Skip to content

Microsoft Defender Critical & High Vulnerability Monitoring with Grafana

Notifications You must be signed in to change notification settings

mvp314048/MSDefender-Critical-High-Monitoring

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

MSDefender-Critical-High-Monitoring

Microsoft Defender Critical & High Vulnerability Monitoring with Grafana

To the contributors:

I haven't had enough time to reorganize this project's codes because I never thought I would be opening this project to someone. Some of the paragraphs are written very ugly, and there are more that can be improved.

When you deploy this code, please check the absolute paths in the codes because you might need to modify them to match your paths. Second, please remember to check or modify your database name, table name, and column names are matched the codes.

This simple tool was developed for Advantech Corp to monitor the CVSS critical and high vulnerability counts. This tool uses Windows Task Scheduler, Python, Microsoft Defender API, Grafana, and MS SQL to complete the automatic monitoring and tracking.

image

You will need a database to store the data, and your table structures and columns may look like the below, depending on your requirements and purposes.

image

For the visualization Server, for example, Grafana. Depending on your requirements and purposes, you can reformat and display your data like the one below. image

About

Microsoft Defender Critical & High Vulnerability Monitoring with Grafana

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages