Vulnerabilities Dashboard

 


Have you previously operated a device to mitigate vulnerabilities and subsequently received an extensive list of vulnerabilities from cybersecurity for that device?

You are not alone in this experience.

 

This isn't a new feature, we are fortunate to have talented individuals in the community, such as Fabian Bader and Nathen McNulty, who have made significant contributions in this area. I have documented their efforts and recommended their work to my clients during my collaborations.

 

During my previous engagement with the Intune team, I observed that their permissions were highly restricted. They lacked access to cybersecurity tools such as Defender, Tenable, CrowdStrike, and Entra. As a result, they were unable to independently identify device deficiencies or vulnerabilities, relying instead on their cybersecurity team for such information. When I recommended community solutions, they expressed appreciation. However, they do not possess the authority to develop applications within Entra and are seeking a solution that can operate locally while offering comprehensive visibility beyond what is available solely through PowerShell interfaces.

 

Last month, I dedicated time to developing a script capable of operating locally without dependence on the API. This script features an HTML dashboard to enhance visibility. It will execute checks in collaboration with the Microsoft Security Response Center (MSRC) to identify vulnerabilities, with restricted access to display certain applications by referencing the National Vulnerability Database (NVD). It's not an amazing thing, but I was happy after meeting the client’s requirements and letting them check the device with all critical or high vulnerabilities without waiting for a vulnerability report for the Cyber Team to hammer them, so they can fix it faster.




Get the script for GitHub 👉 Matt-Public-Repo/Defender/README.md at Script(s) · Muthannaaljanabi/Matt-Public-Repo

Please read the README.md file. There are many details, to get the Dashboard above, you can run the Check-Vulnerabilities-Dashboard script, to get some App vulnerabilities (this covers limited apps)



Ensure that the output HTML file path is changed to match your environment.

 

I am working on improving this one to let it run via Intune, and I am trying to make it as easy as possible, with you needing to create an App in Entra or other things.

 

You may also execute the 'Check-AllVulnerabilities.sp1' script by running it with or without the third-party switch. This will assist in providing a comprehensive overview of the total vulnerabilities, including the number of critical, high, medium, and low severity issues.



 

Finally, you can simply run Check-MSRCVulnerabilities-API.ps1 to find out the total number of unpatched vulnerabilities, without going into the details, as provided by Microsoft Security Response Center (MSRC).



 

Thanks for the reading.

 



Comments

Popular posts from this blog

New LAPS for Windows 11 24H2

Why Your Devices Are Skipping Updates in SCCM and Intune – And How to Fix It Fast

M365 Tips to secure your tenant