{"id":20623,"date":"2025-10-16T09:05:00","date_gmt":"2025-10-16T16:05:00","guid":{"rendered":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/?p=20623"},"modified":"2026-04-17T13:31:05","modified_gmt":"2026-04-17T20:31:05","slug":"vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft","status":"publish","type":"post","link":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/","title":{"rendered":"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In today\u2019s hyperconnected enterprise landscape, vulnerability management is no longer a back-office function\u2014it\u2019s a frontline defense. With thousands of devices from a multitude of vendors, and a relentless stream of Common Vulnerabilities and Exposures (CVEs), here at Microsoft we faced a challenge familiar to every IT decision maker: how to scale vulnerability response without scaling cost, complexity, or risk.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/11\/Brian-Fielder_lime.png\" alt=\"A photo of Fielder.\" class=\"wp-image-23259\" style=\"width:150px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/11\/Brian-Fielder_lime.png 500w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/11\/Brian-Fielder_lime-300x300.png 300w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/11\/Brian-Fielder_lime-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cWhile AI enables amazing capabilities for knowledge workers, it also increases the threat landscape, since bad actors using AI are constantly probing for vulnerabilities. Vuln.AI helps keep Microsoft safe by identifying and accelerating the mitigation of vulnerabilities in our environment.\u201d<\/p>\n<cite>Brian Fielder, vice president, Microsoft Digital&nbsp;<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Enter Vuln.AI, an intelligent agentic system developed by our team in Microsoft Digital\u2014the company\u2019s IT organization\u2014to transform how we identify, prioritize, and resolve vulnerabilities across our enterprise network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Manual methods can\u2019t keep up<\/h2>\n\n\n\n<aside class=\"wp-block-group aside-for-guide has-white-200-background-color has-background has-global-padding is-content-justification-right is-layout-constrained wp-container-core-group-is-layout-60c5958e wp-block-group-is-layout-constrained\" style=\"border-radius:10px;margin-top:var(--wp--preset--spacing--spacing-8);margin-bottom:var(--wp--preset--spacing--spacing-8);padding-top:var(--wp--preset--spacing--spacing-12);padding-right:var(--wp--preset--spacing--spacing-12);padding-bottom:var(--wp--preset--spacing--spacing-12);padding-left:var(--wp--preset--spacing--spacing-12)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-298f84b7 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-bottom:0\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"132\" height=\"132\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Engage-with-our-experts_blogs.png\" alt=\"\" class=\"wp-image-20636\" style=\"width:48px\"\/><\/figure>\n\n\n\n<p class=\"has-body-lg-font-size wp-block-paragraph\"><strong>Engage with our experts!<\/strong><\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4)\">Customers or Microsoft account team representatives from Fortune 500 companies are welcome to <a href=\"mailto:msitstaff@microsoft.com\">request a virtual engagement<\/a> on this topic with experts from our Microsoft Digital team.<\/p>\n<\/aside>\n\n\n\n<p class=\"wp-block-paragraph\">As a company, we detect over 600 million cybersecurity threats every day, according to our latest <a href=\"https:\/\/news.microsoft.com\/en-cee\/2024\/11\/29\/microsoft-digital-defense-report-600-million-cyberattacks-per-day-around-the-globe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Defense Report<\/a>. Some of those signals are bad actors probing our internal network and infrastructure looking for unpatched vulnerabilities. Our infrastructure supports over 300,000 employees and vendors, 25,000 network devices, and over 560 buildings across 102 countries. This scale means we face a constant stream of vulnerabilities\u2014each requiring triage, impact analysis, and remediation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cWhile AI enables amazing capabilities for knowledge workers, it also increases the threat landscape, since bad actors using AI are constantly probing for vulnerabilities. Vuln.AI helps keep Microsoft safe by identifying and accelerating the mitigation of vulnerabilities in our environment,\u201d says Brian Fielder, a vice president within Microsoft Digital.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Historically, our Infrastructure, Networking, and Tenant team here in Microsoft Digital relied on manual assessments to determine which network devices were impacted by new vulnerabilities. Traditional vulnerability scanning tools generate a lot of false positives and false negatives, and a significant amount of analysis still falls to security engineers, requiring manual validation before any vulnerability impact can be communicated to device owners. These manual methods were time-consuming, error-prone, and reactive\u2014our security engineers were spending hours on each vulnerability, at times missing critical threats or sinking too much time into false alarms.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Ankit-Bansal.png\" alt=\"A photo of Bansal.\" class=\"wp-image-20628\" style=\"width:150px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Ankit-Bansal.png 500w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Ankit-Bansal-300x300.png 300w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Ankit-Bansal-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cAI\u2019s true power lies in the problem it\u2019s applied to. Start by identifying the most time-consuming or painful task in your organization-then explore how AI can augment or improve it. Begin with a small, targeted enhancement and iterate continuously.\u201d<\/p>\n<cite>Ankit Bansal, senior product manager, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">With the vast number of vulnerabilities coming in every day, security engineers needed a scalable way to quickly analyze, prioritize, and respond.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The solution: Vuln.AI<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We already achieved dramatic impact with our <a href=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/enhancing-microsoft-network-reliability-with-aiops-and-network-infrastructure-copilot\/\">AI Ops and Network Infrastructure Copilot<\/a>, which is on track to save us over 11,000 hours of network service management time per year. We built Vuln.AI on top of that investment:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">The <strong>Research Agent<\/strong> analyzes vulnerability feeds and network metadata from our Infrastructure Data Lakehouse (IDL) built on top of Azure Data Explorer, which regularly ingests data from our device vendors and other sources. Once new vulnerabilities are detected, it automates the identification of impacted devices and integrates with other internal tooling for validation and reporting.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The <strong>Interactive Agent<\/strong> acts as a gateway for engineers and device owners to ask follow-up questions and initiate remediation. Through agent-to-agent interaction, it leverages our Network Infrastructure Copilot to query the research agent\u2019s findings. This agentic interface enables real-time decision-making and contextual insights.<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Together, these agents are significantly improving our network security operations. The results we\u2019re seeing so far are compelling:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>A 70% reduction in time to vulnerability insights<\/strong>, enabling faster prioritization and mitigation, minimizing exposure windows.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Lower risk of compromise<\/strong> through increased accuracy, quicker detection, and containment of threats.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>A stronger compliance posture<\/strong> that supports adherence to financial, legal, and regulatory requirements.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Higher accuracy<\/strong> in identifying vulnerable devices, reducing false positives and missed threats<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Engineering hours saved and reduced fatigue, <\/strong>significantly improving productivity.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Our gains translate to lower operational risk, faster response times, and more resilient infrastructure\u2014critical outcomes for any enterprise navigating today\u2019s threat landscape.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cAI\u2019s true power lies in the problem it\u2019s applied to,\u201d says Ankit Bansal, a senior product manager within Microsoft Digital. \u201cStart by identifying the most time-consuming or painful task in your organization-then explore how AI can augment or improve it. Begin with a small, targeted enhancement and iterate continuously.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Vuln.AI works<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The system continuously ingests our CVE data from our device suppliers\u2019 API feeds and a publicly available database of known cybersecurity vulnerabilities. \u00a0It correlates that data with device attributes such as its hardware model and OS to identify the potential impact on the network and surface actionable insights.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Engineers interact with the system via Copilot, Teams, or custom tooling, which allows seamless integration with our network security teams\u2019 daily workflows.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8220;We built a hybrid approach in Vuln.AI to guide LLMs through complex security advisories,\u201d says Blaze Kotsenburg, a software engineer in Microsoft Digital. \u201cBy combining structured function calls, templated prompts, and data validation, we keep the model focused on producing reliable, actionable insights for vulnerability mitigation.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Mike-Lollis.png\" alt=\"A photo of Lollis.\" class=\"wp-image-20629\" style=\"width:150px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Mike-Lollis.png 500w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Mike-Lollis-300x300.png 300w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Mike-Lollis-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cWe chose Durable Functions for Vuln.AI because it allowed us to confidently orchestrate complex, stateful research. The reliability and simplicity of the framework meant we could shift our focus to engineering the intelligence behind the agent, especially the prompting strategies used in Vuln.AI\u2019s backend processing.\u201d<\/p>\n<cite>Mike Lollis, a senior software engineer in Microsoft Digital.<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">When it came to building Vuln.AI, we relied heavily on our own technology platforms, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Azure AI Foundry<\/strong> for model development and deployment<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Azure Data Explorer<\/strong><em> <\/em>to store device metadata and CVEs<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Agent to agent interaction with <strong>Network Copilot<\/strong>to query our database for device and inventory knowledge<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Azure OpenAI<\/strong><em> <\/em>models for natural language processing and classification<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Azure Durable Functions<\/strong><em> <\/em>for fine-grained orchestration and custom LLM workflows<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cWe chose Durable Functions for Vuln.AI because it allowed us to confidently orchestrate complex, stateful research,\u201d says Mike Lollis, a senior software engineer in Microsoft Digital.&nbsp; \u201cThe reliability and simplicity of the framework meant we could shift our focus to engineering the intelligence behind the agent, especially the prompting strategies used in Vuln.AI\u2019s backend processing.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vuln.AI in action<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Consider a common scenario: a new CVE that affects a network switch has just been published. Vuln.AI\u2019s research agent immediately flags the vulnerability, maps it to potentially affected devices in our network inventory, and pushes the findings to an internal database.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Linda-Lee.png\" alt=\"A photo of Lee.\" class=\"wp-image-20630\" style=\"width:150px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Linda-Lee.png 500w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Linda-Lee-300x300.png 300w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Linda-Lee-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cAI is only as good as the data you provide. Much of the success with Vuln.AI came from our dedicated efforts to source comprehensive vulnerability data and device attributes. For effective AI-powered solutions, you really need to invest in a strong data foundation and a strategy for how to integrate into the rest of your infrastructure.\u201d<\/p>\n<cite>Linda Lee, product manager II, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">This data then becomes immediately accessible in our internal tools, where it is validated and approved by security engineers. Following this, network engineers are provided with precise information about their vulnerable devices.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Engineers can prompt Vuln.AI\u2019s interactive agent to instantly retrieve the following information:<\/p>\n\n\n\n<div class=\"wp-block-group has-border-color has-gray-1200-border-color has-white-200-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-ef8af98e wp-block-group-is-layout-constrained\" style=\"border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);padding-bottom:var(--wp--preset--spacing--spacing-16);padding-left:var(--wp--preset--spacing--spacing-16)\">\n<p class=\"wp-block-paragraph\">\u201c12 devices impacted by CVE-2025-XXXX. Would you like me to suggest some next steps for mitigation or remediation?\u201d<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">With Vuln.AI, network engineers can now begin vulnerability response operations much more quickly\u2014no spreadsheet wrangling and no delays.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cAI is only as good as the data you provide,\u201d says Linda Lee, a product manager II within Microsoft Digital. \u201cMuch of the success with Vuln.AI came from our dedicated efforts to source comprehensive vulnerability data and device attributes. For effective AI-powered solutions, you really need to invest in a strong data foundation and a strategy for how to integrate into the rest of your infrastructure.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It\u2019s about automating manual workflows and research.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cVuln.AI has reduced our triage time by over 50%,\u201d says Vincent Bersagol, a principal security engineer in Microsoft Digital.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is allowing our engineers to focus on deeper analysis.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThe synergy between security and AI engineering has unlocked a new level of precision in vulnerability insights,\u201d Bersagol says. \u201cThis is just the beginning.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The journey ahead<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Our journey with AI-powered vulnerability management has only just begun. Looking ahead, our roadmap for Vuln.AI includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Extending data coverage to include more hardware suppliers<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Integrating more detailed device profiles for more targeted vulnerability response<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Supporting autonomous workflows to streamline network engineers\u2019 remediation efforts<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Incorporating other AI agents to support more security use cases<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">These enhancements will further reduce risk, accelerate response times, and empower engineers to focus on more strategic initiatives.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8220;Trust is the foundation of everything we do in Microsoft Digital,\u201d Bansal says. \u201cSecuring our network is essential to upholding that trust. Intelligent solutions like Vuln.AI not only help us stay ahead of emerging threats\u2014they also establish the blueprint for integrating AI more deeply into our security operations.&#8221;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For IT leaders, Vuln.AI offers a blueprint for modern vulnerability management:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Scalable<\/strong>: Handles thousands of devices and vulnerabilities with ease<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Accurate<\/strong>: Reduces false positives and missed threats<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Efficient<\/strong>: Saves time, money, and resources<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Secure<\/strong>: Built on Microsoft\u2019s trusted AI and security frameworks<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">In a world where every second counts and any threat can be costly, Vuln.AI transforms vulnerability management from a bottleneck into a competitive advantage for Microsoft.<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png\" alt=\"\" class=\"wp-image-19493\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png 190w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Key takeaways<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">As your organization looks for ways to improve security and threat response in a fast-changing landscape, consider the following insights on how AI is reshaping vulnerability management at Microsoft:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Fight fire with fire<\/strong>: The threat landscape has broadened dramatically due to bad actors using AI. Supplementing your own efforts with AI can help you manage your risk more effectively than traditional vulnerability management.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Agility is key:<\/strong> Effective vulnerability response hinges on acting fast. An AI-powered solution like Vuln.AI can cut the time needed to analyze and mitigate vulnerabilities by over 50%, enabling organizations to enhance security operations at scale.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>The future is now:<\/strong> Looking ahead, Microsoft Digital will integrate agentic workflows into more security operations, boosting efficiency in risk prevention, threat detection and response, thereby enabling security practitioners and developers to focus on more strategic projects.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png\" alt=\"\" class=\"wp-image-19492\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png 190w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Try it out<\/p>\n<\/div>\n\n\n\n<ul class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-vulnerability-management\/defender-vulnerability-management?OCID=InsideTrack_Product_10787\" target=\"_blank\" rel=\"noreferrer noopener\">Learn how to manage network vulnerabilities with Microsoft Defender.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-endpoint\/network-devices?OCID=InsideTrack_Product_10787\" target=\"_blank\" rel=\"noreferrer noopener\">Find out how to manage your unmanaged network devices.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/recommendations-reference-networking?OCID=InsideTrack_Product_10787\" target=\"_blank\" rel=\"noreferrer noopener\">Get information on adaptive network hardening, firewall configuration guidance, and how to reduce your attack surfaces in Azure and hybrid environments.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png\" alt=\"\" class=\"wp-image-19491\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png 190w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Related links<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/enhancing-microsoft-network-reliability-with-aiops-and-network-infrastructure-copilot\/\">Learn how we enhanced our network reliability with our AIOps and Network Infrastructure Copilot.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/accelerating-transformation-how-were-reshaping-microsoft-with-continuous-improvement-and-ai\/\">Find out how we\u2019re reshaping Microsoft with continuous improvement and AI.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/unleashing-api-powered-agents-at-microsoft-our-internal-learnings-and-a-step-by-step-guide\/\">Check out h ow we\u2019re unleashing API-powered agents internally here at Microsoft.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/\">Discover how we\u2019re using AI to reinvent our network security.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png\" alt=\"\" class=\"wp-image-19490\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png 190w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">We&#8217;d like to hear from you!<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s hyperconnected enterprise landscape, vulnerability management is no longer a back-office function\u2014it\u2019s a frontline defense. With thousands of devices from a multitude of vendors, and a relentless stream of Common Vulnerabilities and Exposures (CVEs), here at Microsoft we faced a challenge familiar to every IT decision maker: how to scale vulnerability response without scaling [&hellip;]<\/p>\n","protected":false},"author":130,"featured_media":20625,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71],"tags":[383,115,849,689,848],"coauthors":[644],"class_list":["post-20623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","tag-azure-networking","tag-microsoft-azure","tag-network-and-infrastructure","tag-network-security","tag-security-and-risk-management","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft - Inside Track Blog<\/title>\n<meta name=\"description\" content=\"Learn how we\u2019re using Vuln.AI to transform vulnerability management here at Microsoft, giving us a faster, more accurate, and scalable threat response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft - Inside Track Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how we\u2019re using Vuln.AI to transform vulnerability management here at Microsoft, giving us a faster, more accurate, and scalable threat response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-16T16:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T20:31:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/10787-Hero_image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2300\" \/>\n\t<meta property=\"og:image:height\" content=\"1293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Keith Boyd\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Keith Boyd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/\"},\"author\":{\"name\":\"Keith Boyd\",\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/4b5aef47a81c7270e372a3216c234198\"},\"headline\":\"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft\",\"datePublished\":\"2025-10-16T16:05:00+00:00\",\"dateModified\":\"2026-04-17T20:31:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/\"},\"wordCount\":1847,\"image\":{\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/10\\\/10787-Hero_image.jpg\",\"keywords\":[\"Azure networking\",\"Microsoft Azure\",\"Network and infrastructure\",\"Network Security\",\"Security and risk management\"],\"articleSection\":[\"Featured\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/\",\"url\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/\",\"name\":\"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft - Inside Track Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/10\\\/10787-Hero_image.jpg\",\"datePublished\":\"2025-10-16T16:05:00+00:00\",\"dateModified\":\"2026-04-17T20:31:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/4b5aef47a81c7270e372a3216c234198\"},\"description\":\"Learn how we\u2019re using Vuln.AI to transform vulnerability management here at Microsoft, giving us a faster, more accurate, and scalable threat response.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/10\\\/10787-Hero_image.jpg\",\"contentUrl\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/10\\\/10787-Hero_image.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"We\u2019re using Vuln.AI to transform vulnerability management here at Microsoft, giving us a faster, more accurate, and scalable threat response.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/4b5aef47a81c7270e372a3216c234198\",\"name\":\"Keith Boyd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/213d500d2a2e17dace0d6a92a4a6adfb185714d98e50844c22dddc399c3770d3?s=96&d=mm&r=gb846e910205c6daee63f26b5b205a491\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/213d500d2a2e17dace0d6a92a4a6adfb185714d98e50844c22dddc399c3770d3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/213d500d2a2e17dace0d6a92a4a6adfb185714d98e50844c22dddc399c3770d3?s=96&d=mm&r=g\",\"caption\":\"Keith Boyd\"},\"url\":\"https:\\\/\\\/new-cm-edgedigital.pages.dev\\\/insidetrack\\\/blog\\\/author\\\/kboyd\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft - Inside Track Blog","description":"Learn how we\u2019re using Vuln.AI to transform vulnerability management here at Microsoft, giving us a faster, more accurate, and scalable threat response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/","og_locale":"en_US","og_type":"article","og_title":"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft - Inside Track Blog","og_description":"Learn how we\u2019re using Vuln.AI to transform vulnerability management here at Microsoft, giving us a faster, more accurate, and scalable threat response.","og_url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/","og_site_name":"Inside Track Blog","article_published_time":"2025-10-16T16:05:00+00:00","article_modified_time":"2026-04-17T20:31:05+00:00","og_image":[{"width":2300,"height":1293,"url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/10787-Hero_image.jpg","type":"image\/jpeg"}],"author":"Keith Boyd","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Keith Boyd","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/#article","isPartOf":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/"},"author":{"name":"Keith Boyd","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/4b5aef47a81c7270e372a3216c234198"},"headline":"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft","datePublished":"2025-10-16T16:05:00+00:00","dateModified":"2026-04-17T20:31:05+00:00","mainEntityOfPage":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/"},"wordCount":1847,"image":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/10787-Hero_image.jpg","keywords":["Azure networking","Microsoft Azure","Network and infrastructure","Network Security","Security and risk management"],"articleSection":["Featured"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/","url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/","name":"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft - Inside Track Blog","isPartOf":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/10787-Hero_image.jpg","datePublished":"2025-10-16T16:05:00+00:00","dateModified":"2026-04-17T20:31:05+00:00","author":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/4b5aef47a81c7270e372a3216c234198"},"description":"Learn how we\u2019re using Vuln.AI to transform vulnerability management here at Microsoft, giving us a faster, more accurate, and scalable threat response.","breadcrumb":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/#primaryimage","url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/10787-Hero_image.jpg","contentUrl":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/10787-Hero_image.jpg","width":2300,"height":1293,"caption":"We\u2019re using Vuln.AI to transform vulnerability management here at Microsoft, giving us a faster, more accurate, and scalable threat response."},{"@type":"BreadcrumbList","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/vuln-ai-our-ai-powered-leap-into-vulnerability-management-at-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#website","url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/4b5aef47a81c7270e372a3216c234198","name":"Keith Boyd","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/213d500d2a2e17dace0d6a92a4a6adfb185714d98e50844c22dddc399c3770d3?s=96&d=mm&r=gb846e910205c6daee63f26b5b205a491","url":"https:\/\/secure.gravatar.com\/avatar\/213d500d2a2e17dace0d6a92a4a6adfb185714d98e50844c22dddc399c3770d3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/213d500d2a2e17dace0d6a92a4a6adfb185714d98e50844c22dddc399c3770d3?s=96&d=mm&r=g","caption":"Keith Boyd"},"url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/author\/kboyd\/"}]}},"jetpack_featured_media_url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/10\/10787-Hero_image.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-5mD","_links":{"self":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/20623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/130"}],"replies":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=20623"}],"version-history":[{"count":11,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/20623\/revisions"}],"predecessor-version":[{"id":23301,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/20623\/revisions\/23301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/20625"}],"wp:attachment":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=20623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=20623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=20623"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=20623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}