Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Microsoft Defender ATP Adds Vulnerable Windows Device Tracking

Microsoft Defender ATP Adds Vulnerable Windows Device Tracking

The Microsoft Defender Advanced Threat Protection (ATP) endpoint security platform now provides users with a new report designed to help them keep track of vulnerable Windows and macOS devices within their organization’s environment.

The vulnerable devices report displays graphs with statistics and details on currently vulnerable device trends with the end goal of making it easier for IT administrators to grasp the scope and breadth of device exposure within the organization.

Device vulnerability insights

“You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group,” Microsoft explains.

Also Read: Thinking of Shredding or Burning Paper? Here’s What You Should Know

“If there is an insight you want to explore further, select the relevant bar chart to view a filtered list of devices in the Device inventory page. From there, you can export the list.”

Among the insights administrators can draw from this new Microsoft Defender ATP report (recently renamed to Microsoft Defender for Endpoint), Microsoft highlights:

  • Device vulnerability severity levels (e.g. all the devices with critical vulnerabilities)
  • Device exploit availability (e.g. all the devices with vulnerabilities that have verified exploits)
  • Device vulnerability age (e.g. devices with vulnerabilities that were published over 90 days ago)
  • Vulnerable devices by operating system
  • Vulnerable devices by Windows 10 version
Vulnerable Windows 10 devices report (Microsoft)

For instance, the severity level graph will show the number of devices based on the most severe vulnerability detected for each of them, while the exploit availability graph will display the number of vulnerable devices based on the highest level of known exploit.

Admins can also access vulnerability age graphs, get the number of vulnerable devices by operating system platform graphs, as well as the number of vulnerable devices by Windows 10 version.

The report is in public preview starting today and admins can access it by going to Reports > Vulnerable devices in the Microsoft Defender Security Center after toggling on preview features.

Vulnerable devices by OS (Microsoft)

Starting with July, Microsoft Defender ATP also added the Microsoft Secure Score for Devices feature that can evaluate the collective security configuration state of devices on an enterprise network.

Also Read: What Legislation Exists in Singapore Regarding Data Protection and Security?

The feature identifies unprotected systems and provides recommended actions to increase the security of an organization’s endpoints.

A detailed description of the procedure that needs to be followed to address the issues found by Microsoft Secure Score for Devices while assessing their network devices is available here.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us