Using Export API with Defender Vulnerability Management (2024)

Microsoft Defender Vulnerability Management helps organizations identify and remediate security vulnerabilities in their environment.

It provides a centralized view of vulnerabilities across all device types in an organization and prioritizes them based on severity and exploitability.

Defender Vulnerability Management provides an export API that allows programmatic access to vulnerability data. The API can be used to automate vulnerability management tasks, integrate vulnerability data with other security tools, and generate custom reports and dashboards.

In this blog, we will share guidance and best practices for using Defender Vulnerability Management Export API including:

  • Overview of the Export API
  • Available API methods using Export API
  • Using API Explorer
  • Managing large data sets and ensuring exports are up to date
  • Use Export API to build custom dashboards/reports
  • Defender Vulnerability Management data integrated in other tools

Overview of the Export API data types

Export API is used for publishing raw data of all known software vulnerabilities and their details for devices in the organization.

  • There are two export API methods: JSON response and files.

Method

Explanation

JSON response

  • Can be used to get Defender Vulnerability Management snapshot of all data in the organizationor can be used to query delta changes in the last X days (where X is up to 15 days)
  • Delta export indicates per CVE record the CVE status (New, Updated or Resolved)
  • Can be saved as excel file, opened in Notepad or VScode, and can be extracted using different scripts

Files

  • Can be used to get Defender Vulnerability Management snapshot of all data in the organization
  • Recommended for large organizations with more than 100K devices
  • Each file contains 100K records
  • To get the next results batch, use skip token (@odata.nextLinkfield)
  • Result in files format is valid for 3 hours to download (sass URL)
  • The files also contain information about devices that are not yet onboarded to Defender
  • Export software vulnerabilities assessment filter options: RbacName, $skiptoken, $top, pageSize
  • Delta export software vulnerabilities assessment filter options: RbacName, $skiptoken, $top, pageSize, sinceTime

More details can be seen here: Export software vulnerabilities assessment per device | Microsoft Learn

Available API methods using Export API

via files:

API Method

Details

SoftwareVulnerabilitiesExport

Software vulnerabilities data by machine

Export software vulnerabilities assessment per device | Microsoft Learn

SoftwareInventoryExport

software data by machine

Export software inventory assessment per device | Microsoft Learn

InfoGatheringExport

Export information gathering assessment | Microsoft Learn

SoftwareInventoryNonCpeExport

non cpe products by machine

Export non product code software inventory assessment per device | Microsoft Learn

SecureConfigurationsAssessmentExport

SCA data by machine(configurations)

Export secure configuration assessment per device | Microsoft Learn

HardwareFirmwareInventoryExport

firmware data by machine

Hardware and firmware assessment methods and properties per device | Microsoft Learn

BrowserExtensionsInventoryExport

browser extensions by machine

Export browser extensions assessment | Microsoft Learn

BaselineComplianceAssessmentExport

Baseline data by machine

Security baseline assessment methods and properties per device | Microsoft Learn

CertificateAssessmentExport

certificates data by machine

Certificate assessment methods and properties per device | Microsoft Learn

JSON response:

SoftwareVulnerabilitiesByMachine

vulnerabilities data by machine

Export software vulnerabilities assessment per device | Microsoft Learn

SecureConfigurationsAssessmentByMachine

SCA data by machine(configurations)

Export secure configuration assessment per device | Microsoft Learn

SoftwareVulnerabilityChangesByMachine

delta

Export software vulnerabilities assessment per device | Microsoft Learn

SoftwareInventoryByMachine

software data by machine

Export software inventory assessment per device | Microsoft Learn

SoftwareInventoryNoProductCodeByMachine

non cpe products by machine

Export non product code software inventory assessment per device | Microsoft Learn

BrowserExtensionsInventoryByMachine

browser extensions by machine

Export browser extensions assessment | Microsoft Learn

HardwareFirmwareInventoryByMachine

firmware data by machine

Hardware and firmware assessment methods and properties per device | Microsoft Learn

BaselineComplianceAssessmentByMachine

baseline data by machine

Security baseline assessment methods and properties per device | Microsoft Learn

CertificateAssessmentByMachine

certificates data by machine

Certificate assessment methods and properties per device | Microsoft Learn

Using API Explorer from security portal

With the API Explorer, you can:

  • Run requests for any method and see responses in real-time
  • Quickly browse through the API samples and learn what parameters they support
  • Make API calls with ease

To start, Open Defender portal and navigate to ‘Endpoints-Partners and API-API Explorer ‘

Based on the required data to explore, add the suffix to the API call.

In the example, we will use software vulnerabilities:

https://api.security.microsoft.com/api/machines/SoftwareVulnerabilitiesExport

Using Export API with Defender Vulnerability Management (1)

  • Run the query
  • To check its working and export to excel:
  • Copy one of the files URL from the results:

Using Export API with Defender Vulnerability Management (2)

  • Open it in website and save the JSON file
  • Extract the JSON file
  • Open excel , click on ‘Data’ tab->get data->from file->from JSON and choose the file you saved above

Managing large data sets and ensuring exports are up to date

In case of large amounts of data, Organizations can use the below steps to avoid pulling all defender vulnerability management data every day and still ensure data in export is up to date:

1.Pull ‘Export software vulnerabilities assessment’ once a week

2.Pull ‘Delta export software vulnerabilities assessment’ once a day

3.Join the full snapshot with the delta file based on Device ID, Software name and versionand CVE ID

4.Latest ‘Event time stamp’ indicate on the latest status of a specific CVE

Use Export API to build custom dashboards/reports

Using Defender Vulnerability Management Export API customers can build custom reports and dashboards per the organization needs. We have seen organizations build anything executive or management reports to detailed vulnerability management dashboards.

There are variety of methods to use the API such as Power-Automate, Power BI, , Advanced hunting using Python, Advanced hunting using PowerShell, Using OData queries.

One example to get started is to use Defender Vulnerability Management Power BI templates which enable out of the box reports such as Organization existing vulnerabilities, Software inventory, Missing Windows security updates and more.

You can download the templateshere.

Defender Vulnerability Management data integrated in other tools

Defender Vulnerability Management data can be integrated in other security tools. Below examples of both Microsoft and non-Microsoft tools:

Microsoft Intune

Integration with Microsoft Intune allows customers to ‘Request Remediation’ to vulnerability security recommendations. This will create an Intune package deployment request and remediation activity item within the security portal, which can be used for monitoring the remediation progress for this recommendation.

Using Export API with Defender Vulnerability Management (3)

Using Export API with Defender Vulnerability Management (4)

Using Export API with Defender Vulnerability Management (5)

ServiceNow Vulnerability Response

For organization using ServiceNow to manage assets, ServiceNow VR can import data from different resources such as assets information, vulnerabilities information and more.

ServiceNow integration synchronizes vulnerability findings from Defender Vulnerability Management and orchestrates the remediation workflow in ServiceNow.

To learn more, see blog describing the integration,Microsoft vulnerability management integrates with ServiceNow VR

Microsoft Sentinel

Use Sentinel to store Defender Vulnerability Management history data. This can be used to integrate vulnerability data with other XDR workflows data, build a custom dashboard and as part of it reflect vulnerability management trends and more. To store Defender Vulnerability Management data, please follow the below:

Azure-Sentinel/DataConnectors/M365Defender-VulnerabilityManagement at master · Azure/Azure-Sentinel ...

Please make sure any analytic rules/hunting queries/workbooks or any content that is related to Defender Vulnerability Management data is directed to the tables you have created.

Microsoft Security Exposure Management

Exposure Management integrates with Defender Vulnerability Management helping security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization's digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track and delegate vulnerabilities within the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement.

Using Export API with Defender Vulnerability Management (6)

To learn more about, see documentation about security initiatives or blog series introducing Exposure Management.

for additional Defender Vulnerability Management, please visitDocumentation pageandNinja page

Using Export API with Defender Vulnerability Management (2024)

References

Top Articles
What Does Dating Really Mean? The Definition and Meaning of Dating.
What Does Dating Mean?
Woodward Avenue (M-1) - Automotive Heritage Trail - National Scenic Byway Foundation
Cottonwood Vet Ottawa Ks
Obor Guide Osrs
St Als Elm Clinic
Alpha Kenny Buddy - Songs, Events and Music Stats | Viberate.com
Volstate Portal
Displays settings on Mac
Midway Antique Mall Consignor Access
Nichole Monskey
Keurig Refillable Pods Walmart
California Department of Public Health
Craigslist Farm And Garden Tallahassee Florida
Conscious Cloud Dispensary Photos
065106619
Nissan Rogue Tire Size
Sport-News heute – Schweiz & International | aktuell im Ticker
Soccer Zone Discount Code
Jellyfin Ps5
Parentvue Clarkston
The Ultimate Guide to Extras Casting: Everything You Need to Know - MyCastingFile
Today Was A Good Day With Lyrics
Ups Print Store Near Me
Vegito Clothes Xenoverse 2
12 Top-Rated Things to Do in Muskegon, MI
Raw Manga 1000
Costco Jobs San Diego
How Do Netspend Cards Work?
Primerica Shareholder Account
Redbox Walmart Near Me
Green Bay Crime Reports Police Fire And Rescue
Steven Batash Md Pc Photos
Lichen - 1.17.0 - Gemsbok! Antler Windchimes! Shoji Screens!
Mp4Mania.net1
Etowah County Sheriff Dept
Space Marine 2 Error Code 4: Connection Lost [Solved]
2700 Yen To Usd
Frommer's Philadelphia & the Amish Country (2007) (Frommer's Complete) - PDF Free Download
Davis Fire Friday live updates: Community meeting set for 7 p.m. with Lombardo
Casamba Mobile Login
Ezpawn Online Payment
Nina Flowers
Random Animal Hybrid Generator Wheel
Babykeilani
Candise Yang Acupuncture
UNC Charlotte Admission Requirements
Spn 3464 Engine Throttle Actuator 1 Control Command
Fishing Hook Memorial Tattoo
Les BABAS EXOTIQUES façon Amaury Guichon
Yoshidakins
Latest Posts
Article information

Author: Jerrold Considine

Last Updated:

Views: 5701

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Jerrold Considine

Birthday: 1993-11-03

Address: Suite 447 3463 Marybelle Circles, New Marlin, AL 20765

Phone: +5816749283868

Job: Sales Executive

Hobby: Air sports, Sand art, Electronics, LARPing, Baseball, Book restoration, Puzzles

Introduction: My name is Jerrold Considine, I am a combative, cheerful, encouraging, happy, enthusiastic, funny, kind person who loves writing and wants to share my knowledge and understanding with you.