Defender Vulnerability Management overview Flashcards

(14 cards)

1
Q

What does Defender Vulnerability Management deliver?

A

Asset visibility, intelligent assessments, and built-in remediation tools for various platforms

Platforms include Windows, macOS, Linux, Android, iOS, and network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the Microsoft Defender Vulnerability Management Dashboard?

A

To provide a wide variety of useful information that helps identify issues and respond to those issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can be filtered in the Defender Vulnerability Management dashboard?

A

Selected device groups

Filters apply throughout the vulnerability management pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the exposure score indicate?

A

Current state of your organization’s device exposure to threats and vulnerabilities

Factors include weaknesses, likelihood of breach, device value, and relevant alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the goal related to the exposure score?

A

To lower the exposure score to be more secure

Achieved by remediating security configuration issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Microsoft Secure Score for Devices reflect?

A

Security posture of operating systems, applications, network, accounts, and security controls

Aimed at increasing the score by remediating configuration issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What information does the device exposure distribution provide?

A

Number of devices exposed based on their exposure level

Includes details such as device names, exposure level, risk level, and health state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can be seen regarding expiring certificates?

A

Number of certificates that are expired or due to expire in the next 30, 60, or 90 days

Important for maintaining security compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are top security recommendations based on?

A

Organizational risk exposure and urgency

Users can view exceptions for recommendations that have exceptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the top vulnerable software section provide?

A

Real-time visibility into vulnerable software installed on network devices

Includes impact on organizational exposure score.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can be tracked in the top remediation activities?

A

Remediation activities generated from security recommendations

Users can view details in the Remediation page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What information is available in the top exposed devices section?

A

Exposed device names and their exposure level

Users can manage tags and initiate automated investigations from the device list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can be viewed in the top events section?

A

Top events and the number of impacted devices in the last seven days

Includes new vulnerabilities and configuration assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 10 Defender Vulnerability Management dashboard areas?

A
  • Selected device groups
  • Exposure score
  • Microsoft Secure Score for Devices
  • Device exposure distribution
  • Expiring certificates
  • Top security recommendations
  • Top vulnerable software
  • Top remediation activities
  • Top exposed devices
  • Top events
How well did you know this?
1
Not at all
2
3
4
5
Perfectly