title | description | search.appverid | ms.service | ms.subservice | f1.keywords | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.custom | ms.topic | ms.date | |||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
DeviceTvmBrowserExtensionsKB table in the advanced hunting schema |
Learn about the various browser extension details and permission information used in the Microsoft Defender Vulnerability Management browser extensions page in the DeviceTvmBrowserExtensionsKB table in the advanced hunting schema. |
met150 |
defender-xdr |
adv-hunting |
|
v-sgoyagoy |
samanthagy |
medium |
dansimp |
ITPro |
|
|
reference |
11/20/2024 |
[!INCLUDE Microsoft Defender XDR rebranding]
Applies to:
- Microsoft Defender XDR
- Microsoft Defender for Endpoint
Important
Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
The DeviceTvmBrowserExtensionsKB
table in the advanced hunting schema contains information about browser extension details and permission information used in Microsoft Defender Vulnerability Management browser extensions page.
For information on other tables in the advanced hunting schema, see the advanced hunting reference.
Column name | Data type | Description |
---|---|---|
BrowserName |
string |
Name of the web browser with the extension |
ExtensionId |
string |
Unique identifier for the browser extension |
ExtensionName |
string |
Name of the extension |
ExtensionDescription |
string |
Description from the publisher about the extension |
ExtensionVersion |
dynamic |
Version number of the extension |
ExtensionRisk |
string |
Risk level for the extension based on the permissions it has requested |
PermissionId |
string |
Unique identifier for the permission |
PermissionName |
string |
Name given to each permission based on what the extension is asking for |
PermissionDescription |
string |
Explanation of what the permission is supposed to do |
PermissionRisk |
string |
Risk level for the permission based on the type of access it would allow |
IsPermissionRequired |
string |
Whether the permission is required for the extension to run, or optional |
- Proactively hunt for threats
- Learn the query language
- Use shared queries
- Hunt across devices, emails, apps, and identities
- Understand the schema
- Apply query best practices
- Overview of Microsoft Defender Vulnerability Management
[!INCLUDE Microsoft Defender XDR rebranding]