As an alternative to a remediation request when a recommendation is not relevant at the moment, you can create exceptions for recommendations. If your organization has device groups, you will be able to scope the exception to specific device groups. Exceptions can either be created for selected device groups, or for all device groups past […]
Category: Microsoft Endpoint
Remediate vulnerabilities with threat and vulnerability management (Microsoft)
Request remediation The threat and vulnerability management capability in Microsoft Defender for Endpoint bridges the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the Security recommendation pages to Intune. Enable Microsoft Intune connection To use this capability, enable your […]
Security recommendations – threat and vulnerability management (Microsoft)
Cybersecurity weaknesses identified in your organization are mapped to actionable security recommendations and prioritized by their impact. Prioritized recommendations help shorten the time to mitigate or remediate vulnerabilities and drive compliance. Each security recommendation includes actionable remediation steps. To help with task management, the recommendation can also be sent using Microsoft Intune and Microsoft Endpoint […]
Microsoft Secure Score for Devices
Note Configuration score is now part of threat and vulnerability management as Microsoft Secure Score for Devices. Your score for devices is visible in the threat and vulnerability management dashboard of the Microsoft 365 Defender portal. A higher Microsoft Secure Score for Devices means your endpoints are more resilient from cybersecurity threat attacks. It reflects the collective […]
Exposure score – threat and vulnerability management (Microsoft)
Your exposure score is visible in the Threat and vulnerability management dashboard of the Microsoft 365 Defender portal. It reflects how vulnerable your organization is to cybersecurity threats. Low exposure score means your devices are less vulnerable from exploitation. Quickly understand and identify high-level takeaways about the state of security in your organization. Detect and respond to […]
Dashboard insights – threat and vulnerability management (Microsoft)
Threat and vulnerability management is a component of Defender for Endpoint, and provides both security administrators and security operations teams with unique value, including: Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities Invaluable device vulnerability context during incident investigations Built-in remediation processes through Microsoft Intune and Microsoft Endpoint Configuration Manager You can […]
Assign device value – threat and vulnerability management (Microsoft)
Important Some information relates to prereleased product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. Defining a device’s value helps you differentiate between asset priorities. The device value is used to incorporate the risk appetite of an individual asset into […]
Supported operating systems, platforms and capabilities – for threat and vulnerability management (Microsoft)
Before you begin, ensure that you meet the following operating system or platform requisites for threat and vulnerability management so the activities in your devices are properly accounted for. Note The supported systems and platforms for threat and vulnerability management may be different from the Minimum requirements for Microsoft Defender for Endpoint list. Capabilities per supported operating […]
Prerequisites & permissions – threat and vulnerability management (Microsoft)
Ensure that your devices: Are onboarded to Microsoft Defender for Endpoint Run supported operating systems and platforms Have the following mandatory updates installed and deployed in your network to boost your vulnerability assessment detection rates: TABLE 1 Release Security update KB number and link Windows 10 Version 1709 KB4493441 and KB 4516071 Windows 10 Version 1803 KB4493464 and KB 4516045 […]
Threat and vulnerability management (Microsoft)
Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat and vulnerability management serves as an infrastructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. Discover vulnerabilities and misconfigurations in real time with sensors, and without the need of agents or […]