Vulnerability resource type
Applies to:
- Microsoft Defender for Endpoint Plan 1
- Microsoft Defender for Endpoint Plan 2
- Microsoft Defender XDR
Want to experience Defender for Endpoint? Sign up for a free trial.
Note
If you are a US Government customer, please use the URIs listed in Microsoft Defender for Endpoint for US Government customers.
Tip
For better performance, you can use server closer to your geo location:
- api-us.securitycenter.microsoft.com
- api-eu.securitycenter.microsoft.com
- api-uk.securitycenter.microsoft.com
- api-au.securitycenter.microsoft.com
Important
Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
Methods
Method | Return Type | Description |
---|---|---|
Get all vulnerabilities | Vulnerability collection | Retrieves a list of all the vulnerabilities affecting the organization |
Get vulnerability by Id | Vulnerability | Retrieves vulnerability information by its Id |
List devices by vulnerability | MachineRef collection | Retrieve a list of devices that are associated with the vulnerability Id |
List vulnerabilities by machine and software | Vulnerability | Retrieves a list of all the vulnerabilities affecting the organization per machine and software. |
Properties
Property | Type | Description |
---|---|---|
Id | String | Vulnerability Id |
Name | String | Vulnerability title |
Description | String | Vulnerability description |
Severity | String | Vulnerability Severity. Possible values are: Low, Medium, High, or Critical |
cvssV3 | Double | CVSS v3 score |
cvssVector | String | A compressed textual representation that reflects the values used to derive the score |
exposedMachines | Long | Number of exposed devices |
publishedOn | DateTime | Date when vulnerability was published |
updatedOn | DateTime | Date when vulnerability was updated |
publicExploit | Boolean | Public exploit exists |
exploitVerified | Boolean | Exploit is verified to work |
exploitInKit | Boolean | Exploit is part of an exploit kit |
exploitTypes | String collection | Exploit affect. Possible values are: Local privilege escalation, Denial of service, or Local |
exploitUris | String collection | Exploit source URLs |
CveSupportability | String collection | Possible values are: Supported, Not Supported, or SupportedInPremium |
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.
Commentaires
https://aka.ms/ContentUserFeedback.
Bientôt disponible : Tout au long de 2024, nous allons supprimer progressivement GitHub Issues comme mécanisme de commentaires pour le contenu et le remplacer par un nouveau système de commentaires. Pour plus d’informations, consultezEnvoyer et afficher des commentaires pour