MDVM Datasheet
MDVM Datasheet
Vulnerability Management
Reduce cyber risk with
continuous vulnerability
discovery and assessment,
risk-based prioritization,
and remediation.
Centralized administration
& configuration
Microsoft Defender Vulnerability Management provides continuous asset discovery and inventory
in a consolidated view, intelligent assessments leveraging Microsoft threat intelligence, risk-based
prioritization, and built-in remediation and mitigation flows.
Focus on
Remediate and track what’s important
progress across teams
View risk-based, prioritized
Seamlessly plan remediations recommendations in a single
with built-in workflows and view. Use threat intelligence
mitigate risk with blocking insights including breach
vulnerable applications for likelihood predictions, event
specific device groups. Bridge timelines, and vulnerable
the gap between teams with device reports to prioritize
real-time remediation tracking the biggest vulnerabilities
and posture measurement. and misconfigurations across
your most critical assets.
Know what to protect in a single view
Discover and assess all your organization’s assets in a single view.
Eliminate periodic scans with continuous monitoring and alerts. Detect
risk even when devices are not connected to the corporate network.
Asset discovery
and inventory
Continuously detect
risk across managed
and unmanaged
endpoints with
built-in modules
and agentless scanners,
even when devices
aren’t connected to
the corporate network.
View entity-level risk
assessment data to
focus on your most
critical assets.
Continuous
vulnerability and
misconfiguration
assessments
Access consolidated
inventories across
software applications,
digital certificates, browser
extensions, and network
shares. View information
on extension permissions
and associated risk levels,
identify certificates before
they expire, detect
potential vulnerabilities
due to weak signature
algorithms, and assess
misconfigurations in
internal network shares.
Get advanced vulnerability assessment tools
Understand your cyberexposure and relevant threat and business
contexts in one place. Proactively prevent breaches with risk
assessments leveraging industry standards, including CIS and STIG.
MDVM MDE P2 +
Standalone MDVM Add-On
Resources
Sign up for Public Preview: Learn more:
aka.ms/MDVM aka.ms/DefenderVulnerabilityManagementDocs
© Microsoft Corporation. All rights reserved. This material is provided for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESSED OR IMPLIED.