Threat & vulnerability management integrates with ServiceNow VR

Published Jun 21 2021 07:32 AM 7,927 Views
Microsoft

Most enterprises rely on a multitude of vendors, security solutions, and IT tools to combat advanced cyber-attacks. At Microsoft, we believe that when these solutions work well together, customers benefit and can build stronger defenses.

That’s why we are excited to announce the general availability of a new integration between Microsoft threat and vulnerability management and ServiceNow Vulnerability Response (VR). The integration between these two products gives customers more flexibility in managing the end- to-end workflow of their vulnerability management program and aims to:

 

  • Optimize vulnerability prioritization
  • Automate response workflows
  • Speed up overall time to remediation

ServiceNow’s VR module ingests asset information, data of open and fixed vulnerabilities, as well as recommendations from Microsoft threat and vulnerability management. It syncs these findings into VR tables and data structures, where vulnerabilities are matched against existing assets in your CMDB or creates a new Configuration Item (CI) if no match is found. The integration leverages standard Vulnerability Response data import and CI reconciliation methods.

 

Image 1: Vulnerability Response Workflow DiagramImage 1: Vulnerability Response Workflow Diagram

 

 

The diagram above shows the import of vulnerability assessment content from Microsoft threat and vulnerability management into ServiceNow VR to orchestrate the remediation workflow of vulnerabilities.

Once ServiceNow VR has ingested information from Microsoft threat and vulnerability management, security teams can start with a top-level view of the ingested data or dive deep using various views. Some of the available views include vulnerability groups, vulnerable items, and security recommendations taken directly from Microsoft threat and vulnerability management. 

 

Image 2: Integration run status dashboardImage 2: Integration run status dashboard

 

Image 2 shows an all-up integration run status and details of how much data has been ingested over the last 30 days. The included timeline shows performance metrics over the same period.

 

Image 3: Overview of ingested vulnerable itemsImage 3: Overview of ingested vulnerable items

 

Image 4: Overview of Microsoft threat and vulnerability management security recommendationsImage 4: Overview of Microsoft threat and vulnerability management security recommendations

 

As part of the remediation workflow, ServiceNow VR prioritizes vulnerabilities using asset and business context, along with vulnerability risk scores. The risk score and rating take the vulnerability information and configuration item into account. Security teams can customize the risk calculator based on their organization’s preferences and requirements, optimizing the prioritization of vulnerabilities.

 

Users can then investigate each vulnerability and associated details within the ServiceNow console.

 

Image 5: Details view of vulnerable itemsImage 5: Details view of vulnerable items

 

Lastly, ServiceNow VR provides a grouping of vulnerabilities based on the Microsoft recommendations and automatically assigns tickets to the relevant IT owners and sets the SLAs using predefined rules. This enables customers to use existing workflows and established processes in their organization and create an end-to-end process across the vulnerability management program.

The integration between Microsoft threat and vulnerability management and ServiceNow VR can help security teams create more automated remediation workflows and drive efficiencies with their IT counterparts.

 

An added focus on interoperability

Microsoft threat and vulnerability management APIs empower security teams to deliver greater value to their vulnerability management program. The set of APIs that was used to build the ServiceNow integration gives customers and partners full access to the threat and vulnerability management dataset, including:

 

  • Vulnerability assessment
  • Security configuration assessment
  • Software inventory for all devices

If you want to know how to use these APIs to create custom reports, build automations, and more, check out this blog post.

As we continue to expand the depth and breadth of Microsoft’s vulnerability management capabilities, our team is focused on building a broad ecosystem of integration partners. We understand that our customers have existing investments and established processes to run their security and IT operations and we want to ensure our products support these requirements. If you would like to see additional integrations within Microsoft Defender for Endpoint, go to the Partner Application page in the Microsoft Defender Security Center, and click Recommend other partners.

 

More information and feedback

4 Comments
Valued Contributor

Shall we use the ServiceNow to be able to use these functionalities?

I am wondering , could we use it without the ServiceNow like inside the Microsoft 365 dashboard or Microsoft Defender ATP?

Microsoft

@Reza_Ameri Microsost threat and vulnerability management provides risk-based prioritization built-in.

This new integration is not a recommendation to use ServiceNow in order for threat and vulnerability management to work, instead think of it as now having a supported way to easily integrate these products if both exist in your environment and you have processes that depend on them.

Thank you @Kim Kischel for Sharing with the Community :stareyes:

Valued Contributor

Thank you @Kim Kischel for the clarification.

This was what I have been looking for.

Personally, I try avoid using any third-party products (unless we have some special requirements and force to do it) because when all technologies are in one platform we have better integration and easier support.

%3CLINGO-SUB%20id%3D%22lingo-sub-2454065%22%20slang%3D%22en-US%22%3EThreat%20%26amp%3B%20vulnerability%20management%20integrates%20with%20ServiceNow%20VR%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2454065%22%20slang%3D%22en-US%22%3E%3CP%3EMost%20enterprises%20rely%20on%20a%20multitude%20of%20vendors%2C%20security%20solutions%2C%20and%20IT%20tools%20to%20combat%20advanced%20cyber-attacks.%20At%20Microsoft%2C%20we%20believe%20that%20when%20these%20solutions%20work%20well%20together%2C%20customers%20benefit%20and%20can%20build%20stronger%20defenses.%3C%2FP%3E%0A%3CP%3EThat%E2%80%99s%20why%20we%20are%20excited%20to%20announce%20the%20general%20availability%20of%20a%20new%20integration%20between%20Microsoft%20threat%20and%20vulnerability%20management%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.servicenow.com%2Fproducts%2Fvulnerability-response.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EServiceNow%20Vulnerability%20Response%3C%2FA%3E%20(VR).%20The%20integration%20between%20these%20two%20products%20gives%20customers%20more%20flexibility%20in%20managing%20the%20end-%20to-end%20workflow%20of%20their%20vulnerability%20management%20program%20and%20aims%20to%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EOptimize%20vulnerability%20prioritization%3C%2FLI%3E%0A%3CLI%3EAutomate%20response%20workflows%3C%2FLI%3E%0A%3CLI%3ESpeed%20up%20overall%20time%20to%20remediation%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EServiceNow%E2%80%99s%20VR%20module%20ingests%20asset%20information%2C%20data%20of%20open%20and%20fixed%20vulnerabilities%2C%20as%20well%20as%20recommendations%20from%20Microsoft%20threat%20and%20vulnerability%20management.%20It%20syncs%20these%20findings%20into%20VR%20tables%20and%20data%20structures%2C%20where%20vulnerabilities%20are%20matched%20against%20existing%20assets%20in%20your%20CMDB%20or%20creates%20a%20new%20Configuration%20Item%20(CI)%20if%20no%20match%20is%20found.%20The%20integration%20leverages%20standard%20Vulnerability%20Response%20data%20import%20and%20CI%20reconciliation%20methods.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Vulnerbaility%20Response%20Workflow%20Diagram.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F290276i99C17448296E13D0%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Vulnerbaility%20Response%20Workflow%20Diagram.png%22%20alt%3D%22Image%201%3A%20Vulnerability%20Response%20Workflow%20Diagram%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%201%3A%20Vulnerability%20Response%20Workflow%20Diagram%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20diagram%20above%20shows%20the%20import%20of%20vulnerability%20assessment%20content%20from%20Microsoft%20threat%20and%20vulnerability%20management%20into%20ServiceNow%20VR%20to%20orchestrate%20the%20remediation%20workflow%20of%20vulnerabilities.%3C%2FP%3E%0A%3CP%3EOnce%20ServiceNow%20VR%20has%20ingested%20information%20from%20Microsoft%20threat%20and%20vulnerability%20management%2C%20security%20teams%20can%20start%20with%20a%20top-level%20view%20of%20the%20ingested%20data%20or%20dive%20deep%20using%20various%20views.%20Some%20of%20the%20available%20views%20include%20vulnerability%20groups%2C%20vulnerable%20items%2C%20and%20security%20recommendations%20taken%20directly%20from%20Microsoft%20threat%20and%20vulnerability%20management.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Integration%20run%20status.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F289850i0B6A805A5FD03A50%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Integration%20run%20status.png%22%20alt%3D%22Image%202%3A%20Integration%20run%20status%20dashboard%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%202%3A%20Integration%20run%20status%20dashboard%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EImage%202%20shows%20an%20all-up%20integration%20run%20status%20and%20details%20of%20how%20much%20data%20has%20been%20ingested%20over%20the%20last%2030%20days.%20The%20included%20timeline%20shows%20performance%20metrics%20over%20the%20same%20period.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22List%20of%20vulnerable%20items.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F289851i0BA547339D0B6167%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22List%20of%20vulnerable%20items.png%22%20alt%3D%22Image%203%3A%20Overview%20of%20ingested%20vulnerable%20items%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%203%3A%20Overview%20of%20ingested%20vulnerable%20items%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Overview%20of%20Microsoft%20threat%20and%20vulnerability%20management%20security%20recommendations.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F289852i2AE8AC5DDEA55764%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Overview%20of%20Microsoft%20threat%20and%20vulnerability%20management%20security%20recommendations.png%22%20alt%3D%22Image%204%3A%20Overview%20of%20Microsoft%20threat%20and%20vulnerability%20management%20security%20recommendations%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%204%3A%20Overview%20of%20Microsoft%20threat%20and%20vulnerability%20management%20security%20recommendations%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20part%20of%20the%20remediation%20workflow%2C%20ServiceNow%20VR%20prioritizes%20vulnerabilities%20using%20asset%20and%20business%20context%2C%20along%20with%20vulnerability%20risk%20scores.%20The%20risk%20score%20and%20rating%20take%20the%20vulnerability%20information%20and%20configuration%20item%20into%20account.%20Security%20teams%20can%20customize%20the%20risk%20calculator%20based%20on%20their%20organization%E2%80%99s%20preferences%20and%20requirements%2C%20optimizing%20the%20prioritization%20of%20vulnerabilities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsers%20can%20then%20investigate%20each%20vulnerability%20and%20associated%20details%20within%20the%20ServiceNow%20console.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Details%20view%20of%20a%20vulnerable%20item.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F289853i61FC901674815576%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Details%20view%20of%20a%20vulnerable%20item.png%22%20alt%3D%22Image%205%3A%20Details%20view%20of%20vulnerable%20items%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%205%3A%20Details%20view%20of%20vulnerable%20items%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELastly%2C%20ServiceNow%20VR%20provides%20a%20grouping%20of%20vulnerabilities%20based%20on%20the%20Microsoft%20recommendations%20and%20automatically%20assigns%20tickets%20to%20the%20relevant%20IT%20owners%20and%20sets%20the%20SLAs%20using%20predefined%20rules.%20This%20enables%20customers%20to%20use%20existing%20workflows%20and%20established%20processes%20in%20their%20organization%20and%20create%20an%20end-to-end%20process%20across%20the%20vulnerability%20management%20program.%3C%2FP%3E%0A%3CP%3EThe%20integration%20between%20Microsoft%20threat%20and%20vulnerability%20management%20and%20ServiceNow%20VR%20can%20help%20security%20teams%20create%20more%20automated%20remediation%20workflows%20and%20drive%20efficiencies%20with%20their%20IT%20counterparts.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAn%20added%20focus%20on%20interoperability%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EMicrosoft%20threat%20and%20vulnerability%20management%20APIs%20empower%20security%20teams%20to%20deliver%20greater%20value%20to%20their%20vulnerability%20management%20program.%20The%20set%20of%20APIs%20that%20was%20used%20to%20build%20the%20ServiceNow%20integration%20gives%20customers%20and%20partners%20full%20access%20to%20the%20threat%20and%20vulnerability%20management%20dataset%2C%20including%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EVulnerability%20assessment%3C%2FLI%3E%0A%3CLI%3ESecurity%20configuration%20assessment%3C%2FLI%3E%0A%3CLI%3ESoftware%20inventory%20for%20all%20devices%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIf%20you%20want%20to%20know%20how%20to%20use%20these%20APIs%20to%20create%20custom%20reports%2C%20build%20automations%2C%20and%20more%2C%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fnew-threat-amp-vulnerability-management-apis-create-reports%2Fba-p%2F2445813%22%20target%3D%22_blank%22%3Echeck%20out%20this%20blog%20post.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EAs%20we%20continue%20to%20expand%20the%20depth%20and%20breadth%20of%20Microsoft%E2%80%99s%20vulnerability%20management%20capabilities%2C%20our%20team%20is%20focused%20on%20building%20a%20broad%20ecosystem%20of%20integration%20partners.%20We%20understand%20that%20our%20customers%20have%20existing%20investments%20and%20established%20processes%20to%20run%20their%20security%20and%20IT%20operations%20and%20we%20want%20to%20ensure%20our%20products%20support%20these%20requirements.%20If%20you%20would%20like%20to%20see%20additional%20integrations%20within%20Microsoft%20Defender%20for%20Endpoint%2C%20go%20to%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fsecuritycenter.microsoft.com%2Finteroperability%2Fpartners%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CEM%3EPartner%20Application%20page%3C%2FEM%3E%3C%2FA%3E%26nbsp%3Bin%20the%20Microsoft%20Defender%20Security%20Center%2C%20and%20click%26nbsp%3B%3CSTRONG%3ERecommend%20other%20partners%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMore%20information%20and%20feedback%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20threat%20and%20vulnerability%20management%20capabilities%20are%20part%20of%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fendpoint-defender%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FA%3E%26nbsp%3Band%20enable%20organizations%20to%20effectively%20identify%2C%20assess%2C%20and%20remediate%20endpoint%20weaknesses%20to%20reduce%20organizational%20risk.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.servicenow.com%2Fbundle%2Fquebec-security-management%2Fpage%2Fproduct%2Fsecops-integration-vr%2Fmstvm%2Fconcept%2Fmstvm-integration.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ECheck%20out%20the%20step-by-step%20guide%3C%2FA%3E%20on%20how%20to%20setup%20and%20use%20the%20integration.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fstore.servicenow.com%2Fsn_appstore_store.do%23!%2Fstore%2Fapplication%2F3aa063f90e31201021b86bb11fc55ea2%2F2.0.3%3Freferer%3D%252Fstore%252Fsearch%253Flistingtype%253Dallintegrations%2525253Bancillary_app%2525253Bcertified_apps%2525253Bcontent%2525253Bindustry_solution%2525253Boem%2525253Butility%2525253Btemplate%2526q%253DTVM%26amp%3Bsl%3Dsh%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EGet%20the%20integration%20in%20the%20ServiceNow%20store.%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EWe%20want%20to%20hear%20from%20you!%20If%20you%20have%20any%20suggestions%2C%20questions%2C%20or%20comments%2C%20please%20visit%20us%20on%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fbd-p%2FMicrosoftDefenderATP%22%20target%3D%22_blank%22%3ETech%20Community%20page%3C%2FA%3E.%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2454065%22%20slang%3D%22en-US%22%3E%3CP%3EOptimize%20vulnerability%20prioritization%2C%20automate%20response%20workflows%2C%20and%20speed%20up%20time%20to%20remediation.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2454065%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAPIs%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2466338%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20vulnerability%20management%20integrates%20with%20ServiceNow%20VR%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2466338%22%20slang%3D%22en-US%22%3E%3CP%3EShall%20we%20use%20the%26nbsp%3B%3CSTRONG%3EServiceNow%3C%2FSTRONG%3E%20to%20be%20able%20to%20use%20these%20functionalities%3F%3C%2FP%3E%3CP%3EI%20am%20wondering%20%2C%20could%20we%20use%20it%20without%20the%26nbsp%3B%3CSTRONG%3EServiceNow%3C%2FSTRONG%3E%20like%20inside%20the%20Microsoft%20365%20dashboard%20or%20Microsoft%20Defender%20ATP%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Jun 21 2021 06:32 AM
Updated by:
www.000webhost.com