Microsoft Defender ATP with reports of vulnerable devices

The endpoint Microsoft Defender Advanced Threat Protection (ATP) now provides administrators with a new report designed to help them monitor vulnerable Windows and macOS devices connected to their organization's environment.

Vulnerable Devices Report displays graphs with statistics and details of current vulnerable device trends with the ultimate goal of making it easier for administrators to understand the extent of device exposure within the organization.

“You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, of Windows 10 or group of devices,” Microsoft says.

“If there's something you want to explore further, select the relevant graph to see a filtered list of devices in of the devices. From there, you can export the list.”

Among the information that administrators can draw from this new Microsoft Defender ATP report (recently renamed Microsoft Defender for Endpoint), Microsoft states:

  • Device vulnerability severity levels (eg all devices with critical vulnerabilities)
  • Device exploit availability (eg all devices with exploit)
  • Age of device vulnerabilities (eg devices with vulnerabilities published 90 days ago)
  • Vulnerable devices from the operating system
  • Vulnerable devices from the Windows 10 version

For example, the severity graph will show the number of devices based on the most serious vulnerability identified for each of them, while the exploit availability graph will show the number of vulnerable devices based on the severity of known exploits.

The new reporting feature is in public preview as of today, and administrators can access it by going to Reports> Vulnerable Devices in the Microsoft Defender Security Center after switching their operating system to preview features.

Starting in July, Microsoft Defender ATP also added the Microsoft Secure Score for Devices feature that can assess the collective state of device security settings on a corporate network.

This feature detects unprotected systems and provides suggested actions to increase an organization's security.

A detailed description of the procedure that should be followed to address the issues identified by Microsoft Secure Score is available here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).