DeviceTvmSoftwareVulnerabilitiesKBDeviceTvmSoftwareVulnerabilitiesKB

重要

改良的 Microsoft 365 安全性中心現在可用。The improved Microsoft 365 security center is now available. 這個新的體驗會將適用於端點的 Defender、適用於 Office 365 的 Defender、Microsoft 365 Defender 和更多功能帶到 Microsoft 365 安全性中心。This new experience brings Defender for Endpoint, Defender for Office 365, Microsoft 365 Defender, and more into the Microsoft 365 security center. 了解新功能Learn what's new.

適用於Applies to:

  • Microsoft 365 DefenderMicrosoft 365 Defender

進階搜捕結構描述中的 DeviceTvmSoftwareVulnerabilitiesKB 表格包含 威脅與弱點管理為裝置進行評估的弱點清單。The DeviceTvmSoftwareVulnerabilitiesKB table in the advanced hunting schema contains the list of vulnerabilities Threat & Vulnerability Management assesses devices for. 使用這個參考來建立從表格取回之資訊的查詢。Use this reference to construct queries that return information from the table.

如需進階搜捕結構描述中其他表格的資訊,請參閱 進階搜捕參考 (部分內容為機器翻譯)。For information on other tables in the advanced hunting schema, see the advanced hunting reference.

資料行名稱Column name 資料類型Data type 描述Description
CveId 字串string 在常見弱點與漏洞 (CVE) 系統下指派給安全性弱點的唯一識別碼Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system
CvssScore 字串string 在常見弱點計分系統 (CVSS) 下指派給安全性弱點的嚴重性分數Severity score assigned to the security vulnerability under th Common Vulnerability Scoring System (CVSS)
IsExploitAvailable 布林值boolean 表示該弱點的惡意探索代碼是否可供公開使用Indicates whether exploit code for the vulnerability is publicly available
VulnerabilitySeverityLevel 字串string 安全性弱點之嚴重性層級的指派是根據 CVSS 分數,以及受威脅環境影響的動態因素Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape
LastModifiedTime datetimedatetime 上次修改之項目及相關中繼資料的日期和時間Date and time the item or related metadata was last modified
PublishedDate datetimedatetime 公開的日期弱點Date vulnerability was disclosed to public
VulnerabilityDescription 字串string 弱點及相關風險的描述Description of vulnerability and associated risks
AffectedSoftware 字串string 受此弱點影響的所有軟體產品清單List of all software products affected by the vulnerability