Threat and Vulnerability Management - Software Inventory | Microsoft Defender for Endpoint

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ก.ค. 2024
  • #security #ciso #soc #securityOperationsCenter #microsoft #securityoperations #cybersecurity #security #informationsecurity #datasecurity #infosec #databreach #cyber #cloudsecurity #networksecurity #computersecurity #privacy #ciso #soc #securityOperationsCenter #socanalyst #socasaservice
    • Software Inventory Management
    • How exactly it Works?
    • Which Software’s are not supported?
    • What is Software Evidence?
    • How to Report Inaccuracy?
    • What is Threat and Vulnerability Management?
    • How TVM helps in discovering real time vulnerabilities and misconfigurations?
    • How TVM helps in bridging gaps between the IT and the security teams?
    What is Microsoft Defender for Endpoint? - • Microsoft Defender - W...
    Getting Started with Microsoft Defender for Endpoint? - • Microsoft Defender for...
    Microsoft Defender for Endpoint - Role Based Access Control - • Microsoft Defender for...
    Microsoft Defender for Endpoint - Role Based Access Control - Portal Configuration- • Microsoft Defender for...
    Onboard Windows 10 Devices | Microsoft Defender for Endpoints | MDATP | Local Script- • Onboard Windows 10 Dev...
    Onboard Windows 10 Devices from GPO | Microsoft Defender for Endpoint - • Onboard Windows 10 Dev...
    Microsoft Defender For Endpoint Deployment Guide - • Detailed Deployment Vi...
    What is Vulnerability? - • What is Vulnerability?
    What is Vulnerability Management? - • Vulnerability Manageme...
    What are CVE's? - • What is CVE? | Common ...
    What is CVSS? - • What is CVSS? | Common...
    Getting started with TVM - • Getting Started with T...
    Microsoft Official Documentation - docs.microsoft.com/en-us/micr...
    Microsoft Article - docs.microsoft.com/en-us/micr...
    Regards,
    ConceptsWork
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 5

  • @anuverma1442
    @anuverma1442 2 ปีที่แล้ว

    This is so great, thank you so much for this series, perfect explanation. It's really helping me a lot.
    But, I don't see the next video (event timelines).

  • @blueteaming
    @blueteaming 2 ปีที่แล้ว +1

    Perfect explanation. Short and sweet :)

  • @adityakapoor9068
    @adityakapoor9068 2 ปีที่แล้ว

    Can we also report inaccuracy to Microsoft for software's where the old patch has been superseded by new one and instead of deploying an old patch we have deployed new in the complete environment?
    In my organization, for .Net application we have deployed new patch but we still see the vulnerabilities fixed by old patch available and contributing to exposure score.

    • @ConceptsWork
      @ConceptsWork  2 ปีที่แล้ว +1

      Yes for sure, please select the respective software and then from software page itself, share the feedback, also please mention the exact details.