 22 (&lt;A href="https://aka.ms/MdcXzContainers" target="_self"&gt;Link to query&lt;/A&gt;)&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;U&gt;Note&lt;/U&gt;: The data is rolling out and should be available for all customers in the upcoming day.&lt;/FONT&gt;&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;Recommendations&lt;/H4&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;You can use Defender for Cloud recommendations to detect vulnerable resources in your multi-cloud environment (Azure, AWS &amp;amp; GCP) and protect them from exploit:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;&lt;U&gt;Remediate vulnerabilities&lt;/U&gt; - Use Defender for Cloud ‘remediate vulnerabilities’ recommendation to remediate affected VMs and containers across your multi-cloud environment.&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="4" color="#000000"&gt;&lt;SPAN&gt;&lt;U&gt;Secure Management ports&lt;/U&gt;&lt;/SPAN&gt;&lt;SPAN&gt; - Use Defender for Cloud ‘Secure management ports’ recommendation to ensure the SSH ports on your machines are closed, or at least protected with &lt;/SPAN&gt;just-in-time access control&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-usage" target="_blank" rel="noopener"&gt;Learn more&amp;gt;&lt;/A&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;FONT size="4" color="#000000"&gt;&lt;FONT size="5"&gt;Microsoft Security Exposure Management&lt;/FONT&gt; &lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;&lt;A href="https://aka.ms/exposuremgmtblog" target="_blank" rel="noopener"&gt;Recently released in public preview&lt;/A&gt;&amp;nbsp;, Exposure Management unifies data and insights from security tools and provides an organizational wide view of exposure and attack paths. We mention this here as it could provide you with additional insight providing further exploration capabilities to the attack path in Defender for Cloud and the integration of attack surface map visualization in exposed devices in Defender Vulnerability Management.&lt;/FONT&gt;&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;FONT color="#000000"&gt;Attack Surface Exploration&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;Using the new &lt;A href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/introducing-microsoft-security-exposure-management/ba-p/4080907" target="_blank" rel="noopener"&gt;Attack Surface Map&lt;/A&gt; , you can achieve comprehensive visibility into entities, their insights, and relationships within your organization. This tool offers interactive capabilities to visually explore the potential attack paths an attacker could take to traverse the organization, enabling a better understanding of your organization’s attack surface and allowing you to prioritize your focus to protect your critical assets effectively.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#000000"&gt;Attack Surface Map integration in Microsoft Defender Vulnerability Management provides the ability to further explore the potential impact by accessing the organizational context of each asset. Simply select an exposed device, click on &lt;U&gt;'View in map&lt;/U&gt;,' and gain a clearer understanding of its significance within your environment. This streamlined approach enhances your capability to address vulnerabilities promptly and efficiently.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Threat Intelligence&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Microsoft Defender Threat Intelligence&lt;/STRONG&gt; and &lt;STRONG&gt;Copilot for Security&lt;/STRONG&gt; customers can learn more in the Vulnerability Profile here: &lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/intel-profiles/CVE-2024-3094" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;https://security.microsoft.com/intel-profiles/CVE-2024-3094&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="TextRun SCXW178371011 BCX8" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun CommentStart CommentHighlightPipeRestV2 CommentHighlightRest SCXW178371011 BCX8"&gt;&lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt; customers can learn more in the &lt;SPAN&gt;CVE-2024-3094-XZ utility vulnerability report in Threat Analy&lt;/SPAN&gt;tics:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="TextRun SCXW178371011 BCX8" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun CommentStart CommentHighlightPipeRestV2 CommentHighlightRest SCXW178371011 BCX8"&gt;&lt;A class="Hyperlink SCXW72141890 BCX8" href="https://security.microsoft.com/threatanalytics3/89eab842-1d49-4b61-bacb-1f43361002c9/overview" target="_blank" rel="noreferrer noopener"&gt;&lt;SPAN class="TextRun Underlined SCXW72141890 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun CommentHighlightRest SCXW72141890 BCX8" data-ccp-charstyle="Hyperlink"&gt;https://security.microsoft.com/threatanalytics3/89eab842-1d49-4b61-bacb-1f43361002c9/overview&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="EOP CommentHighlightPipeRestV2 SCXW72141890 BCX8" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;FONT size="5"&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Defender Antivirus&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Defender Antivirus&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt; provides detections and protections for components and behaviors related to this threat under the following signatures:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="·" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;·&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Exploit:Linux/CVE-2024-3094&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="·" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;·&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Behavior:Linux/CVE-2024-3094&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="·" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;·&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Backdoor:Linux/XZBackdoorBuild&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="·" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;·&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Trojan:Linux/Multiverze&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Customers utilizing automatic updates do not need to take additional action. Enterprise customers managing updates should select the security intelligence build &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;1.409.17.0 &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;or newer and deploy it across their environments.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;FONT size="5"&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Defender for Endpoint&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Defender for Endpoint&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt; provides customers with detections and alerts. Alerts with the following title in the Defender portal can indicate threat activity related to this attack on your network:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:255,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;Possible CVE-2024-3094 exploitation&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;As the investigation of this event continues, this blog will be updated with additional insights from Microsoft Security, the latest information obtained from the different software vendors and from publicly available security feeds and bulletins.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2024 08:45:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/microsoft-faq-and-guidance-for-xz-utils-backdoor/ba-p/4101961</guid>
      <dc:creator>BrjannBrekkan</dc:creator>
      <dc:date>2024-04-07T08:45:04Z</dc:date>
    </item>
    <item>
      <title>Defender Vulnerability Management GA in government cloud</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/defender-vulnerability-management-ga-in-government-cloud/ba-p/4101955</link>
      <description>&lt;P&gt;Microsoft has established itself as a leading solution for vulnerability risk management (VRM) by leveraging its industry-leading threat intelligence and security expertise. Microsoft Defender Vulnerability Management covers the end-to-end VRM lifecycle to identify, assess, prioritize, and remediate vulnerabilities across platforms and workloads.&amp;nbsp; Making it an ideal tool for an expanded attack surface taking advantage of our context-aware, risk-based prioritization breach likelihood predictions and business contexts to prioritize vulnerabilities across their portfolio of managed and unmanaged devices. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Figure: Platform and workload coverage in Defender Vulnerability Management&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We are excited to announce that on 1 April, 2024 all Microsoft Defender Vulnerability Management capabilities are available to government cloud customers. &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Organizations across commercial, education and government environments can now get the complete set of capabilities for their environment. Defender Vulnerability Management has both &lt;A href="https://learn.microsoft.com/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities" target="_blank" rel="noopener"&gt;core and premium capabilities&lt;/A&gt; where the core capabilities are included as part of&amp;nbsp;Defender for Endpoint P2 and premium capabilities available as an add-on. For organizations that are not yet on Defender for Endpoint Plan 2 we also provide a standalone offer that includes both core and premium. Organizations looking for server protection for their hybrid cloud environment the vulnerability management core capabilities are available in Defender for Servers plan 1 and premium capabilities in Defender for Servers plan 2.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Figure: Availability of core and premium capabilities across offerings that include Defender Vulnerability Management for endpoints and servers.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information about the Defender Vulnerability Management premium capabilities now available in GCC, GCC-High and DOD in these blogs:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;!--StartFragment --&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="pf0"&gt;&lt;A class="cf0" href="https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/premium-capabilities-in-microsoft-defender-vulnerability/ba-p/3754990" target="_blank" rel="noopener"&gt;&lt;SPAN class="cf0"&gt;Defender Vulnerability Management Add-on GA&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="cf0"&gt; (3/2023)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="pf0"&gt;&lt;A class="cf0" href="https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/availability-of-defender-vulnerability-management-standalone-and/ba-p/3894735" target="_blank" rel="noopener"&gt;&lt;SPAN class="cf0"&gt;Defender Vulnerability Management Standalone GA&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="cf0"&gt; (8/2023)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;!--EndFragment --&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/defender-vulnerability-management-ga-in-government-cloud/ba-p/4101955</guid>
      <dc:creator>BrjannBrekkan</dc:creator>
      <dc:date>2024-04-01T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Continue to safeguard your organization during NVD update delays</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/continue-to-safeguard-your-organization-during-nvd-update-delays/ba-p/4096409</link>
      <description>&lt;P&gt;&lt;SPAN class="TextRun SCXW57390705 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt;The National Institute of Standards and Technology (NIST) recently announced &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt;updates to the National Vulnerability Database (NVD) program causing delays in enrichment process of its analysis of Common Vulnerabilities and Exposures (CVEs)&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt;. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="LineBreakBlob BlobObject DragDrop SCXW57390705 BCX8"&gt;&lt;SPAN class="SCXW57390705 BCX8"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR class="SCXW57390705 BCX8" /&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW57390705 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt;This means that important data is missing for a &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt;significant number&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt; of recent CVEs, &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt;lacking metadata, including severity &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt;scores&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt; and affected product details.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Message from NIST&lt;/H3&gt;
&lt;P&gt;&lt;SPAN class="TextRun SCXW57390705 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW57390705 BCX8"&gt;&lt;SPAN class="TextRun SCXW124604374 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW124604374 BCX8"&gt;“&lt;EM&gt;NIST is currently working to &lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN class="NormalTextRun SCXW124604374 BCX8"&gt;establish&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW124604374 BCX8"&gt; a consortium to address challenges in the NVD program and develop improved tools and methods. You will temporarily see delays in analysis efforts during this transition. We apologize for the inconvenience and ask for your patience as we work to improve the NVD program.”&lt;/SPAN&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN class="EOP SCXW124604374 BCX8" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp; Read more on &lt;A href="https://nvd.nist.gov" target="_blank" rel="noopener"&gt;https://nvd.nist.gov&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Microsoft Defender Vulnerability Management continues to safeguard your organization.&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Many organizations have expressed concerns about the delays in the NVD process, which has caused thousands of vulnerabilities to lack metadata. &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Defender Vulnerability Management provides accurate and timely vulnerability information from multiple sources&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and&lt;/SPAN&gt;&lt;SPAN&gt; does &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;not solely rely&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;on the NVD program. Our platform obtains vulnerabilities data from a variety of public security bulletins including NVD, IBM X-Force, Exploit-DB, Microsoft, RedHat, Ubuntu, Debian, Google, Adobe, Kubernetes and many more, and our vulnerability scoring is based on a diverse range of sources, collected automatically on an hourly/daily basis. We leverage direct information from the source and ensure the accuracy and timeliness of our vulnerability management solutions, ensuring that our customers are safeguarded against potential threats.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Our proprietary&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;A href="https://learn.microsoft.com/microsoft-365/security/defender-vulnerability-management/tvm-exposure-score" target="_self"&gt; exposure score&lt;/A&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;provides a risk-based assessment of the vulnerabilities that matter most, pinpointing organizational risk using business context, threat intel, and numerous other risk factors.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Furthermore, we're collaborating with NIST to understand their plan, while continuing to help customers continue to manage risk in the interim. &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In conclusion, during the current delays in the NVD process, Microsoft Defender Vulnerability Management customers can rest assured that our platform provides accurate and timely vulnerability information from multiple sources, ensuring that their organizations are safeguarded against potential threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2024 03:04:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/continue-to-safeguard-your-organization-during-nvd-update-delays/ba-p/4096409</guid>
      <dc:creator>BrjannBrekkan</dc:creator>
      <dc:date>2024-03-26T03:04:32Z</dc:date>
    </item>
    <item>
      <title>Vulnerability Descriptions enhanced with AI</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/vulnerability-descriptions-enhanced-with-ai/ba-p/4073501</link>
      <description>&lt;P&gt;Addressing software vulnerabilities can be challenging, especially when remediation and impact of the CVE may vary across different sources.&amp;nbsp;To address this challenge, the Defender Vulnerability Management team has developed an enhanced description for CVEs using AI technology. This innovative approach involves gathering information from diverse public online sources and validating it through Microsoft dedicated research teams providing a comprehensive summary of CVEs, their impact and recommended remediation steps to minimize risk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;The problem&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Understanding a CVE is important to comprehend the potential risks, how it can be exploited, and most importantly, the necessary steps for remediation or mitigation. Feedback from you, our customers and partners, has highlighted that our current CVE descriptions often fall short of providing a holistic view, leading to frustration and additional work having to gather information from multiple sources to bridge the informational gap.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN&gt;&lt;STRONG&gt;Feature overview&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;This update leverages advanced artificial intelligence to collect data from diverse open-to-the-internet resources, including NVD, IBM, Google, Debian and our own Microsoft research and threat intelligence, providing a comprehensive overview of CVEs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;We now provide comprehensive details and user-friendly description categorized into four key aspects:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="height: 224px; width: 780px;" width="780"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="184.833px" height="57px" class="lia-align-center"&gt;
&lt;P&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="184.833px" height="57px" class="lia-align-center"&gt;
&lt;P&gt;&lt;STRONG&gt;Impact&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="184.833px" height="57px" class="lia-align-center"&gt;
&lt;P&gt;&lt;STRONG&gt;Remediation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="184.833px" height="57px" class="lia-align-center"&gt;
&lt;P&gt;&lt;STRONG&gt;Additional Information&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="184.833px" height="167px"&gt;
&lt;P&gt;Understand the nature of the CVE with an informative overview.&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="184.833px" height="167px"&gt;
&lt;P&gt;Gain insights into the potential impact of the vulnerability on your systems and data.&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="184.833px" height="167px"&gt;
&lt;P&gt;Access actionable steps to address and resolve vulnerability effectively.&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="184.833px" height="167px"&gt;
&lt;P&gt;Delve deeper into additional details, ensuring you have all the necessary context at your fingertips.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is an example of the updated vulnerability descriptions.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your feedback and we hope you will be able to spend less time researching information and instead able to focus your time on proactively reducing risk and business disruption.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 05:28:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/vulnerability-descriptions-enhanced-with-ai/ba-p/4073501</guid>
      <dc:creator>BrjannBrekkan</dc:creator>
      <dc:date>2024-03-19T05:28:24Z</dc:date>
    </item>
    <item>
      <title>Become a Microsoft Defender Vulnerability Management Ninja</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/become-a-microsoft-defender-vulnerability-management-ninja/ba-p/4003011</link>
      <description>&lt;P&gt;Do you want to become a ninja for Microsoft Defender Vulnerability Management? We can help you get there! We collected content with multiple modules.&amp;nbsp;We will keep updating this training on a regular basis.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition, we offer you a&amp;nbsp;&lt;STRONG&gt;knowledge check&amp;nbsp;&lt;/STRONG&gt;based on the training material! Since there’s a lot of content, the goal of the knowledge checks is to help ensure understanding of the key concepts that were covered. Lastly, there’ll be a fun&amp;nbsp;&lt;STRONG&gt;certificate&lt;/STRONG&gt;&amp;nbsp;issued at the end of the training: Disclaimer:&amp;nbsp;&lt;STRONG&gt;This is not an official Microsoft certification and only acts as a way of recognizing your participation in this training content&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Module 1- Getting started &lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;What is Microsoft Defender Vulnerability Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-prerequisites?view=o365-worldwide" target="_blank" rel="noopener"&gt;Prerequisites &amp;amp; permissions&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-supported-os?view=o365-worldwide" target="_blank" rel="noopener"&gt;Supported operating systems, platforms and capabilities&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities?view=o365-worldwide" target="_blank" rel="noopener"&gt;Compare Defender Vulnerability Management plans and capabilities&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A href="https://mslearn.cloudguides.com/guides/Reduce%20organizational%20risk%20with%20Microsoft%20Defender%20Vulnerability%20Management" target="_blank" rel="noopener"&gt;Interactive Guide - Reduce organizational risk with Microsoft Defender Vulnerability Management&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial?view=o365-worldwide" target="_blank" rel="noopener"&gt;Defender Vulnerability Management trial&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management?view=o365-worldwide#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers" target="_blank" rel="noopener"&gt;Defender Vulnerability Management add on trial&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management?view=o365-worldwide#try-defender-vulnerability-management-standalone" target="_blank" rel="noopener"&gt;Defender Vulnerability Management standalone trial&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-faq?view=o365-worldwide" target="_blank" rel="noopener"&gt;Frequently asked questions&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;What's new in Public Preview&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Module 2 – Portal Orientation&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/mdvm-onboard-devices?view=o365-worldwide" target="_blank" rel="noopener"&gt;Onboard to Defender Vulnerability Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-business/mdb-view-tvm-dashboard?view=o365-worldwide#vulnerability-management-features-and-capabilities" target="_blank" rel="noopener"&gt;Dashboard overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/machines-view-overview?view=o365-worldwide" target="_blank" rel="noopener"&gt;Device inventory&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-software-inventory?view=o365-worldwide" target="_blank" rel="noopener"&gt;Software inventory&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-browser-extensions?view=o365-worldwide" target="_blank" rel="noopener"&gt;Browser extensions assessment&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-certificate-inventory?view=o365-worldwide" target="_blank" rel="noopener"&gt;Certificate inventory&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-hardware-and-firmware?view=o365-worldwide" target="_blank" rel="noopener"&gt;Firmware and hardware assessment&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/windows-authenticated-scan?view=o365-worldwide" target="_blank" rel="noopener"&gt;Authenticated scan&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Module 3 -Prioritization&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-weaknesses?view=o365-worldwide" target="_blank" rel="noopener"&gt;Vulnerabilities in my organization&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-exposure-score?view=o365-worldwide" target="_blank" rel="noopener"&gt;Exposure score&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-microsoft-secure-score-devices?view=o365-worldwide" target="_blank" rel="noopener"&gt;Microsoft Secure Score for Devices&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-assign-device-value?view=o365-worldwide" target="_blank" rel="noopener"&gt;Assign device value&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-security-recommendation?view=o365-worldwide" target="_blank" rel="noopener"&gt;Security recommendation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-zero-day-vulnerabilities?view=o365-worldwide" target="_blank" rel="noopener"&gt;Mitigate zero-day vulnerabilities&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Module 4- Remediation&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-remediation?view=o365-worldwide" target="_blank" rel="noopener"&gt;Remediate vulnerabilities&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-remediation?view=o365-worldwide#request-remediation" target="_blank" rel="noopener"&gt;Request Remediation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-exception?view=o365-worldwide" target="_blank" rel="noopener"&gt;Create and view exceptions for security recommendations&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-remediation?view=o365-worldwide#view-your-remediation-activities" target="_blank" rel="noopener"&gt;View remediation activities&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps?view=o365-worldwide" target="_blank" rel="noopener"&gt;Block vulnerable applications&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Module 5 - Posture and Compliance&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-microsoft-secure-score-devices?view=o365-worldwide" target="_blank" rel="noopener"&gt;Microsoft Secure Score for Devices&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines?view=o365-worldwide" target="_blank" rel="noopener"&gt;Security baselines assessment&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Module 6 – Data access&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-hunt-exposed-devices?view=o365-worldwide" target="_blank" rel="noopener"&gt;Hunt for exposed devices&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-vulnerable-devices-report?view=o365-worldwide" target="_blank" rel="noopener"&gt;Vulnerable devices report&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/device-health-reports?view=o365-worldwide" target="_blank" rel="noopener"&gt;Device health reporting in Defender for Endpoint&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/monthly-security-summary-report?view=o365-worldwide" target="_blank" rel="noopener"&gt;Monthly security summary reporting in Defender for Endpoint&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide#apis" target="_blank" rel="noopener"&gt;API’s&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-methods-properties?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export assessment methods and properties per device&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-secure-config?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export secure configuration assessment per device&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api/get-assessment-software-inventory?view=o365-worldwide" target="_blank" rel="noopener"&gt;Export software inventory assessment per device&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/new-threat-amp-vulnerability-management-apis-create-reports/ba-p/2445813" target="_blank" rel="noopener"&gt;Build your own custom reports&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Are you ready for the &lt;A href="https://forms.office.com/r/mwJ2GRMbf2" target="_blank" rel="noopener"&gt;Knowledge check&lt;/A&gt;?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once you’ve finished the training and passed the knowledge check, please&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://forms.office.com/r/cMbgk0GUDq" target="_blank" rel="noopener noreferrer"&gt;click here&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;to request your certificate&amp;nbsp;(you'll see it in your inbox within 3-5 business days.)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 16:37:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/become-a-microsoft-defender-vulnerability-management-ninja/ba-p/4003011</guid>
      <dc:creator>Ayelet_Artzi</dc:creator>
      <dc:date>2024-02-07T16:37:41Z</dc:date>
    </item>
    <item>
      <title>Vulnerable Components Inventory now in public preview</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/vulnerable-components-inventory-now-in-public-preview/ba-p/4035357</link>
      <description>&lt;P&gt;In recent years, software supply chain vulnerabilities and related &lt;A href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/supply-chain-attacks/?sort-by=newest-oldest&amp;amp;date=any" target="_blank" rel="noopener"&gt;supply chain attacks&lt;/A&gt; have become a major concern for security teams across industries. As software systems become increasingly complex and software developers rely more on open-source software packages and commercial third-party software components, it has become difficult for security teams to keep track of and mitigate new vulnerabilities found within software being used in their organizations.&lt;/P&gt;
&lt;P&gt;To address this challenge, &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;Microsoft Defender Vulnerability Management&lt;/A&gt; is introducing a dedicated inventory that lists known vulnerable software components found in the organization. This inventory, along with a new security recommendation, improves visibility of vulnerabilities found within software components, such as open-source libraries. These components are widely used, but often not clearly visible, due to inner dependencies within software products.&lt;/P&gt;
&lt;P&gt;By increasing awareness among security teams of vulnerabilities found in software components that are being used by multiple software products within an organization, security administrators can identify affected devices, prioritize, and mitigate risk proactively. Therefore, improving their security posture and reducing the risk of potential cyber-attacks.&lt;/P&gt;
&lt;P&gt;The new &lt;A href="https://learn.microsoft.com/microsoft-365/security/defender-vulnerability-management/tvm-vulnerable-components" target="_blank" rel="noopener"&gt;Vulnerable Components Inventory&lt;/A&gt; includes a list of software components that are known to have critical vulnerabilities in the past.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following is a list of components that are currently supported. A few of these components were previously shown under the &lt;EM&gt;‘Software inventory’ &lt;/EM&gt;but are now available via the &lt;EM&gt;‘Vulnerable components’&lt;/EM&gt; inventory.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Apache Commons Text&lt;/LI&gt;
&lt;LI&gt;Apache Log4j&lt;/LI&gt;
&lt;LI&gt;Apache Struts &lt;STRONG&gt;[newly supported]&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;LiteDB&lt;/LI&gt;
&lt;LI&gt;OpenSSL&lt;/LI&gt;
&lt;LI&gt;Spring Framework&lt;/LI&gt;
&lt;LI&gt;WebP (libwebp) &lt;STRONG&gt;[newly supported]&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Defender Vulnerability Management coverage of software components will continue to expand based on the ever-evolving threat landscape and customer demand. For example, in light of critical vulnerabilities recently found in &lt;STRONG&gt;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863" target="_blank" rel="noopener"&gt;&lt;EM&gt;WebP&lt;/EM&gt;&lt;/A&gt; &lt;/STRONG&gt;(&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863" target="_blank" rel="noopener"&gt;&lt;EM&gt;CVE-&lt;/EM&gt;2023-4863&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;and&lt;/EM&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;EM&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2023/12/12/apache-software-foundation-updates-struts-2" target="_self"&gt;&lt;STRONG&gt;Apache Struts 2&lt;/STRONG&gt;&lt;/A&gt;&lt;/EM&gt; &lt;EM&gt;(&lt;/EM&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-50164" target="_blank" rel="noopener"&gt;&lt;EM&gt;CVE-2023-50164&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;),&lt;/EM&gt; Defender Vulnerability Management was updated to support both components.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For each vulnerable component you will see basic information including the component name and vendor, the number of weaknesses related to that component and the impact to the overall exposure score, whether an exploit is available, and if there are active threats or alerts associated with it.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The &lt;EM&gt;Component page’s tabs &lt;/EM&gt;provide detailed information and insights:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Data visualizations show the number of, and severity of, vulnerabilities and graphs with the number of installed and exposed devices.&lt;/LI&gt;
&lt;LI&gt;Named CVEs of discovered vulnerabilities.&lt;/LI&gt;
&lt;LI&gt;Devices that have the component installed along with device name, domain, OS, and more).&lt;/LI&gt;
&lt;LI&gt;List of components’ versions, including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition, a list of vulnerable files found is provided with file paths, version, and associated vulnerabilities, which can be exported for further investigation and handling.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Defender Vulnerability Management provides actionable &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-security-recommendation?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;EM&gt;Security Recommendations&lt;/EM&gt;&lt;/A&gt; to assist security administrators reduce their organization’s exposure to vulnerabilities through the process of keeping their software up to date. Given the inherited complexity of updating a software component within an enterprise environment, the &lt;EM&gt;Attention required &lt;/EM&gt;recommendation is designed to raise awareness of security teams to an emerging threat and explore their next steps, rather than a call for action to update a version, which may not be applicable for a specific software component.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Administrators can also drill down to a specific device and view a list of vulnerable components with the relevant file level evidence details.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you’re interested in learning more about Microsoft Defender Vulnerability Management&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management" target="_blank" rel="noopener"&gt;visit our website&lt;/A&gt;&amp;nbsp;to take advantage of our free 90-day trial, check out our&amp;nbsp;&lt;A href="https://aka.ms/mdvmguide" target="_blank" rel="noopener"&gt;interactive guide&lt;/A&gt;, and read more information in our&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;product documentation&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Providing feedback.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As always, we’d love to know what you think.&amp;nbsp;Looking forward to your feedback. share your feedback directly at:&amp;nbsp;&lt;A href="mailto:mdvmfeedback@microsoft.com" target="_blank" rel="noopener"&gt;mdvmfeedback@microsoft.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 15:45:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/vulnerable-components-inventory-now-in-public-preview/ba-p/4035357</guid>
      <dc:creator>Tomer_Reisner</dc:creator>
      <dc:date>2024-01-22T15:45:51Z</dc:date>
    </item>
    <item>
      <title>Hardware &amp; Firmware Assessment to identify devices with AMD processors</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/hardware-amp-firmware-assessment-to-identify-devices-with-amd/ba-p/3909040</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;EM&gt;About this vulnerability&lt;/EM&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;In certain cases, within the microarchitecture of "Zen 2" CPUs, a register may not be properly written to 0, potentially leading to the storage of data from another process or thread in the YMM register. This vulnerability could allow an attacker to access sensitive information. The severity is classified as "Medium" with the CVE identifier CVE-2&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;023-20593. AMD suggests implementing a micr&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;ocode patch for AMD EPYC™ 7002 Processors and applying BIOS updates with specific AGESA™ firmware versions for other impacted products to mitigate this issue. AMD intends to provide the AGESA™ versions to OEMs on scheduled dates for BIOS updates. Users are advised to consult their OEMs for the relevant BIOS update for their product.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Read more in &lt;/EM&gt;&lt;A href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html" target="_blank" rel="noopener"&gt;&lt;EM&gt;AMD Security Bulletin&lt;/EM&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;EM&gt;How Defender Vulnerability Management can assist&lt;/EM&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;Microsoft Defender Vulnerability Management &lt;/EM&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-hardware-and-firmware?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;EM&gt;Hardware and firmware assessment&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt; capability provides an inventory of known hardware and firmware in your organization. This allows you to identify devices with AMD processors that are potentially exposed to this vulnerability (these devices must be &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/mdvm-onboard-devices?view=o365-worldwide" target="_self"&gt;onboarded to the service&lt;/A&gt;). &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;To use this capability, you’ll need access &lt;/EM&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;EM&gt;Defender Vulnerability Management premium offering&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;. You can do that via purchasing the Add-on or Standalone licenses or by simply joining the &lt;/EM&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;EM&gt;free trial&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;EM&gt;Identify affected&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;devices.&lt;/I&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;The following Advanced Hunting query provides a list of the potentially vulnerable devices with AMD processors:&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;DeviceTvmHardwareFirmware&lt;/P&gt;
&lt;P&gt;|&amp;nbsp;where&amp;nbsp;ComponentType&amp;nbsp;==&amp;nbsp;"Processor"&lt;/P&gt;
&lt;P&gt;|&amp;nbsp;where&amp;nbsp;Manufacturer&amp;nbsp;contains&amp;nbsp;"amd"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;EM&gt;Learn more&lt;/EM&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;If you’re interested in learning more about Microsoft Defender Vulnerability Management&amp;nbsp;&lt;/EM&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management" target="_blank" rel="noopener"&gt;&lt;EM&gt;visit our website&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;&amp;nbsp;to take advantage of our free 90-day trial, check out our&amp;nbsp;&lt;/EM&gt;&lt;A href="https://aka.ms/mdvmguide" target="_blank" rel="noopener"&gt;&lt;EM&gt;interactive guide&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;, and read more information in our&amp;nbsp;&lt;/EM&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;EM&gt;product documentation&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;As always, we’d love to know what you think.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Looking forward to your feedback. share your feedback directly at:&amp;nbsp;&lt;/EM&gt;&lt;A href="mailto:mdvmfeedback@microsoft.com" target="_blank" rel="noopener"&gt;&lt;EM&gt;mdvmfeedback@microsoft.com&lt;/EM&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 17:19:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/hardware-amp-firmware-assessment-to-identify-devices-with-amd/ba-p/3909040</guid>
      <dc:creator>Tomer_Reisner</dc:creator>
      <dc:date>2023-09-08T17:19:46Z</dc:date>
    </item>
    <item>
      <title>Availability of Defender Vulnerability Management Standalone and Container vulnerability assessments</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/availability-of-defender-vulnerability-management-standalone-and/ba-p/3894735</link>
      <description>&lt;P&gt;Organizations are increasingly challenged to stay aligned with evolving business requirements and protect against expanding attack surfaces with a diverse portfolio of devices outside of traditional organizational boundaries, adding complexity to the vulnerability management process. Vulnerability management solutions provide understanding of their overall security risk posture and where to prioritize.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In recent years, Microsoft has established itself as a leading solution for vulnerability risk management (VRM) by leveraging its industry-leading threat intelligence and security expertise. Microsoft Defender Vulnerability Management provides end-to-end capabilities across the VRM lifecycle to identify, assess, prioritize, and remediate vulnerabilities, making it an ideal tool for managing an expanded attack surface and reducing overall risk posture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Announcing availability of Defender Vulnerability Management standalone&amp;nbsp;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Earlier this year we &lt;A href="https://aka.ms/mdvmgablog" target="_blank" rel="noopener"&gt;released our premium capabilities&lt;/A&gt; as an add-on to the core capabilities included with Defender for Endpoint Plan 2 and we are thrilled to &lt;STRONG&gt;announce Defender Vulnerability Management is now offered as a standalone solution.&lt;/STRONG&gt; Now organizations not yet on Defender for Endpoint Plan 2, or have another EDR solution, or just looking to replace an existing vulnerability management solution, can take advantage of our context-aware, risk-based prioritization that leverages Microsoft’s unmatched threat intelligence, breach likelihood predictions and business contexts to prioritize vulnerabilities across their portfolio of managed and unmanaged devices.&lt;/P&gt;
&lt;P&gt;With this significant addition of a standalone offering, we also introduced enhancements to the &lt;A href="https://review.learn.microsoft.com/en-us/microsoft-365/security/defender/manage-rbac?view=o365-worldwide&amp;amp;branch=siosulli-mdvm-urbac#whats-supported-by-the-microsoft-365-defender-rbac-model" target="_blank" rel="noopener"&gt;Microsoft 365 Defender Unified RBAC permissions mode&lt;/A&gt;l to clearly associate relevant roles &amp;amp; &lt;A href="https://review.learn.microsoft.com/en-us/microsoft-365/security/defender/custom-permissions-details?view=o365-worldwide&amp;amp;branch=siosulli-mdvm-urbac#security-posture--posture-management" target="_blank" rel="noopener"&gt;permissions&lt;/A&gt; with Defender Vulnerability Management (this change will not affect existing roles).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;Figure: Core and premium capabilities in standalone offer&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;U&gt;Defender Vulnerability Management&lt;/U&gt;&lt;/SPAN&gt; &lt;A href="http://aka.ms/mdvmgablog" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;premium capabilities&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; provide advanced assessments with in-depth visibility into potential exposure to your assets:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Security baselines assessment&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;– customized profiles that you can create to assess and monitor endpoints against industry security benchmarks, such as CIS, STIG and Microsoft benchmarks. Instead of running never-ending compliance scans, monitor your organization’s security baselines seamlessly according to customized profiles.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/mitigate-risks-with-application-block-in-defender-vulnerability/ba-p/3752337" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Block vulnerable applications&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;– In addition to the core remediation capabilities, proactively reduce risks with this premium capability by taking mitigation steps such as warning users or blocking known vulnerable versions of applications. Leverage software usage insights to understand the impact of the vulnerable application.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-hardware-and-firmware?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Hardware and firmware assessment&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;– full visibility into device manufacturer, processors, and BIOs information to assess vulnerabilities for hardware and firmware risks.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-certificate-inventory?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Digital certificates&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-browser-extensions?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;browser extensions assessment&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;&amp;nbsp;–&amp;nbsp;&lt;/STRONG&gt;expand your asset coverage beyond devices and gain entity-level visibility into the various browser extensions and digital certificates installed across assets.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-network-share-assessment?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Network shares analysis&lt;/STRONG&gt;&lt;/A&gt;&lt;EM&gt;-&lt;/EM&gt;&amp;nbsp;protect against misconfigurations used in the wild by attackers for lateral movement, reconnaissance, data exfiltration, and more.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/windows-authenticated-scan?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Authenticated scans for vulnerability assessment&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;-&amp;nbsp;&lt;/STRONG&gt;run scans on unmanaged devices by remotely targeting by IP ranges or hostnames to remotely access the devices for vulnerability assessment purposes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Defender Vulnerability Management capabilities are integrated into Defender for Endpoint and Defender for Cloud enabling security teams to assess their exposure and address changes to improve security posture of your organization. You now have flexibility in our offering across endpoints and servers. &amp;nbsp;More info on our updated &lt;A href="https://aka.ms/mdvm" target="_self"&gt;website&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;Figure: Availability of Core and premium capabilities across offerings that include Defender Vulnerability Management for endpoints and servers.&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Your needs for vulnerability assessments and analysis spans platforms, clouds and modalities and our strategy for Defender Vulnerability Management is to support these environments that span multiple platforms across both on-premises and cloud. We have recently added Fortinet to the network devices and container support is our second big news.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Announcing vulnerability assessment (VA) for Containers powered by Microsoft Defender Vulnerability Management in Defender for Cloud &lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;With the rise of containerization and microservices, it's more important than ever to secure the software supply chain and ensure that container images are free from vulnerabilities.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Today, as a result of Defender for Cloud’s integration with Microsoft Defender Vulnerability Management, w&lt;/STRONG&gt;&lt;STRONG&gt;e are excited to announce the&lt;/STRONG&gt; &lt;STRONG&gt;general availability of agentless container posture management in Defender CSPM and the public preview of vulnerability assessment scanning for container images in Defender for Containers. &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;These new container vulnerability assessment capabilities powered by Defender Vulnerability Management include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Agentless vulnerability assessment for containers&lt;/LI&gt;
&lt;LI&gt;Zero configuration for onboarding&lt;/LI&gt;
&lt;LI&gt;Near real-time scan of new images&lt;/LI&gt;
&lt;LI&gt;Daily refresh of vulnerability reports&lt;/LI&gt;
&lt;LI&gt;Coverage for both ship (ACR) and runtime (AKS)&lt;/LI&gt;
&lt;LI&gt;Support for OS and language packages&lt;/LI&gt;
&lt;LI&gt;Real-world exploitability insights (based on CISA kev, exploit DB and more)&lt;/LI&gt;
&lt;LI&gt;Support for ACR private links&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Agentless container posture management in Defender CSPM, powered by Defender Vulnerability Management&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;To help proactively strengthen the security posture of your containerized environments, Defender CSPM provides a new vulnerability assessment offering for containers powered by Defender Vulnerability Management, with near real-time scans of new images, daily report refreshes, and real-world exploitability insights. Vulnerabilities are added to Defender CSPM security graph for contextual risk assessment and calculation of attack paths. Customers can now access out-of-the-box container vulnerability assessments that, combined with attack path analysis and agentless discovery of the Kubernetes estate, enable security teams to hunt for risks with the cloud security explorer and prioritize the vulnerabilities that pose the greatest risks to the organization. This agentless approach allows security teams to gain visibility into their Kubernetes and containers registries across the SDLC, removing friction and footprints from the workloads.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Figure Attack path analysis outlining a containerized application publicly exposed with high severity vulnerabilities discovered using Defender Vulnerability Management&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/tutorial-enable-cspm-plan#enable-the-defender-for-cspm-plan" target="_blank" rel="noopener"&gt;Enable Defender CSPM with agentless container posture in a single click.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Public preview of vulnerability assessment for containers in Defender for Containers, powered by Defender Vulnerability Management&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;In providing comprehensive cloud workload protection, Defender for Containers’ new integration with Defender Vulnerability Management now provides our customers with vulnerability assessments through one-click enablement, near real-time scan of new images, and daily result refreshes of current and emerging vulnerabilities enriched with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;exploitability insights - all to help organizations focus on vulnerabilities with the greatest security impact to their organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;New vulnerability assessment recommendation powered by Defender Vulnerability Management&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Enable Container vulnerability assessments powered by Defender Vulnerability Management &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure%2Fdefender-for-cloud%2Fenable-vulnerability-assessment&amp;amp;data=05%7C01%7Crapark%40microsoft.com%7C2b331c747f3f44b9b7be08db983afaed%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638271151389731446%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;amp;sdata=XrGMLNyx41uBK1v7M2hTmnMdOpy3mve29A3bXZqI%2Fsk%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;in one click here&lt;/A&gt;&lt;EM&gt;. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;If you’re interested in learning more about Defender Vulnerability Management&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management" target="_blank" rel="noopener"&gt;visit our website&lt;/A&gt;&amp;nbsp;for updated pricing and packaging and datasheet. Read more about our plans and capabilities&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities?view=o365-worldwide" target="_blank" rel="noopener"&gt;here&lt;/A&gt;. To take advantage of our free 90-day trial, check out our&amp;nbsp;&lt;A href="https://aka.ms/mdvmguide" target="_blank" rel="noopener"&gt;interactive guide&lt;/A&gt;, and read more information in our&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;product documentation.&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;For additional information and other relevant updates on protecting cloud workloads please visit the Microsoft Defender for Cloud &lt;A href="https://aka.ms/MDCBlackHatTCBlog" target="_self"&gt;blog.&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2023 15:58:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/availability-of-defender-vulnerability-management-standalone-and/ba-p/3894735</guid>
      <dc:creator>BrjannBrekkan</dc:creator>
      <dc:date>2023-08-09T15:58:41Z</dc:date>
    </item>
    <item>
      <title>Update on Defender Vulnerability Management capabilities in Defender for Servers Plan-2</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/update-on-defender-vulnerability-management-capabilities-in/ba-p/3882311</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The aim of this article is to give you a better understanding of the Microsoft Defender Vulnerability Management&amp;nbsp; capabilities available to Microsoft Defender for Cloud customers, as well as information on some recent changes in behavior, which enables these capabilities only to eligible devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/premium-capabilities-in-microsoft-defender-vulnerability/ba-p/3754990" target="_blank" rel="noopener"&gt;Defender Vulnerability Management premium capabilities&lt;/A&gt; are included in Defender for Servers Plan 2 and available for eligible server devices via the Microsoft 365 Defender portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customers&lt;SPAN&gt; that wish to benefit from these &lt;/SPAN&gt;Defender Vulnerability Management premium capabilities on their client devices, can either &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;trial&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;Defender Vulnerability Management Standalone or the Defender Vulnerability Management Add-on license for their Microsoft Defender for Endpoint Plan 2 devices.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Background:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management" target="_blank" rel="noopener"&gt;Defender Vulnerability Management&amp;nbsp;&lt;/A&gt;&lt;/STRONG&gt;is integrated in &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2?view=o365-worldwide#compare-microsoft-endpoint-security-plans-1" target="_blank" rel="noopener"&gt;Defender for Endpoint&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management" target="_blank" rel="noopener"&gt;Defender for Servers&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For &lt;U&gt;client devices&lt;/U&gt;, Defender Vulnerability Management capabilities are available in the following offerings:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Core capabilities in Defender for Endpoint Plan 2.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/mdvmgablog" target="_blank" rel="noopener"&gt;Premium&lt;/A&gt; capabilities via Defender Vulnerability Management Add-On license on top of Defender for Endpoint Plan 2.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Core and premium capabilities via Defender for Vulnerability Management Standalone license, currently available as a&amp;nbsp;&lt;A href="https://signup.microsoft.com/get-started/signup?products=E8AEC735-F13E-4371-9A0B-7502F321C95B" target="_blank" rel="noopener"&gt;free trial&lt;/A&gt;&amp;nbsp;while in public preview.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities?view=o365-worldwide#vulnerability-management-capabilities-for-servers" target="_blank" rel="noopener"&gt;For server devices&lt;/A&gt;, Defender for Endpoint and Defender Vulnerability Management integrates seamlessly with Defender for Servers. You can onboard servers automatically and have servers monitored by Defender for Cloud appear in Defender for Endpoint and Defender Vulnerability Management dashboard. &amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Defender for Servers Plans 1 includes Defender Vulnerability Management Core capabilities.&lt;/LI&gt;
&lt;LI&gt;Defender&amp;nbsp;for&amp;nbsp;Server Plan 2 includes both Core and Premium capabilities.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Initially, when Defender Vulnerability Management premium capabilities were rolled out in Defender for Servers Plan 2, they were enabled across&amp;nbsp;&lt;U&gt;all devices&lt;/U&gt;&amp;nbsp;(both clients and servers)&amp;nbsp;for&amp;nbsp;customers with Defender for Servers Plan 2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Following a recent update, the Defender Vulnerability Management premium capabilities are only available to eligible client devices for customers that:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Purchased the Defender Vulnerability Management Add-on&lt;/LI&gt;
&lt;LI&gt;Started an &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;Defender Vulnerability Management Add-on trial&lt;/A&gt;.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Detailed messaging describing this change was made available in the Defender Vulnerability Management portal in addition to &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities?view=o365-worldwide#vulnerability-management-capabilities-for-servers" target="_blank" rel="noopener"&gt;&amp;nbsp;online documentation&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How does this affect me?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers who are interested in continuing to use these premium capabilities on their client devices, which are not covered by Defender for Servers Plan 2, are encouraged to start a &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management?view=o365-worldwide#try-defender-vulnerability-management-standalone" target="_self"&gt;Defender Vulnerability Managment Standalone&lt;/A&gt; or&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial?view=o365-worldwide" target="_self"&gt;Defender Vulnerability Management Add-on &lt;/A&gt;&amp;nbsp;trial and regain access to the premium capabilities for their client devices, with their previous data saved (&lt;EM&gt;e.g., Security baselines profiles)&lt;/EM&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With this update, Defender&lt;SPAN&gt; for Servers Plan 2&lt;/SPAN&gt;&amp;nbsp;customers will be able to use the&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;EM&gt;Block vulnerable applications&lt;/EM&gt; capability &lt;/A&gt;on their eligible server devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you’re interested in learning more about Microsoft Defender Vulnerability Management&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management" target="_blank" rel="noopener"&gt;visit our website&lt;/A&gt;&amp;nbsp;to take advantage of our free 90-day trial, check out our&amp;nbsp;&lt;A href="https://aka.ms/mdvmguide" target="_blank" rel="noopener"&gt;interactive guide&lt;/A&gt;, and read more information in our&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;product documentation&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2023 15:34:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/update-on-defender-vulnerability-management-capabilities-in/ba-p/3882311</guid>
      <dc:creator>Tomer_Reisner</dc:creator>
      <dc:date>2023-07-28T15:34:01Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender Vulnerability Management – Firmware Security Advisories</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/microsoft-defender-vulnerability-management-firmware-security/ba-p/3884569</link>
      <description>&lt;P&gt;We are happy to announce a new capability for Microsoft Defender Vulnerability Management – ‘Firmware Security Advisories’.&lt;/P&gt;
&lt;P&gt;This capability allows more streamlined and efficient way to view, track, and monitor firmware advisories. With the ability to filter on exposed devices and view advisories that affect the customer environment, security teams can quickly identify potential vulnerabilities and take action to mitigate them. This is especially important in today's rapidly evolving threat landscape, where firmware vulnerabilities can be exploited by attackers to gain access to sensitive data or systems. &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;To view firmware security weaknesses,&amp;nbsp; The &lt;STRONG&gt;‘Weaknesses’&lt;/STRONG&gt; inventory is now extended with a new &lt;STRONG&gt;‘Security Advisories’ &lt;/STRONG&gt;tab.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The security advisories are continuously monitored by Microsoft Defender Vulnerability Management and details from manufacturer websites and inventories, as well as on third-party security websites, and validated against the organization inventory. Security advisories details include specific version of the devices or software that are affected &amp;nbsp;It may also include instructions for how to update the firmware to address the vulnerability, as well as any other steps that should be taken to mitigate the risk. By following the instructions provided in a firmware advisory, users can reduce the likelihood of their device or system being compromised by a firmware vulnerability.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For each advisory there is a list of ‘Exposed Devices’, ’Associated CVE’s’ and ‘Related Firmware’.&lt;/P&gt;
&lt;P&gt;‘Exposed Devices’ is the source to identify if your organization is affected for specific security advisory. In case of ‘Exposed Devices’ = 0, that means your organization isn’t at risk for that specific security advisory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;’Associated CVE’s’ is the list of CVE’s related to the specific advisory:&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;‘Related Firmware’ is the list of all firmware impacted by the vulnerability:&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's important to stay vigilant and regularly check for security advisories related to your devices and systems to ensure that you are aware of any vulnerabilities that may affect them.&lt;/P&gt;
&lt;P&gt;The following Security Advisories vendors are currently supported: Lenovo, Dell, HP.&lt;BR /&gt;Details of for each published advisory includes:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Advisory ID&lt;/LI&gt;
&lt;LI&gt;Severity (Provided by the vendor)&lt;/LI&gt;
&lt;LI&gt;Related CVE’s&lt;/LI&gt;
&lt;LI&gt;Advisory link&lt;/LI&gt;
&lt;LI&gt;Vendor&lt;/LI&gt;
&lt;LI&gt;Age&lt;/LI&gt;
&lt;LI&gt;Published on&lt;/LI&gt;
&lt;LI&gt;Updated on&lt;/LI&gt;
&lt;LI&gt;Exposed devices&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also view this list through the ‘Security Recommendation’ filtered by ‘Remediation Type = Firmware update’&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you’re interested in learning more about Microsoft Defender Vulnerability Management&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management" target="_blank" rel="noopener"&gt;visit our website&lt;/A&gt;&amp;nbsp;to take advantage of our free 90-day trial, check out our&amp;nbsp;&lt;A href="https://aka.ms/mdvmguide" target="_blank" rel="noopener"&gt;interactive guide&lt;/A&gt;, and read more information in our&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener"&gt;product documentation&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, we’d love to know what you think.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Looking forward to your feedback. share your feedback directly at: &lt;/SPAN&gt;&lt;A href="mailto:mdvmfeedback@microsoft.com" target="_blank" rel="noopener"&gt;mdvmfeedback@microsoft.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Microsoft Defender Vulnerability Management Team&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2023 17:20:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/microsoft-defender-vulnerability-management-firmware-security/ba-p/3884569</guid>
      <dc:creator>Tomer_Reisner</dc:creator>
      <dc:date>2023-07-26T17:20:21Z</dc:date>
    </item>
  </channel>
</rss>

