Skip to content

Commit 63f1032

Browse files
authored
Merge pull request #5733 from limwainstein/mdvm-msem-note
MDVM-MSEM changes
2 parents 82ae477 + cf89996 commit 63f1032

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+205
-74
lines changed

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 33 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Compare Microsoft Defender Vulnerability Management plans and capabilities
33
description: Compare Defender Vulnerability Management Offerings. Learn about the differences between the plans and select the plan that suits your organization's needs.
44
search.appverid: MET150
@@ -18,6 +18,8 @@ ms.date: 02/28/2025
1818

1919
# Compare Microsoft Defender Vulnerability Management plans and capabilities
2020

21+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
22+
2123
> [!IMPORTANT]
2224
> This article provides a summary of vulnerability management capabilities available across different Microsoft Defender product plans; however, it's not intended to be a service description or licensing contract document. For more detailed information, see the following resources:
2325
>
@@ -48,22 +50,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
4850

4951
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
5052
|:----|:----:|:----:|:----:|
51-
|[Device discovery](/defender-endpoint/device-discovery)||-||
52-
|[Device inventory](/defender-endpoint/machines-view-overview)||-||
53-
|[Vulnerability assessment](tvm-weaknesses.md)||-||
54-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)||-||
55-
|[Risk based prioritization](tvm-security-recommendation.md)||-||
56-
|[Remediation tracking](tvm-remediation.md)||-||
57-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)||-||
58-
|[Software inventory](tvm-software-inventory.md)||-||
59-
|[Software usages insights](tvm-usage-insights.md)||-||
60-
|[Security baselines assessment](tvm-security-baselines.md)|-|||
61-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|| **see note**|
62-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|||
63-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|||
64-
|[Network share analysis](tvm-network-share-assessment.md)|-|||
65-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|||
66-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|||
53+
|[Device discovery](/defender-endpoint/device-discovery)|✔|-|✔|
54+
|[Device inventory](/defender-endpoint/machines-view-overview)|✔|-|✔|
55+
|[Vulnerability assessment](tvm-weaknesses.md)|✔|-|✔|
56+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|-|✔|
57+
|[Risk based prioritization](tvm-security-recommendation.md)|✔|-|✔|
58+
|[Remediation tracking](tvm-remediation.md)|✔|-|✔|
59+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|-|✔|
60+
|[Software inventory](tvm-software-inventory.md)|✔|-|✔|
61+
|[Software usages insights](tvm-usage-insights.md)|✔|-|✔|
62+
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|✔|
63+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|✔ **see note**|
64+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|✔|
65+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|✔|
66+
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|✔|
67+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|✔|
68+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔|✔|
6769

6870
> [!NOTE]
6971
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -85,20 +87,20 @@ The following table lists the availability of Defender Vulnerability Management
8587

8688
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
8789
|:----|:----:|:----:|
88-
|[Vulnerability assessment](tvm-weaknesses.md)|||
89-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|||
90-
|[Risk based prioritization](tvm-security-recommendation.md)|||
91-
|[Remediation tracking](tvm-remediation.md)|||
92-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|||
93-
|[Software inventory](tvm-software-inventory.md)|||
94-
|[Software usages insights](tvm-usage-insights.md)|||
95-
|[Security baselines assessment](tvm-security-baselines.md)|-||
96-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-||
97-
|[Browser extensions assessment](tvm-browser-extensions.md)|-||
98-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-||
99-
|[Network share analysis](tvm-network-share-assessment.md)|-||
100-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-||
101-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|**see note**|
90+
|[Vulnerability assessment](tvm-weaknesses.md)|✔|✔|
91+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|✔|
92+
|[Risk based prioritization](tvm-security-recommendation.md)|✔|✔|
93+
|[Remediation tracking](tvm-remediation.md)|✔|✔|
94+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|✔|
95+
|[Software inventory](tvm-software-inventory.md)|✔|✔|
96+
|[Software usages insights](tvm-usage-insights.md)|✔|✔|
97+
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|
98+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|
99+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|
100+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|
101+
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|
102+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|
103+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔**see note**|
102104

103105
> [!NOTE]
104106
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Microsoft Defender Vulnerability Management frequently asked questions
33
description: Find answers to frequently asked questions (FAQs) about Microsoft Defender Vulnerability Management.
44
ms.service: defender-vuln-mgmt
@@ -19,6 +19,8 @@ ms.date: 05/02/2025
1919

2020
# Microsoft Defender Vulnerability Management frequently asked questions
2121

22+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
23+
2224
Find answers to frequently asked questions (FAQs) about Microsoft Defender Vulnerability Management. Use the following links to help find answer to your questions:
2325

2426
- [Defender Vulnerability Management licensing FAQs](#defender-vulnerability-management-licensing-faqs)
@@ -178,4 +180,4 @@ Yes. You can continue to access the Windows authenticated scan and use its featu
178180

179181
### How can I provide feedback about this change?
180182

181-
You can send your feedback through the relevant channels. We value your input and your feedback helps us improve our future products.
183+
You can send your feedback through the relevant channels. We value your input and your feedback helps us improve our future products.

defender-vulnerability-management/defender-vulnerability-management-trial.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: About the Microsoft Defender Vulnerability Management trial
33
description: Learn about the Microsoft Defender Vulnerability Management trial
44
ms.service: defender-vuln-mgmt
@@ -19,6 +19,8 @@ ms.date: 02/28/2025
1919

2020
# About the Microsoft Defender Vulnerability Management trial
2121

22+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
23+
2224
Microsoft Defender Vulnerability Management provides advanced vulnerability management capabilities to minimize your organization's cyber risk. Get real-time asset discovery, continuous risk-based assessment and prioritization, and built in remediation tools. It includes capabilities so your teams can intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
2325

2426
To start your trial, we recommend working with a Microsoft reseller. If you're not already working with a reseller, see [Microsoft Security partners](https://www.microsoft.com/security/business/find-a-partner?msockid=3e48fd857a12656b2b0ce88f7b3f6460).

defender-vulnerability-management/defender-vulnerability-management.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Microsoft Defender Vulnerability Management
33
description: Microsoft Defender Vulnerability Management uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.
44
author: denisebmsft
@@ -21,6 +21,8 @@ ms.date: 05/08/2025
2121

2222
# What is Microsoft Defender Vulnerability Management
2323

24+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
25+
2426
Reducing cyber risk requires comprehensive risk-based vulnerability management to identify, assess, remediate, and track all your biggest vulnerabilities across your most critical assets, all in a single solution.
2527

2628
Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Using Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.

defender-vulnerability-management/device-restart-status.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Device restart status
33
description: Learn about the device restart status tag in Microsoft Defender Vulnerability Management
44
ms.service: defender-vuln-mgmt
@@ -18,6 +18,8 @@ ms.date: 03/04/2022
1818

1919
# Device restart status
2020

21+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
22+
2123
**Applies to:**
2224

2325
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Vulnerability support in Microsoft Defender Vulnerability Management
33
description: List the reported inaccuracies that were fixed
44
search.appverid: MET150
@@ -19,6 +19,8 @@ ms.date: 07/07/2025
1919

2020
# Vulnerability support in Microsoft Defender Vulnerability Management
2121

22+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
23+
2224
Having accurate and up-to-date information about security vulnerabilities that could threaten your organization, and information on steps to help prevent them, is essential for keeping your organization secure.
2325

2426
- The [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in Defender Vulnerability Management lists the software vulnerabilities your devices are exposed to.

defender-vulnerability-management/get-defender-vulnerability-management.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Sign up for Microsoft Defender Vulnerability Management
33
description: Get Microsoft Defender Vulnerability Management
44
search.appverid: MET150
@@ -19,6 +19,8 @@ ms.date: 03/06/2025
1919

2020
# Sign up for Microsoft Defender Vulnerability Management
2121

22+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
23+
2224
> [!NOTE]
2325
> Microsoft Defender Vulnerability Management isn't currently available in [Microsoft Defender for Business](/defender-business/mdb-overview).
2426
> The Microsoft Defender Vulnerability Management trial isn't currently available to US Government customers using GCC High, and DoD.

defender-vulnerability-management/mdvm-onboard-devices.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Onboard to Microsoft Defender Vulnerability Management
33
description: Learn how to onboard endpoints to Microsoft Defender Vulnerability Management service
44
ms.author: deniseb
@@ -19,6 +19,8 @@ ms.date: 08/01/2023
1919

2020
# Onboard to Microsoft Defender Vulnerability Management
2121

22+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
23+
2224
**Applies to:**
2325

2426
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)

defender-vulnerability-management/retention-logic-mdvm.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Understand retention logic in Microsoft Defender Vulnerability Management
33
description: Get an overview of retention logic for inactive devices or uninstalled software in Microsoft Defender Vulnerability Management.
44
author: denisebmsft
@@ -19,6 +19,8 @@ ms.date: 05/08/2025
1919

2020
# Understand retention logic in Microsoft Defender Vulnerability Management
2121

22+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
23+
2224
[Defender Vulnerability Management](defender-vulnerability-management.md) continuously prioritizes vulnerabilities across devices and provides security recommendations to mitigate risk in the Microsoft Defender portal. Defender Vulnerability Management recommendations use different retention periods to determine when to stop flagging vulnerabilities based on event reporting activity.
2325

2426
This article describes how retention works for two common scenarios: inactive devices and uninstalled software.

defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Event timeline
33
description: Event timeline is a risk news feed that helps you interpret how risk is introduced into the organization, and which mitigations happened to reduce it.
44
ms.service: defender-vuln-mgmt
@@ -17,6 +17,8 @@ ms.date: 03/04/2022
1717

1818
# Event timeline
1919

20+
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
21+
2022

2123
**Applies to:**
2224

0 commit comments

Comments
 (0)