Published September 20, 2021

Retiring the advanced hunting table named ‘DeviceTvmSoftwareInventoryVulnerabilities’

Reference ID: MC286340 | Effective: September 20, 2021

MC286340 – The advanced hunting table named DeviceTvmSoftwareInventoryVulnerabilities will be retired in favor of two new tables. One table is focused solely on software inventory and the other table is focused on vulnerabilities. This change will provide better clarity and reduce noise/complexity when using advanced hunting for common threat and vulnerability management scenarios.

Tables that are replacing DeviceTvmSoftwareInventoryVulnerabilities:

  • DeviceTvmSoftwareInventory:This table serves as a complete list of all software on your devices, whether or not they have any vulnerabilities.
    • No duplicate entries – unlike the old table, you have a single row for each software installed on every device.
    • New fields – EndOfSupportStatus and EndOfSupportDate have the end-of-support state (if applicable) for specific software versions installed on devices.
  • DeviceTvmSoftwareVulnerabilities:This table is dedicated to discovering Common Vulnerabilities and Exposures (CVEs) in existing software across all your devices.
    • New fields – RecommendedSecurityUpdate and RecommendedSecurityUpdateId have missing security updates / Knowledge Bases (KBs) for installed software.

When will this happen:

These new tables are available today. The old advanced hunting table will be retired on October 15th, 2021.

How this will affect your organization:

The advanced hunting table named DeviceTvmSoftwareInventoryVulnerabilities will be retired and replaced with the advanced hunting tables named DeviceTvmSoftwareInventory and DeviceTvmSoftwareVulnerabilities.

Users will no longer be able to execute queries (either manually or via API) that use the retired table when this change is implemented.

What you need to do to prepare:

If you use the old table, either for manual queries or via API, it’s strongly encouraged you switch to using the new tables today to avoid breaking existing flows.

Petri Newsletters

Whether it’s Security or Cloud Computing, we have the know-how for you. Sign up for our newsletters here.

Latest Posts on Petri.com

Latest Podcast

00:00

/

00:00