You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/defender-vulnerability-management-capabilities.md
+33-31Lines changed: 33 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
---
1
+
---
2
2
title: Compare Microsoft Defender Vulnerability Management plans and capabilities
3
3
description: Compare Defender Vulnerability Management Offerings. Learn about the differences between the plans and select the plan that suits your organization's needs.
4
4
search.appverid: MET150
@@ -18,6 +18,8 @@ ms.date: 02/28/2025
18
18
19
19
# Compare Microsoft Defender Vulnerability Management plans and capabilities
> This article provides a summary of vulnerability management capabilities available across different Microsoft Defender product plans; however, it's not intended to be a service description or licensing contract document. For more detailed information, see the following resources:
23
25
>
@@ -48,22 +50,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
48
50
49
51
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|✔|
68
+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔|✔|
67
69
68
70
> [!NOTE]
69
71
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -85,20 +87,20 @@ The following table lists the availability of Defender Vulnerability Management
85
87
86
88
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|
103
+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔**see note**|
102
104
103
105
> [!NOTE]
104
106
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
Find answers to frequently asked questions (FAQs) about Microsoft Defender Vulnerability Management. Use the following links to help find answer to your questions:
Microsoft Defender Vulnerability Management provides advanced vulnerability management capabilities to minimize your organization's cyber risk. Get real-time asset discovery, continuous risk-based assessment and prioritization, and built in remediation tools. It includes capabilities so your teams can intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
23
25
24
26
To start your trial, we recommend working with a Microsoft reseller. If you're not already working with a reseller, see [Microsoft Security partners](https://www.microsoft.com/security/business/find-a-partner?msockid=3e48fd857a12656b2b0ce88f7b3f6460).
Copy file name to clipboardExpand all lines: defender-vulnerability-management/defender-vulnerability-management.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
---
1
+
---
2
2
title: Microsoft Defender Vulnerability Management
3
3
description: Microsoft Defender Vulnerability Management uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.
4
4
author: denisebmsft
@@ -21,6 +21,8 @@ ms.date: 05/08/2025
21
21
22
22
# What is Microsoft Defender Vulnerability Management
Reducing cyber risk requires comprehensive risk-based vulnerability management to identify, assess, remediate, and track all your biggest vulnerabilities across your most critical assets, all in a single solution.
25
27
26
28
Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Using Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.
Having accurate and up-to-date information about security vulnerabilities that could threaten your organization, and information on steps to help prevent them, is essential for keeping your organization secure.
23
25
24
26
- The [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in Defender Vulnerability Management lists the software vulnerabilities your devices are exposed to.
[Defender Vulnerability Management](defender-vulnerability-management.md) continuously prioritizes vulnerabilities across devices and provides security recommendations to mitigate risk in the Microsoft Defender portal. Defender Vulnerability Management recommendations use different retention periods to determine when to stop flagging vulnerabilities based on event reporting activity.
23
25
24
26
This article describes how retention works for two common scenarios: inactive devices and uninstalled software.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
---
1
+
---
2
2
title: Event timeline
3
3
description: Event timeline is a risk news feed that helps you interpret how risk is introduced into the organization, and which mitigations happened to reduce it.
0 commit comments