<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Defender Vulnerability Management on Koos's Tech Blog</title><link>https://koosjanse.com/tags/defender-vulnerability-management/</link><description>Recent content in Defender Vulnerability Management on Koos's Tech Blog</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Fri, 08 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://koosjanse.com/tags/defender-vulnerability-management/index.xml" rel="self" type="application/rss+xml"/><item><title>Finding Weak Service Executable Paths with Defender TVM and PowerShell</title><link>https://koosjanse.com/posts/devices/serviceacl/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><guid>https://koosjanse.com/posts/devices/serviceacl/</guid><description>Microsoft Defender can flag services that run outside common protected locations. This post shows how to use KQL to identify the affected service paths and PowerShell to validate whether the base folders are writable by broad user groups.</description></item></channel></rss>