DeviceTvmSoftwareVulnerabilities
Note
Want to experience Microsoft Defender XDR? Learn more about how you can evaluate and pilot Microsoft Defender XDR.
Applies to:
- Microsoft Defender XDR
Important
Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
The DeviceTvmSoftwareVulnerabilities
table in the advanced hunting schema contains the Microsoft Defender Vulnerability Management list of vulnerabilities in installed software products. This table also includes operating system information, CVE IDs, and vulnerability severity information. You can use this table, for example, to hunt for events involving devices that have severe vulnerabilities in their software. Use this reference to construct queries that return information from the table.
Note
The DeviceTvmSoftwareInventory
and DeviceTvmSoftwareVulnerabilities
tables have replaced the DeviceTvmSoftwareInventoryVulnerabilities
table. Together, the first two tables include more columns you can use to help inform your vulnerability management activities or hunt for vulnerable devices.
For information on other tables in the advanced hunting schema, see the advanced hunting reference.
Column name | Data type | Description |
---|---|---|
DeviceId |
string |
Unique identifier for the machine in the service |
DeviceName |
string |
Fully qualified domain name (FQDN) of the machine |
OSPlatform |
string |
Platform of the operating system running on the machine. Indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10, and Windows 7. |
OSVersion |
string |
Version of the operating system running on the machine |
OSArchitecture |
string |
Architecture of the operating system running on the machine |
SoftwareVendor |
string |
Name of the software publisher |
SoftwareName |
string |
Name of the software product |
SoftwareVersion |
string |
Version number of the software product |
CveId |
string |
Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system |
VulnerabilitySeverityLevel |
string |
Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape |
RecommendedSecurityUpdate |
string |
Name or description of the security update provided by the software publisher to address the vulnerability |
RecommendedSecurityUpdateId |
string |
Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles |
Related topics
- Proactively hunt for threats
- Learn the query language
- Use shared queries
- Hunt across devices, emails, apps, and identities
- Understand the schema
- Apply query best practices
- Overview of Microsoft Defender Vulnerability Management
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.
Feedback
Submit and view feedback for