We are swiftly adapting to the lasting reality of a hybrid workforce, with the number of remote workers in the US expected to nearly double over the next five years, compared to pre-pandemic days. As a result, security squads are being challenged to rethink how to secure a developing and increasingly diverse portfolio of machines outside of the traditional frontiers of their organization. However, what has bided constant during this time of change is the focus of adversaries to identify and take advantage of vulnerabilities that have been left unpatched or misconfigurations as a gateway to sensitive information. It highlights the need for a proactive approach to vulnerability the managers and a focus on an organization’s high-risk assets.

Microsoft’s Threat and Vulnerability Management( TVM) capabilities play a crucial role in monitoring an organization’s overall security posture, with machines has become a key enter level for compromise if left uncovered. It equips clients with real-time insights into hazard with continuous vulnerability breakthrough, intelligent prioritization that takes business and threat context into account, and capacities necessary to seamlessly remediate vulnerabilities with a single click. The recent Nobelium attack is only one example of a critical vulnerability, where TVM enabled customers to identify affected machines in their environment and take immediate action.

As threat and vulnerability handling evolves, we continue to expand our coverage to include additional machines and OS platforms. Today, we are announcing that Microsoft’s Threat and Vulnerability Management abilities now cover Linux operating systems, in addition to macOS and Windows–with support for Android and iOS planned for later this summer.

Organizations can now review recently discovered vulnerabilities within installed applications across the Linux OS and issue remediation tasks for all affected devices. Initial supporting is available for RHEL, CentOS, and Ubuntu, with Oracle Linux, CentOS, SUSE, and Debian being added shortly. In addition, TVM now also provides fasten configuration appraisal abilities for Linux and macOS. These allow organizations to discover, prioritize, and remediate dozens of insecure configurations to improve their overall security posture.

Security recommendation to update Google Chrome for Windows, macOs, and Linux.

Figure 1: Security recommendation to update Google Chrome for Windows, macOS, and Linux.

Details of all vulnerabilities associated with Google Chrome for Linux.

Figure 2: Details of all vulnerabilities associated with Google Chrome for Linux.

Security configuration recommendation for macOS.

Figure 3: Security configuration recommendation for macOS.

Microsoft’s investment in cross-platform coverage now enables customers to take full advantage of the powerful TVM capabilities on all major platforms across managed and unmanaged machines. They are available in Microsoft Defender for Endpoint as part of an integrated experience that offer device context, prioritizes based on risk, and minimise time to remediation across their entire portfolio of overseen and unmanaged devices.

An added focus on interoperability

As we continue to expand the coverage for our TVM capabilities and remain focused on providing natively integrated experiences across the Microsoft portfolio, we are also partnering with industry-leading solution providers to ensure the interoperability of our solution.

We understand that our clients have existing investments and established processes to run their security and IT functionings. That is why a broad-spectrum ecosystem of consolidation partners is a critical focus as we continue to grow our vulnerability management capabilities. Clients can already leverage integratings with Skybox, Kenna Security, and ServiceNow Vulnerability Response, and we are actively working on expanding this list.

In addition, the Threat and vulnerability handling APIs devote customers and partners full access to the threat and vulnerability handling dataset, including vulnerability assessment, security configuration rating, and the software inventory for all devices. This enables any partner to leverage and integrate menace and vulnerability handling data into their platforms and make custom solutions with the available data set.

As a hybrid personnel becomes the new normal and organizations continue to face new security challenges, Microsoft Threat and Vulnerability Management enables better insight into organizational risk and the overall security posture of their machines. With a focus on broad platform support and interoperability, we are committed to providing customers with the flexible and coverage they need to detect vulnerabilities and misconfigurations earlier today and induce remediation simple.

Learn more

Microsoft Threat and Vulnerability Management bridges the gap between security and IT teams to seamlessly remediate vulnerabilities and reduce risk in your organization. It is deeply integrated with Microsoft’s portfolio of security and IT management answers, and you can sign up for a free trial today or get started even faster with our interactive guide.

To learn more about Microsoft Security solutions visit our website . Bookmark the Security blog to keep up with our expert coverage on security matters. Likewise, follow us at @MSFTSecurity for the most recent developments and updates on cybersecurity.

The post Threat and Vulnerability Management now supports all major platforms appeared first on Microsoft Security .

Read more: microsoft.com