0% found this document useful (0 votes)
71 views6 pages

MDVM Datasheet

Microsoft Defender Vulnerability Management provides continuous vulnerability discovery and assessment, risk-based prioritization of vulnerabilities, and built-in remediation workflows. It discovers assets across an organization, assesses vulnerabilities and configurations, prioritizes risks using Microsoft threat intelligence, and facilitates remediation and tracking of issues across security and IT teams. The solution aims to help security teams proactively reduce cyber risk through comprehensive vulnerability management capabilities.

Uploaded by

Arif Islam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views6 pages

MDVM Datasheet

Microsoft Defender Vulnerability Management provides continuous vulnerability discovery and assessment, risk-based prioritization of vulnerabilities, and built-in remediation workflows. It discovers assets across an organization, assesses vulnerabilities and configurations, prioritizes risks using Microsoft threat intelligence, and facilitates remediation and tracking of issues across security and IT teams. The solution aims to help security teams proactively reduce cyber risk through comprehensive vulnerability management capabilities.

Uploaded by

Arif Islam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Microsoft Defender

Vulnerability Management
Reduce cyber risk with
continuous vulnerability
discovery and assessment,
risk-based prioritization,
and remediation.

Assess and remediate vulnerabilities across your assets


As organizations accelerate adoption of digital transformation and hybrid work models, CISOs are tasked
with securing their environments against ever-evolving threats. Last year alone saw 21,957 published
vulnerabilities, the highest number to date and 3x higher than in 2016 (NIST).
Proactively reducing your organization’s exposure requires a comprehensive risk-based vulnerability
management solution so you can identify, assess, remediate, and track all your biggest vulnerabilities
and misconfigurations across your most critical assets.

Microsoft Defender Vulnerability Management

Centralized administration
& configuration

Asset discovery Vulnerability & Risk-based Remediation


& inventory configuration assessment intelligent prioritization & tracking

APIs & integrations

Microsoft Defender Vulnerability Management provides continuous asset discovery and inventory
in a consolidated view, intelligent assessments leveraging Microsoft threat intelligence, risk-based
prioritization, and built-in remediation and mitigation flows.

Key capabilities include:


• Security baselines assessment: continuously monitor posture against customizable benchmarks
and industry standards (CIS, NIST, MS)
• Intelligent vulnerability assessment tools across devices, software applications, browser extensions,
digital certificates, and network shares
• Mitigate risk during remediation planning with blocking vulnerable applications and warning users
with custom messages
• And more
Microsoft Defender Vulnerability Management
Learn how our discovery tools, asset inventories, threat
intelligence, and built-in workflows to help security teams
reduce risk.

Defender Vulnerability Management dashboard

Proactively reduce risk to your organization

Know what to protect Get advanced vulnerability


in a single view assessment tools
Built-in and agentless Understand your risk exposure
scanners continuously with the relevant threat and
monitor and detect risk even business contexts. Create
when devices aren’t connected customizable baseline profiles
to the corporate network. to measure risk compliance
Expanded asset coverage against established benchmarks
consolidates software (CIS, STIG, MS).
applications, digital certificates,
network shares, and browser
extensions into a single
inventory view.

Focus on
Remediate and track what’s important
progress across teams
View risk-based, prioritized
Seamlessly plan remediations recommendations in a single
with built-in workflows and view. Use threat intelligence
mitigate risk with blocking insights including breach
vulnerable applications for likelihood predictions, event
specific device groups. Bridge timelines, and vulnerable
the gap between teams with device reports to prioritize
real-time remediation tracking the biggest vulnerabilities
and posture measurement. and misconfigurations across
your most critical assets.
Know what to protect in a single view
Discover and assess all your organization’s assets in a single view.
Eliminate periodic scans with continuous monitoring and alerts. Detect
risk even when devices are not connected to the corporate network.

Asset discovery
and inventory
Continuously detect
risk across managed
and unmanaged
endpoints with
built-in modules
and agentless scanners,
even when devices
aren’t connected to
the corporate network.
View entity-level risk
assessment data to
focus on your most
critical assets.

Continuous
vulnerability and
misconfiguration
assessments
Access consolidated
inventories across
software applications,
digital certificates, browser
extensions, and network
shares. View information
on extension permissions
and associated risk levels,
identify certificates before
they expire, detect
potential vulnerabilities
due to weak signature
algorithms, and assess
misconfigurations in
internal network shares.
Get advanced vulnerability assessment tools
Understand your cyberexposure and relevant threat and business
contexts in one place. Proactively prevent breaches with risk
assessments leveraging industry standards, including CIS and STIG.

Security baselines assessments


Instead of relying on compliance scans,
continuously monitor security baseline
compliance and identify changes in real-time.
Set up customizable profiles and leverage
Center for Internet Security (CIS), Security
Technical Implementation Guides (STIG),
and Microsoft security benchmarks.

Prioritize what’s important


Quickly remediate the biggest vulnerabilities on your most critical
assets. Prioritize risks using Microsoft threat intelligence, likelihood
predictions, event timelines, and device reports.

Expert-level threat monitoring


and analysis
Use Microsoft threat intelligence, breach
likelihood analysis, event timelines, and
entity-level vulnerability assessments to
understand and prioritize vulnerabilities.

Prioritized security recommendations


Focus on threats that pose the highest risk with
a single view of prioritized recommendations
from multiple security feeds. Access critical
details including related CVEs, exposed
devices, and more.
Remediate and track progress across teams
Bridge the gap between security and IT teams. Help reduce risk
with automated vulnerability remediation tools, built-in workflows,
integrations, and real-time measurements to seamlessly track
progress across the organization.

Block vulnerable applications


While remediating vulnerabilities, reduce cyber
exposure and mitigate risk by taking immediate
action to block all currently known vulnerable
versions of apps for specific device groups.
Block app versions through file indicators of
compromise (IoCs), provide customer warning
messages to users, and surface links to learn
more on how to upgrade to approved versions.

Seamlessly remediate and


track progress
Connect teams with built-in workflows and
integrations. Track progress and trends in
real time with remediation tracking and
device reports. Leverage integrations with
partners including ServiceNow, Kenna
Security, and Vulcan Cyber.

Compare flexible purchasing options

Microsoft Defender Microsoft Defender


Vulnerability Management add-on Vulnerability Management
For Defender for Endpoint Plan 2 customers, For customers looking to complement their
get consolidated inventories, expanded asset EDR solution, efficiently discover, assess, and
coverage, and enhanced assessment and remediate vulnerabilities and misconfigurations
mitigation tools. all in one place. Get the full set of vulnerability
management capabilities in Defender for
Defender Vulnerability Management Endpoint Plan 2, and advanced assessment
add-on features: and mitigation tools.
Security baseline assessments
(CIS, STIG, MS) All Defender Vulnerability Management
add-on features, plus:
New risk-based vulnerability assessments of
browser extensions and digital certificates Device discovery and inventory

Network shares analysis Continuous monitoring

Blocking vulnerable applications Vulnerability assessments

Authenticated scans for Windows devices Configuration assessments

Consolidated asset inventories Threat analytics and threat intelligence


Risk-based prioritization
Remediation tracking
Microsoft Defender Vulnerability Management
and Defender for Endpoint

MDVM MDE P2 +
Standalone MDVM Add-On

Endpoint detection and response


Unified security tools & centralized management ●
Next generation antimalware ●
Attack surface reduction rules ●
Device control ●
Endpoint firewall ●
Network protection ●
Web control URL blocking ●
Device-based conditional access ●
Controlled folder access ●
APIs, SIEM connector ●
App control ●
Endpoint detection & response ●
Auto investigation & remediation ●
Sandbox (deep analysis) ●
Microsoft Threat Experts ●
Threat analytics / Threat intelligence ●
Vulnerability management
Device discovery (unmanaged) ● ●
Device inventory (managed) ● ●
Device inventory (network devices) ● ●
Vulnerability assessment ● ●
Configuration assessment ● ●
Risk-based prioritization ● ●
Remediation tracking ● ●
Continuous monitoring ● ●
Software applications assessment ● ●
Browser plugin assessment ● ●
Digital certificates assessment ● ●
Security baselines assessment ● ●
Vulnerability assessment for unmanaged endpoints ● ●
Block vulnerable applications ● ●
Network share analysis ● ●

Resources
Sign up for Public Preview: Learn more:
aka.ms/MDVM aka.ms/DefenderVulnerabilityManagementDocs

© Microsoft Corporation. All rights reserved. This material is provided for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESSED OR IMPLIED.

You might also like