Vulnerabilities Dashboard
Have you previously operated a device to mitigate vulnerabilities and subsequently received an extensive list of vulnerabilities from cybersecurity for that device?
You are not alone in this experience.
This isn't a new feature, we are fortunate to have talented
individuals in the community, such as Fabian Bader and Nathen McNulty, who have
made significant contributions in this area. I have documented their efforts
and recommended their work to my clients during my collaborations.
During my previous engagement with the Intune team, I
observed that their permissions were highly restricted. They lacked access to
cybersecurity tools such as Defender, Tenable, CrowdStrike, and Entra. As a
result, they were unable to independently identify device deficiencies or
vulnerabilities, relying instead on their cybersecurity team for such
information. When I recommended community solutions, they expressed
appreciation. However, they do not possess the authority to develop
applications within Entra and are seeking a solution that can operate locally
while offering comprehensive visibility beyond what is available solely through
PowerShell interfaces.
Last month, I dedicated time to developing a script capable
of operating locally without dependence on the API. This script features an
HTML dashboard to enhance visibility. It will execute checks in collaboration
with the Microsoft Security Response Center (MSRC) to identify vulnerabilities,
with restricted access to display certain applications by referencing the
National Vulnerability Database (NVD). It's not an amazing thing, but I was
happy after meeting the client’s requirements and letting them check the device
with all critical or high vulnerabilities without waiting for a vulnerability
report for the Cyber Team to hammer them, so they can fix it faster.
Get the script for GitHub 👉 Matt-Public-Repo/Defender/README.md
at Script(s) · Muthannaaljanabi/Matt-Public-Repo
Please read the README.md file. There are many details,
to get the Dashboard above, you can run the Check-Vulnerabilities-Dashboard
script, to get some App vulnerabilities (this covers limited apps)
Ensure that the output HTML file path is changed to match
your environment.
I am working on improving this one to let it run via Intune,
and I am trying to make it as easy as possible, with you needing to create an
App in Entra or other things.
You may also execute the 'Check-AllVulnerabilities.sp1'
script by running it with or without the third-party switch. This will assist
in providing a comprehensive overview of the total vulnerabilities, including
the number of critical, high, medium, and low severity issues.
Finally, you can simply run
Check-MSRCVulnerabilities-API.ps1 to find out the total number of unpatched
vulnerabilities, without going into the details, as provided by Microsoft
Security Response Center (MSRC).
Thanks for the reading.

Comments