Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Microsoft Defender

Vulnerability Management
Reduce cyber risk with continuous asset visibility,
risk-based prioritization, and built-in remediation
tools to address the most critical vulnerabilities.

Assess and remediate vulnerabilities across your assets


Over 25k CVEs (common vulnerabilities and exposures) were published by
CISA in 2022. As organizations accelerate adoption of digital transformation
and hybrid work models, CISOs are tasked with securing their multicloud
and hybrid environments against ever-evolving threats.

Risk-based approach to vulnerability management


Proactively reducing your organization’s exposure requires a comprehensive risk-based vulnerability
management solution so you can identify, assess, remediate, and track all your biggest vulnerabilities
and misconfigurations across your most critical assets.
Continuous asset discovery and monitoring
Proactively prevent breaches with built-in and agentless scanners for continuous
discovery and assessment.

Asset discovery Real-time visibility Exposure score Agentless scanning


with one less agent Identify and protect See the current state of Frictionless full visibility
Leverage Defender for high value assets your organization’s on posture issues across
Endpoint agent without the with business-critical exposure to threats and VMs, containers, and
need to install additional applications, confidential vulnerabilities, factoring endpoints even when
dedicated scanners. data, or high-value users. weaknesses discovered, not connected to the
breach likelihood, device corporate network.
values, and relevant alerts.

Uncover risks and prioritize what matters


Vast assessments are available to uncover vulnerabilities and misconfigurations
across endpoints and multicloud workloads. Prioritize the biggest vulnerabilities
on your most critical assets using Microsoft’s threat intelligence, breach likelihood
predictions and business contexts.

Security baselines assessment Digital certificate assessment Hardware and


Get customized baseline Identify certificates about to firmware assessment
assessments against industry expire, detect potential Full visibility into device
security benchmarks vulnerabilities, and ensure manufacturer, processors
and Microsoft benchmarks. compliance with regulatory and BIOs information to assess
guidelines and policy. vulnerabilities and firmware risk.

Browser extensions assessment Authenticated scans for Network shares assessment


Expand your asset coverage vulnerability assessment Protect against misconfigurations
beyond devices and gain Run scans on unmanaged used in the wild by attackers for
entity-level visibility into the devices by remotely targeting lateral movement, reconnaissance,
various browser extensions by IP ranges or hostnames to data exfiltration, and more with
installed across assets, permissions remotely access the devices. configuration assessments related
requested, and associated risks. to common weaknesses with
Windows Shares.
Leverage Microsoft threat Cloud security
intelligence to prioritize posture management
vulnerabilities Remediate your most
See the list of common critical risk with advanced
vulnerabilities and exposures vulnerability management
(CVEs) in your organization capabilities for multicloud
and in the broader landscape, servers and containers in
and view events that may Defender Cloud Security Read more about these
impact your cyber risk. Posture Management. assessments and more here

Track and mitigate risks with ease


Bridge the gap between security and IT teams to seamlessly remediate vulnerabilities
with robust contextual recommendations, built-in workflows, and application block
capabilities to enable protection faster.

Comprehensive Block Seamlessly request Track and report


remediation information vulnerable remediations across on vulnerability
at your fingertips applications workflows management progress
Take the action-oriented Proactively reduce Create a remediation task Get a view that shows
recommendations and risks when taking from a specific security current statistics and
vulnerability context to remediation steps recommendation and vulnerable device trends
initiate remediation. by blocking leverage one-click over time. Access APIs
vulnerable versions remediation requests with rich data for custom
of applications. via Intune. reporting on vulnerability
management progress.
Vulnerability management for endpoints and cloud workloads

Defender for
Endpoint P2
Defender for
Defender +
Endpoint P2 -
Vulnerability Defender Vulnerability
or Management Add On
Management
Standalone Defender for or
Servers P1
Defender for
Feature Servers P2

Device inventory
Vulnerability assessment
Configuration assessment
Core capabilities

Risk based prioritization


Remediation tracking
Continuous monitoring
Software inventory
Software usages insights
Security baselines assessment
Block vulnerable applications
Premium capabilities

Browser extensions assessment


Digital certificate assessment
Network share analysis
Hardware and firmware assessment
Authenticated scan for Windows

Vulnerability Management capabilities for multicloud


servers and containers included in Defender Cloud Security
Posture Management in Microsoft Defender for Cloud
at no additional cost:
Vulnerability management is integral part of both VMs and servers, but also end-to-end cloud security
posture management
Use built-in and agentless scanners to discover vulnerabilities and misconfigurations in near real time
Reduce cyber risk with vulnerability and misconfiguration assessments, software inventories,
and usage insights
Quickly prioritize your biggest risks in a single view with integrated CVE details
Seamlessly remediate your biggest vulnerabilities with built-in workflows and remediation tracking

Ready to learn more?


Defender Vulnerability Management Defender for Servers

Learn more and get started Learn more

Implementation and technical guidance

© Microsoft Corporation. All rights reserved. This material is provided for informational purposes only.
MICROSOFT MAKES NO WARRANTIES, EXPRESSED OR IMPLIED

You might also like