From the course: Controlling Cybersecurity Risk with Defender Vulnerability Management

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Software inventories

Software inventories

- [Instructor] To discover vulnerabilities on our devices that are now onboarded into Defender Vulnerability Management, one of the key tools that Defender has is the ability to generate software inventories. Software inventories will produce a list of all the actual software that is discovered on those devices, plus any vulnerabilities associated with them. One of the key things you need to know about how that list is built up is that it uses the Common Platform Enumeration system or CPE. You can kind of think of CPE as giving every piece of software a unique identifier. Not every piece of software that's developed will have this. So, you can remove the default filter for CPEs, but those types of software may be discovered. You just won't get the vulnerability information about them. For your devices that are onboarded, the timing of how soon that software can go from discovered or onboarded on a device to showing up in the portal, that can vary, but you can expect something like a…

Contents