From a1cc829eded06096c3b7987b3cef55c91717f5a2 Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 12 Nov 2019 15:37:04 -0800 Subject: [PATCH 1/6] Update advanced-hunting-tvm-configassessment-table.md --- .../advanced-hunting-tvm-configassessment-table.md | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md index 35d38020d6..51a94636d9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md @@ -1,7 +1,7 @@ --- title: DeviceTvmSecureConfigurationAssessment table in the Advanced hunting schema -description: Learn about the DeviceTvmSecureConfigurationAssessment table in the Advanced hunting schema, such as machine ID, computer name, operating system platform, security configuration details, impact, and compliance information. -keywords: advanced hunting, atp query, device management, query atp data, query tvm data, query security configuration, intellisense, atp telemetry, events, events telemetry, azure log analytics, description, DeviceTvmSecureConfigurationAssessment +description: Learn about Threat & Vulnerability Management security assessment events in the DeviceTvmSecureConfigurationAssessment table of the Advanced hunting schema. These events provide machine information as well as security configuration details, impact, and compliance information. +keywords: advanced hunting, threat hunting, cyber threat hunting, search, query, telemetry, schema reference, kusto, table, column, data type, description, threat & vulnerability management, TVM, device management, security configuration, DeviceTvmSecureConfigurationAssessment search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -15,7 +15,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 10/27/2019 +ms.date: 11/12/2019 --- # DeviceTvmSecureConfigurationAssessment @@ -28,7 +28,7 @@ ms.date: 10/27/2019 [!include[Prerelease information](prerelease.md)] -Each row in the DeviceTvmSecureConfigurationAssessment table contains an assessment event for a specific security configuration. Use this reference to check the latest assessment results and determine whether device are compliant. +Each row in the DeviceTvmSecureConfigurationAssessment table contains an assessment event for a specific security configuration from [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt). Use this reference to check the latest assessment results and determine whether device are compliant. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). @@ -51,3 +51,4 @@ For information on other tables in the Advanced hunting schema, see [the Advance - [All Advanced hunting tables](advanced-hunting-reference.md) - [Advanced hunting query best practices](advanced-hunting-best-practices.md) - [Query data using Advanced hunting](advanced-hunting.md) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) From d8bead40edf6df411036dbf64631b18d55cd1293 Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 12 Nov 2019 17:20:02 -0800 Subject: [PATCH 2/6] Tweaks to AH-TVM topics --- ...nced-hunting-tvm-configassessment-table.md | 6 ++--- ...vanced-hunting-tvm-secureconfigkb-table.md | 11 ++++---- ...ced-hunting-tvm-softwareinventory-table.md | 23 +++++++++-------- ...hunting-tvm-softwarevulnerability-table.md | 25 ++++++++++--------- 4 files changed, 34 insertions(+), 31 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md index 51a94636d9..038b6a2195 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md @@ -28,7 +28,7 @@ ms.date: 11/12/2019 [!include[Prerelease information](prerelease.md)] -Each row in the DeviceTvmSecureConfigurationAssessment table contains an assessment event for a specific security configuration from [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt). Use this reference to check the latest assessment results and determine whether device are compliant. +Each row in the DeviceTvmSecureConfigurationAssessment table contains an assessment event for a specific security configuration from [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt). Use this reference to check the latest assessment results and determine whether devices are compliant. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). @@ -37,9 +37,9 @@ For information on other tables in the Advanced hunting schema, see [the Advance | MachineId | string | Unique identifier for the machine in the service | | ComputerName | string | Fully qualified domain name (FQDN) of the machine | | OSPlatform | string | Platform of the operating system running on the machine. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7.| -| Timestamp | datetime |Date and time when the record was generated| +| Timestamp | datetime |Date and time when the record was generated | | ConfigurationId | string | Unique identifier for a specific configuration | -| ConfigurationCategory | string | Category or grouping to which the configuration belongs: Application, OS, Network, Accounts, Security controls| +| ConfigurationCategory | string | Category or grouping to which the configuration belongs: Application, OS, Network, Accounts, Security controls | | ConfigurationSubcategory | string |Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features. | | ConfigurationImpact | string | Rated impact of the configuration to the overall configuration score (1-10) | | IsCompliant | boolean | Indicates whether the configuration or policy is properly configured | diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md index 857a5731c6..ef544939ac 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md @@ -1,7 +1,7 @@ --- title: DeviceTvmSecureConfigurationAssessmentKB table in the Advanced hunting schema -description: Learn about the DeviceTvmSecureConfigurationAssessmentKB table in the Advanced hunting schema, security configuration details, and the associated industry benchmarks that it adheres to. -keywords: advanced hunting, atp query, device management, query atp data, query tvm data, query security configuration, intellisense, atp telemetry, events, events telemetry, azure log analytics, description, MITRE ATT&CK framework, DeviceTvmSecureConfigurationAssessmentKB +description: Learn about the various secure configurations assessed by Threat & Vulnerability Management in the DeviceTvmSecureConfigurationAssessmentKB table of the Advanced hunting schema. +keywords: advanced hunting, threat hunting, cyber threat hunting, search, query, telemetry, schema reference, kusto, table, column, data type, description, threat & vulnerability management, TVM, device management, security configuration, MITRE ATT&CK framework, knowledge base, KB, DeviceTvmSecureConfigurationAssessmentKB search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -15,7 +15,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 10/27/2019 +ms.date: 11/12/2019 --- # DeviceTvmSecureConfigurationAssessmentKB @@ -28,7 +28,7 @@ ms.date: 10/27/2019 [!include[Prerelease information](prerelease.md)] -The DeviceTvmSecureConfigurationAssessmentKB table in the Advanced hunting schema contains information about the various secure configuration TVM checks during assessments related to your organization. An example of a security configuration is to block JavaScript or VBScript from launching downloaded executable content to prevent accidentally downloading malicious files in your network. Use this reference to construct queries that return information from the table. +The DeviceTvmSecureConfigurationAssessmentKB table in the Advanced hunting schema contains information about the various secure configurations — such as whether a device has automatic updates on — checked by [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt). It also includes risk information, related industry benchmarks, and applicable MITRE ATT&CK techniques and tactics. Use this reference to construct queries that return information from the table. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). @@ -43,7 +43,7 @@ For information on other tables in the Advanced hunting schema, see [the Advance | ConfigurationSubcategory | string |Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features. | | ConfigurationBenchmarks | string | List of industry benchmarks recommending the same or similar configuration | | RelatedMitreTechniques | string | List of Mitre ATT&CK framework techniques related to the configuration | -| RelatedMitreTactics | string | List of Mitre ATT&CK framework tactics related to the configuration| +| RelatedMitreTactics | string | List of Mitre ATT&CK framework tactics related to the configuration | ## Related topics @@ -51,3 +51,4 @@ For information on other tables in the Advanced hunting schema, see [the Advance - [All Advanced hunting tables](advanced-hunting-reference.md) - [Advanced hunting query best practices](advanced-hunting-best-practices.md) - [Query data using Advanced hunting](advanced-hunting.md) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md index fcf0c2e4bd..13ab77bce0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md @@ -1,7 +1,7 @@ --- title: DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema -description: Learn about the DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema, such as operating system platform, version, and architecture, software vendor, name, and version, CVE ID, vulnerability severity, and descriptions -keywords: advanced hunting, atp query, device management, query atp data, query tvm data, query software inventory, query software vulnerability inventory, intellisense, atp telemetry, events, events telemetry, azure log analytics, description, DeviceTvmSoftwareInventoryVulnerabilities +description: Learn about the inventory of software in your devices and their vulnerabilities in the DeviceTvmSoftwareInventoryVulnerabilities table of the Advanced hunting schema. +keywords: advanced hunting, threat hunting, cyber threat hunting, search, query, telemetry, schema reference, kusto, table, column, data type, description, threat & vulnerability management, TVM, device management, software, inventory, vulnerabilities, CVE ID, OS DeviceTvmSoftwareInventoryVulnerabilities search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -15,7 +15,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 10/27/2019 +ms.date: 11/12/2019 --- # DeviceTvmSoftwareInventoryVulnerabilities @@ -29,7 +29,7 @@ ms.date: 10/27/2019 [!include[Prerelease information](prerelease.md)] -The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains an inventory of the software on your devices as well as any known vulnerabilities in the software products. Use this reference to construct queries that return information from the table. +The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains the [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) inventory of software on your devices as well as any known vulnerabilities in these software products. This table also includes operating system information, CVE IDs, and vulnerability severity information. Use this reference to construct queries that return information from the table. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). @@ -37,14 +37,14 @@ For information on other tables in the Advanced hunting schema, see [the Advance |-------------|-----------|-------------| | MachineId | string | Unique identifier for the machine in the service | | ComputerName | string | Fully qualified domain name (FQDN) of the machine | -| OSPlatform | string | Platform of the operating system running on the machine. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7.| +| OSPlatform | string | Platform of the operating system running on the machine. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7. | | OSVersion | string | Version of the operating system running on the machine | -| OSArchitecture | string | Architecture of the operating system running on the machine| -| SoftwareVendor | string | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape| -| SoftwareName | string | Name of the software product| -|SoftwareVersion | string | Version number of the software product| -| CveId | string | Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system| -| VulnerabilitySeverityLevel | string | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape| +| OSArchitecture | string | Architecture of the operating system running on the machine | +| SoftwareVendor | string | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape | +| SoftwareName | string | Name of the software product | +| SoftwareVersion | string | Version number of the software product | +| CveId | string | Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system | +| VulnerabilitySeverityLevel | string | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape | @@ -54,3 +54,4 @@ For information on other tables in the Advanced hunting schema, see [the Advance - [All Advanced hunting tables](advanced-hunting-reference.md) - [Advanced hunting query best practices](advanced-hunting-best-practices.md) - [Query data using Advanced hunting](advanced-hunting.md) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md index 757ad9858c..6084894c09 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md @@ -1,7 +1,7 @@ --- title: DeviceTvmSoftwareVulnerabilitiesKB table in the Advanced hunting schema -description: Learn about the DeviceTvmSoftwareVulnerabilitiesKB table in the Advanced hunting schema, such as CVE ID, CVSS score, exploit availability, vulnerability severity, last modified time, date the vulnerability was disclosed to public, and affected software in your network. -keywords: advanced hunting, atp query, device management, query atp data, query tvm data, query software vulnerability inventory, intellisense, atp telemetry, events, events telemetry, azure log analytics, description, DeviceTvmSoftwareVulnerabilitiesKB +description: Learn about the software vulnerabilities tracked by [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) in the DeviceTvmSoftwareVulnerabilitiesKB table of the Advanced hunting schema. +keywords: advanced hunting, threat hunting, cyber threat hunting, search, query, telemetry, schema reference, kusto, table, column, data type, description, threat & vulnerability management, TVM, device management, software, inventory, vulnerabilities, CVE ID, CVSS, DeviceTvmSoftwareVulnerabilitiesKB search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -15,7 +15,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 10/27/2019 +ms.date: 11/12/2019 --- # DeviceTvmSoftwareVulnerabilitiesKB @@ -28,20 +28,20 @@ ms.date: 10/27/2019 [!include[Prerelease information](prerelease.md)] -The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains information about the vulnerabilities Threat & Vulnerability Management assesses devices for. Use this reference along with DeviceTvmSoftwareInventoryVulnerabilities to construct queries that return information on the metadata related to the vulnerabilities in your inventory. +The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains the list of vulnerabilities [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) assesses devices for. Use this reference to construct queries that return information from the table. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). | Column name | Data type | Description | |-------------|-----------|-------------| -| CveId | string | Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system| -| CvssScore | string | Severity score assigned to the security vulnerability under th Common Vulnerability Scoring System (CVSS)| -| IsExploitAvailable | boolean | Indicates whether exploit code for the vulnerability is publicly available| -| VulnerabilitySeverityLevel | string | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape| -| LastModifiedTime | datetime | Date and time the item or related metadata was last modified| -| PublishedDate | datetime | Date vulnerability was disclosed to public| -| VulnerabilityDescription | string | Description of vulnerability and associated risks| -| AffectedSoftware | string | List of all software products affected by the vulnerability| +| CveId | string | Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system | +| CvssScore | string | Severity score assigned to the security vulnerability under th Common Vulnerability Scoring System (CVSS) | +| IsExploitAvailable | boolean | Indicates whether exploit code for the vulnerability is publicly available | +| VulnerabilitySeverityLevel | string | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape | +| LastModifiedTime | datetime | Date and time the item or related metadata was last modified | +| PublishedDate | datetime | Date vulnerability was disclosed to public | +| VulnerabilityDescription | string | Description of vulnerability and associated risks | +| AffectedSoftware | string | List of all software products affected by the vulnerability | ## Related topics @@ -49,3 +49,4 @@ For information on other tables in the Advanced hunting schema, see [the Advance - [All Advanced hunting tables](advanced-hunting-reference.md) - [Advanced hunting query best practices](advanced-hunting-best-practices.md) - [Query data using Advanced hunting](advanced-hunting.md) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) From ac47f46c9e47a36260a9eb94f0bc09abac816db1 Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 12 Nov 2019 17:45:09 -0800 Subject: [PATCH 3/6] fixed links --- .../advanced-hunting-tvm-configassessment-table.md | 4 ++-- .../advanced-hunting-tvm-secureconfigkb-table.md | 4 ++-- .../advanced-hunting-tvm-softwareinventory-table.md | 4 ++-- .../advanced-hunting-tvm-softwarevulnerability-table.md | 6 +++--- 4 files changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md index 038b6a2195..e13c834dce 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md @@ -28,7 +28,7 @@ ms.date: 11/12/2019 [!include[Prerelease information](prerelease.md)] -Each row in the DeviceTvmSecureConfigurationAssessment table contains an assessment event for a specific security configuration from [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt). Use this reference to check the latest assessment results and determine whether devices are compliant. +Each row in the DeviceTvmSecureConfigurationAssessment table contains an assessment event for a specific security configuration from [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md). Use this reference to check the latest assessment results and determine whether devices are compliant. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). @@ -51,4 +51,4 @@ For information on other tables in the Advanced hunting schema, see [the Advance - [All Advanced hunting tables](advanced-hunting-reference.md) - [Advanced hunting query best practices](advanced-hunting-best-practices.md) - [Query data using Advanced hunting](advanced-hunting.md) -- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md index ef544939ac..a2196c5789 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md @@ -28,7 +28,7 @@ ms.date: 11/12/2019 [!include[Prerelease information](prerelease.md)] -The DeviceTvmSecureConfigurationAssessmentKB table in the Advanced hunting schema contains information about the various secure configurations — such as whether a device has automatic updates on — checked by [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt). It also includes risk information, related industry benchmarks, and applicable MITRE ATT&CK techniques and tactics. Use this reference to construct queries that return information from the table. +The DeviceTvmSecureConfigurationAssessmentKB table in the Advanced hunting schema contains information about the various secure configurations — such as whether a device has automatic updates on — checked by [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md). It also includes risk information, related industry benchmarks, and applicable MITRE ATT&CK techniques and tactics. Use this reference to construct queries that return information from the table. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). @@ -51,4 +51,4 @@ For information on other tables in the Advanced hunting schema, see [the Advance - [All Advanced hunting tables](advanced-hunting-reference.md) - [Advanced hunting query best practices](advanced-hunting-best-practices.md) - [Query data using Advanced hunting](advanced-hunting.md) -- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md index 13ab77bce0..2657a97f61 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md @@ -29,7 +29,7 @@ ms.date: 11/12/2019 [!include[Prerelease information](prerelease.md)] -The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains the [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) inventory of software on your devices as well as any known vulnerabilities in these software products. This table also includes operating system information, CVE IDs, and vulnerability severity information. Use this reference to construct queries that return information from the table. +The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains the [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) inventory of software on your devices as well as any known vulnerabilities in these software products. This table also includes operating system information, CVE IDs, and vulnerability severity information. Use this reference to construct queries that return information from the table. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). @@ -54,4 +54,4 @@ For information on other tables in the Advanced hunting schema, see [the Advance - [All Advanced hunting tables](advanced-hunting-reference.md) - [Advanced hunting query best practices](advanced-hunting-best-practices.md) - [Query data using Advanced hunting](advanced-hunting.md) -- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md index 6084894c09..3e5bd4f7ec 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md @@ -1,6 +1,6 @@ --- title: DeviceTvmSoftwareVulnerabilitiesKB table in the Advanced hunting schema -description: Learn about the software vulnerabilities tracked by [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) in the DeviceTvmSoftwareVulnerabilitiesKB table of the Advanced hunting schema. +description: Learn about the software vulnerabilities tracked by Threat & Vulnerability Management in the DeviceTvmSoftwareVulnerabilitiesKB table of the Advanced hunting schema. keywords: advanced hunting, threat hunting, cyber threat hunting, search, query, telemetry, schema reference, kusto, table, column, data type, description, threat & vulnerability management, TVM, device management, software, inventory, vulnerabilities, CVE ID, CVSS, DeviceTvmSoftwareVulnerabilitiesKB search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -28,7 +28,7 @@ ms.date: 11/12/2019 [!include[Prerelease information](prerelease.md)] -The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains the list of vulnerabilities [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) assesses devices for. Use this reference to construct queries that return information from the table. +The DeviceTvmSoftwareInventoryVulnerabilities table in the Advanced hunting schema contains the list of vulnerabilities [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) assesses devices for. Use this reference to construct queries that return information from the table. For information on other tables in the Advanced hunting schema, see [the Advanced hunting reference](advanced-hunting-reference.md). @@ -49,4 +49,4 @@ For information on other tables in the Advanced hunting schema, see [the Advance - [All Advanced hunting tables](advanced-hunting-reference.md) - [Advanced hunting query best practices](advanced-hunting-best-practices.md) - [Query data using Advanced hunting](advanced-hunting.md) -- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) From 342bb5bcb38aea2daccf3f8b4a70e8e1a3c0362f Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 13 Nov 2019 09:20:51 -0800 Subject: [PATCH 4/6] tools updates --- devices/surface/microsoft-surface-data-eraser.md | 10 ++++++++-- devices/surface/surface-dock-firmware-update.md | 5 +++-- 2 files changed, 11 insertions(+), 4 deletions(-) diff --git a/devices/surface/microsoft-surface-data-eraser.md b/devices/surface/microsoft-surface-data-eraser.md index 64e380aab5..90b623c490 100644 --- a/devices/surface/microsoft-surface-data-eraser.md +++ b/devices/surface/microsoft-surface-data-eraser.md @@ -14,7 +14,7 @@ author: dansimp ms.author: dansimp ms.topic: article ms.audience: itpro -ms.date: 10/21/2019 +ms.date: 11/13/2019 --- # Microsoft Surface Data Eraser @@ -160,11 +160,17 @@ After you create a Microsoft Surface Data Eraser USB stick, you can boot a suppo Microsoft Surface Data Eraser is periodically updated by Microsoft. For information about the changes provided in each new version, see the following: +### 3.28.137 +*Release Date: 11 Nov 2019* +This version of Surface Data Eraser: + +- Includes bug fixes + ### Version 3.21.137 *Release Date: 21 Oct 2019* This version of Surface Data Eraser is compiled for x86 and adds support for the following devices: -Supports Surface Pro 7, Surface Pro X, and Surface Laptop 3. +- Supports Surface Pro 7, Surface Pro X, and Surface Laptop 3 ### Version 3.2.78.0 *Release Date: 4 Dec 2018* diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index 8fa4e11515..5a35ad30b4 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -86,15 +86,16 @@ Successful completion of Surface Dock Firmware Update results in new registry ke ## Event logging -**Table 1. Event logging for Surface Dock Firmware Update** +**Table 1. Log files for Surface Dock Firmware Update** | Log | Location | Notes | | -------------------------------- | -------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| Surface Dock Firmware Update log | Path needs to be specified (see note) | Earlier versions of this tool wrote events to Applications and Services Logs\Microsoft Surface Dock Updater. | +| Surface Dock Firmware Update log | /l*v %windir%\logs\ SurfaceDockFWI.log | | | Windows Device Install log | %windir%\inf\setupapi.dev.log | For more information about using Device Install Log, refer to [SetupAPI Logging](https://docs.microsoft.com/windows-hardware/drivers/install/setupapi-logging--windows-vista-and-later-). | **Table 2. Event log IDs for Surface Dock Firmware Update** +Events are logged in the Application Event Log. Note: Earlier versions of this tool wrote events to Applications and Services Logs\Microsoft Surface Dock Updater. | Event ID | Event type | | -------- | -------------------------------------------------------------------- | From 9080c68cb98e7f173c7df27cb1ca856b5a236a8c Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 13 Nov 2019 09:53:05 -0800 Subject: [PATCH 5/6] pencil edit line 98 --- devices/surface/surface-dock-firmware-update.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index 5a35ad30b4..c37245b054 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -95,7 +95,7 @@ Successful completion of Surface Dock Firmware Update results in new registry ke **Table 2. Event log IDs for Surface Dock Firmware Update** -Events are logged in the Application Event Log. Note: Earlier versions of this tool wrote events to Applications and Services Logs\Microsoft Surface Dock Updater. +Events are logged in the Application Event Log. Note: Earlier versions of this tool wrote events to Applications and Services Logs\Microsoft Surface Dock Updater. | Event ID | Event type | | -------- | -------------------------------------------------------------------- | From 59353e9d654458348e41b3c34977aefb7a9b2837 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 13 Nov 2019 09:56:15 -0800 Subject: [PATCH 6/6] pencil edit lines 98-100 --- devices/surface/surface-dock-firmware-update.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index c37245b054..819203d9e4 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -95,7 +95,9 @@ Successful completion of Surface Dock Firmware Update results in new registry ke **Table 2. Event log IDs for Surface Dock Firmware Update** -Events are logged in the Application Event Log. Note: Earlier versions of this tool wrote events to Applications and Services Logs\Microsoft Surface Dock Updater. +Events are logged in the Application Event Log. +> [!NOTE] +> Earlier versions of this tool wrote events to Applications and Services Logs\Microsoft Surface Dock Updater. | Event ID | Event type | | -------- | -------------------------------------------------------------------- |