mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Update two pages
This commit is contained in:
parent
1392b227c2
commit
d612aa6bf2
@ -64,7 +64,8 @@ Table and column names are also listed within the Microsoft Defender Security Ce
|
|||||||
| **[DeviceImageLoadEvents](advanced-hunting-deviceimageloadevents-table.md)** | DLL loading events |
|
| **[DeviceImageLoadEvents](advanced-hunting-deviceimageloadevents-table.md)** | DLL loading events |
|
||||||
| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** | Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection |
|
| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** | Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection |
|
||||||
| **[DeviceFileCertificateInfo](advanced-hunting-devicefilecertificateinfo-table.md)** | Certificate information of signed files obtained from certificate verification events on endpoints |
|
| **[DeviceFileCertificateInfo](advanced-hunting-devicefilecertificateinfo-table.md)** | Certificate information of signed files obtained from certificate verification events on endpoints |
|
||||||
| **[DeviceTvmSoftwareInventoryVulnerabilities](advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md)** | Inventory of software on devices as well as any known vulnerabilities in these software products |
|
| **[DeviceTvmSoftwareInventory](advanced-hunting-devicetvmsoftwareinventory-table.md)** | Inventory of software installed on devices, including their version information and end-of-support status |
|
||||||
|
| **[DeviceTvmSoftwareVulnerabilities](advanced-hunting-devicetvmsoftwarevulnerabilities-table.md)** | Software vulnerabilities found on devices and the list of available security updates that address each vulnerability |
|
||||||
| **[DeviceTvmSoftwareVulnerabilitiesKB ](advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md)** | Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available |
|
| **[DeviceTvmSoftwareVulnerabilitiesKB ](advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md)** | Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available |
|
||||||
| **[DeviceTvmSecureConfigurationAssessment](advanced-hunting-devicetvmsecureconfigurationassessment-table.md)** | Threat & Vulnerability Management assessment events, indicating the status of various security configurations on devices |
|
| **[DeviceTvmSecureConfigurationAssessment](advanced-hunting-devicetvmsecureconfigurationassessment-table.md)** | Threat & Vulnerability Management assessment events, indicating the status of various security configurations on devices |
|
||||||
| **[DeviceTvmSecureConfigurationAssessmentKB](advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md)** | Knowledge base of various security configurations used by Threat & Vulnerability Management to assess devices; includes mappings to various standards and benchmarks |
|
| **[DeviceTvmSecureConfigurationAssessmentKB](advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md)** | Knowledge base of various security configurations used by Threat & Vulnerability Management to assess devices; includes mappings to various standards and benchmarks |
|
||||||
|
@ -38,7 +38,9 @@ Advanced hunting is a query-based threat-hunting tool that lets you explore up t
|
|||||||
|
|
||||||
### Schema tables
|
### Schema tables
|
||||||
|
|
||||||
- [DeviceTvmSoftwareInventoryVulnerabilities](advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md) - Inventory of software on devices as well as any known vulnerabilities in these software products
|
- [DeviceTvmSoftwareInventory](advanced-hunting-devicetvmsoftwareinventory-table.md) - Inventory of software installed on devices, including their version information and end-of-support status
|
||||||
|
|
||||||
|
- [DeviceTvmSoftwareVulnerabilities](advanced-hunting-devicetvmsoftwarevulnerabilities-table.md) - Software vulnerabilities found on devices and the list of available security updates that address each vulnerability
|
||||||
|
|
||||||
- [DeviceTvmSoftwareVulnerabilitiesKB](advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md) - Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available
|
- [DeviceTvmSoftwareVulnerabilitiesKB](advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md) - Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available
|
||||||
|
|
||||||
@ -56,7 +58,7 @@ Advanced hunting is a query-based threat-hunting tool that lets you explore up t
|
|||||||
|
|
||||||
```kusto
|
```kusto
|
||||||
// Search for devices with High active alerts or Critical CVE public exploit
|
// Search for devices with High active alerts or Critical CVE public exploit
|
||||||
DeviceTvmSoftwareInventoryVulnerabilities
|
DeviceTvmSoftwareVulnerabilities
|
||||||
| join kind=inner(DeviceTvmSoftwareVulnerabilitiesKB) on CveId
|
| join kind=inner(DeviceTvmSoftwareVulnerabilitiesKB) on CveId
|
||||||
| where IsExploitAvailable == 1 and CvssScore >= 7
|
| where IsExploitAvailable == 1 and CvssScore >= 7
|
||||||
| summarize NumOfVulnerabilities=dcount(CveId),
|
| summarize NumOfVulnerabilities=dcount(CveId),
|
||||||
@ -66,7 +68,6 @@ DeviceName=any(DeviceName) by DeviceId
|
|||||||
DeviceName=any(DeviceName) by DeviceId, AlertId
|
DeviceName=any(DeviceName) by DeviceId, AlertId
|
||||||
| project DeviceName, NumOfVulnerabilities, AlertId
|
| project DeviceName, NumOfVulnerabilities, AlertId
|
||||||
| order by NumOfVulnerabilities desc
|
| order by NumOfVulnerabilities desc
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
Loading…
x
Reference in New Issue
Block a user