Episode
Vulnerability Management in Defender CSPM | Defender for Cloud in the Field
In this episode of Defender for Cloud in the Field, Shahar Bahat joins Yuri Diogenes to talk about some updates in Vulnerability Management in Defender for Cloud. Shahar talks about the different aspects of vulnerability management in Defender for Cloud, how to leverage attack path to identify the impact of a vulnerability and how to use Cloud Security Explorer to gain visualization of CVEs at scale across all your subscriptions. Shahar also demonstrates how to utilize these capabilities in Defender for Cloud.
Chapters
- 01:15 - Overview of Vulnerability Management solution in Defender for Cloud
- 02:31 - Insights available as result of the vulnerability scanning
- 03:41 - Integration with Microsoft Threat Vulnerability Management
- 04:52 - Querying vulnerability scan results at scale
- 02:31 - Insights available as result of the vulnerability scanning
- 03:41 - Integration with Microsoft Threat Vulnerability Management
- 04:52 - Quering vulnerability scan results at scale
- 06:53 - Demonstration
Recommended resources
- Learn more
- Subscribe to Microsoft Security on YouTube
- Join our Tech Community
- For more about Microsoft Security
Connect
- Microsoft Security | Twitter: @msftsecurity | LinkedIn: /in/microsoft-security
In this episode of Defender for Cloud in the Field, Shahar Bahat joins Yuri Diogenes to talk about some updates in Vulnerability Management in Defender for Cloud. Shahar talks about the different aspects of vulnerability management in Defender for Cloud, how to leverage attack path to identify the impact of a vulnerability and how to use Cloud Security Explorer to gain visualization of CVEs at scale across all your subscriptions. Shahar also demonstrates how to utilize these capabilities in Defender for Cloud.
Chapters
- 01:15 - Overview of Vulnerability Management solution in Defender for Cloud
- 02:31 - Insights available as result of the vulnerability scanning
- 03:41 - Integration with Microsoft Threat Vulnerability Management
- 04:52 - Querying vulnerability scan results at scale
- 02:31 - Insights available as result of the vulnerability scanning
- 03:41 - Integration with Microsoft Threat Vulnerability Management
- 04:52 - Quering vulnerability scan results at scale
- 06:53 - Demonstration
Recommended resources
- Learn more
- Subscribe to Microsoft Security on YouTube
- Join our Tech Community
- For more about Microsoft Security
Connect
- Microsoft Security | Twitter: @msftsecurity | LinkedIn: /in/microsoft-security
Have feedback? Submit an issue here.