Vulnerability resource type

Applies to:

Want to experience Defender for Endpoint? Sign up for a free trial.

Note

If you are a US Government customer, please use the URIs listed in Microsoft Defender for Endpoint for US Government customers.

Tip

For better performance, you can use server closer to your geo location:

  • api-us.securitycenter.microsoft.com
  • api-eu.securitycenter.microsoft.com
  • api-uk.securitycenter.microsoft.com
  • api-au.securitycenter.microsoft.com

Important

Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.

Methods

Method Return Type Description
Get all vulnerabilities Vulnerability collection Retrieves a list of all the vulnerabilities affecting the organization
Get vulnerability by Id Vulnerability Retrieves vulnerability information by its Id
List devices by vulnerability MachineRef collection Retrieve a list of devices that are associated with the vulnerability Id
List vulnerabilities by machine and software Vulnerability Retrieves a list of all the vulnerabilities affecting the organization per machine and software.

Properties

Property Type Description
Id String Vulnerability Id
Name String Vulnerability title
Description String Vulnerability description
Severity String Vulnerability Severity. Possible values are: Low, Medium, High, or Critical
cvssV3 Double CVSS v3 score
cvssVector String A compressed textual representation that reflects the values used to derive the score
exposedMachines Long Number of exposed devices
publishedOn DateTime Date when vulnerability was published
updatedOn DateTime Date when vulnerability was updated
publicExploit Boolean Public exploit exists
exploitVerified Boolean Exploit is verified to work
exploitInKit Boolean Exploit is part of an exploit kit
exploitTypes String collection Exploit affect. Possible values are: Local privilege escalation, Denial of service, or Local
exploitUris String collection Exploit source URLs
CveSupportability String collection Possible values are: Supported, Not Supported, or SupportedInPremium

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.