mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-20 01:07:23 +00:00
Merge branch 'master' into enable-network-unlock
This commit is contained in:
commit
8cc2b4b5f3
@ -67,6 +67,7 @@
|
||||
##### [Software inventory](microsoft-defender-atp/tvm-software-inventory.md)
|
||||
##### [Vulnerabilities in my organization](microsoft-defender-atp/tvm-weaknesses.md)
|
||||
##### [Event timeline](microsoft-defender-atp/threat-and-vuln-mgt-event-timeline.md)
|
||||
##### [Vulnerable devices report](microsoft-defender-atp/tvm-vulnerable-devices-report.md)
|
||||
##### [Hunt for exposed devices](microsoft-defender-atp/tvm-hunt-exposed-devices.md)
|
||||
|
||||
|
||||
|
Binary file not shown.
After Width: | Height: | Size: 49 KiB |
Binary file not shown.
After Width: | Height: | Size: 42 KiB |
Binary file not shown.
After Width: | Height: | Size: 62 KiB |
Binary file not shown.
After Width: | Height: | Size: 40 KiB |
Binary file not shown.
After Width: | Height: | Size: 46 KiB |
@ -0,0 +1,85 @@
|
||||
---
|
||||
title: Vulnerable devices report- threat and vulnerability management
|
||||
description: A report showing vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
|
||||
keywords: mdatp-tvm vulnerable devices, mdatp, tvm, reduce threat & vulnerability exposure, reduce threat and vulnerability, monitor security configuration
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: ellevin
|
||||
author: levinec
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- m365-security-compliance
|
||||
- m365initiative-defender-endpoint
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Vulnerable devices report- threat and vulnerability management
|
||||
|
||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||
|
||||
> [!IMPORTANT]
|
||||
> **Vulnerable devices report is currently in public preview**<br>
|
||||
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
|
||||
> For more information, see [Microsoft Defender ATP preview features](preview.md).
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||
|
||||
The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
|
||||
|
||||
Access the report in the Microsoft Defender Security Center by going to **Reports > Vulnerable devices**
|
||||
|
||||
There are two columns:
|
||||
|
||||
- Trends (over time). Can show the past 30 days, 3 months, 6 months, or a custom date range.
|
||||
- Today (current information)
|
||||
|
||||
**Filter**: You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group.
|
||||
|
||||
**Drill down**: If there is an insight you want to explore further, select the relevant bar chart to view a filtered list of devices in the Device inventory page. From there, you can export the list.
|
||||
|
||||
## Severity level graphs
|
||||
|
||||
Each device is counted only once according to the most severe vulnerability found on that device.
|
||||
|
||||

|
||||
|
||||
## Exploit availability graphs
|
||||
|
||||
Each device is counted only once based on the highest level of known exploit.
|
||||
|
||||

|
||||
|
||||
## Vulnerability age graphs
|
||||
|
||||
Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited.
|
||||
|
||||

|
||||
|
||||
## Vulnerable devices by operating system platform graphs
|
||||
|
||||
The number of devices on each operating system that are exposed due to software vulnerabilities.
|
||||
|
||||

|
||||
|
||||
## Vulnerable devices by Windows 10 version graphs
|
||||
|
||||
The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS.
|
||||
|
||||

|
||||
|
||||
## Related topics
|
||||
|
||||
- [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md)
|
||||
- [Security recommendations](tvm-security-recommendation.md)
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user