Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Important
Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
The DeviceTvmBrowserExtensionsKB
table in the advanced hunting schema contains information about browser extension details and permission information used in Microsoft Defender Vulnerability Management browser extensions page.
This advanced hunting table is populated by records from Microsoft Defender for Endpoint. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy Defender for Endpoint in Defender XDR, read Deploy supported services.
For information on other tables in the advanced hunting schema, see the advanced hunting reference.
Column name | Data type | Description |
---|---|---|
BrowserName |
string |
Name of the web browser with the extension |
ExtensionId |
string |
Unique identifier for the browser extension |
ExtensionName |
string |
Name of the extension |
ExtensionDescription |
string |
Description from the publisher about the extension |
ExtensionVersion |
dynamic |
Version number of the extension |
ExtensionRisk |
string |
Risk level for the extension based on the permissions it has requested |
PermissionId |
string |
Unique identifier for the permission |
PermissionName |
string |
Name given to each permission based on what the extension is asking for |
PermissionDescription |
string |
Explanation of what the permission is supposed to do |
PermissionRisk |
string |
Risk level for the permission based on the type of access it would allow |
IsPermissionRequired |
string |
Whether the permission is required for the extension to run, or optional |
Related topics
- Proactively hunt for threats
- Learn the query language
- Use shared queries
- Hunt across devices, emails, apps, and identities
- Understand the schema
- Apply query best practices
- Overview of Microsoft Defender Vulnerability Management
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.