Skip to content

Latest commit

 

History

History
59 lines (47 loc) · 2.88 KB

advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md

File metadata and controls

59 lines (47 loc) · 2.88 KB
title description search.appverid ms.service ms.subservice f1.keywords ms.author author ms.localizationpriority manager audience ms.collection ms.custom ms.topic ms.date
DeviceTvmSoftwareVulnerabilitiesKB table in the advanced hunting schema
Learn about the software vulnerabilities tracked by Microsoft Defender Vulnerability Management in the DeviceTvmSoftwareVulnerabilitiesKB table of the advanced hunting schema.
met150
defender-xdr
adv-hunting
NOCSH
maccruz
schmurky
medium
dansimp
ITPro
m365-security
tier3
cx-ti
cx-ah
reference
01/16/2024

DeviceTvmSoftwareVulnerabilitiesKB

[!INCLUDE Microsoft Defender XDR rebranding]

Applies to:

  • Microsoft Defender XDR

The DeviceTvmSoftwareVulnerabilitiesKB table in the advanced hunting schema contains the list of vulnerabilities Microsoft Defender Vulnerability Management assesses devices for. Use this reference to construct queries that return information from the table.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
CveId string Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system
CvssScore string Severity score assigned to the security vulnerability under the Common Vulnerability Scoring System (CVSS)
IsExploitAvailable boolean Indicates whether exploit code for the vulnerability is publicly available
VulnerabilitySeverityLevel string Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape
LastModifiedTime datetime Date and time the item or related metadata was last modified
PublishedDate datetime Date vulnerability was disclosed to the public
VulnerabilityDescription string Description of the vulnerability and associated risks
AffectedSoftware dynamic List of all software products affected by the vulnerability

Related topics