Vulnerabilities on Application Level

Nghiem Huy Hoang (DPS.MS3) 25 Reputation points
2023-10-06T03:03:50.94+00:00

Hi guys,

A customer ask me:

Is there file scan to check for vulnerabilities on Application Level? Is this optimal in sharepoint?

Can you give me some proofs for these points

Thanks a lot

SharePoint Server
SharePoint Server
A family of Microsoft on-premises document management and storage systems.
2,422 questions
Microsoft Office Online Server
Microsoft Office Online Server
Microsoft on-premises server product that runs Office Online. Previously known as Office Web Apps Server.
682 questions
Office
Office
A suite of Microsoft productivity software that supports common business tasks, including word processing, email, presentations, and data management and analysis.
1,917 questions
SharePoint
SharePoint
A group of Microsoft Products and technologies used for sharing and managing content, knowledge, and applications.
11,230 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Ling Zhou_MSFT 23,600 Reputation points Microsoft External Staff
    2023-10-06T08:00:21.48+00:00

    Hi @Nghiem Huy Hoang (DPS.MS3),

    Thank you for posting in this community.

    Microsoft 365 uses a third-party scanning tool utilizing two different techniques to ensure full coverage of its assets: host-based and network-based.

    Scans evaluate hosts and network devices for missing patches, configuration issues, and application vulnerabilities using up-to-date vulnerability information from industry sources such as the Microsoft Security Response Center (MSRC), the NIST National Vulnerability Database, and the MITRE Common Vulnerabilities and Disclosures Database.

    Host-based scans are performed daily, network scans are performed weekly.

    Microsoft 365 Security uses automated reporting to compare scan results over time, displaying new vulnerabilities when they're found. These reports are updated daily and are available to authorized personnel via the Patching and Vulnerability Compliance (PAVC) dashboard.

    You can read this article to get more detailed information about Microsoft 365 vulnerability scanning and remediation.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.