You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ author: bmansheim
15
15
- Discover vulnerabilities and misconfigurations in near real time
16
16
- Prioritize vulnerabilities based on the threat landscape and detections in your organization
17
17
18
-
To learn more about agentless scanning, see [Find vulnerabilities and collect software inventory with agentless scanning](enable-vulnerability-assessment-agentless)
18
+
To learn more about agentless scanning, see [Find vulnerabilities and collect software inventory with agentless scanning](enable-vulnerability-assessment-agentless.md)
19
19
20
20
>[!Note]
21
21
> Microsoft Defender Vulnerability Management Add-on capabilities are included in Defender for Servers Plan 2. This provides consolidated inventories, new assessments, and mitigation tools to further enhance your vulnerability management program. To learn more, see [Vulnerability Management capabilities for servers](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities#vulnerability-managment-capabilities-for-servers).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/plan-multicloud-security-determine-multicloud-dependencies.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,10 +62,10 @@ Enabling Defender for Servers on your AWS or GCP connector allows Defender for C
62
62
Defender for Servers offers two different plans:
63
63
64
64
-**Plan 1:**
65
-
-**MDE integration:** Plan 1 integrates with [Microsoft Defender for Endpoint Plan 2](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2?view=o365-worldwide) to provide a full endpoint detection and response (EDR) solution for machines running a [range of operating systems](/microsoft-365/security/defender-endpoint/minimum-requirements?view=o365-worldwide). Defender for Endpoint features include:
66
-
-[Reducing the attack surface](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction?view=o365-worldwide) for machines.
- Threat management, including [threat hunting](/microsoft-365/security/defender-endpoint/advanced-hunting-overview?view=o365-worldwide), [detection](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response?view=o365-worldwide), [analytics](/microsoft-365/security/defender-endpoint/threat-analytics?view=o365-worldwide), and [automated investigation and response](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response?view=o365-worldwide).
65
+
-**MDE integration:** Plan 1 integrates with [Microsoft Defender for Endpoint Plan 2](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2) to provide a full endpoint detection and response (EDR) solution for machines running a [range of operating systems](/microsoft-365/security/defender-endpoint/minimum-requirements). Defender for Endpoint features include:
66
+
-[Reducing the attack surface](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction) for machines.
- Threat management, including [threat hunting](/microsoft-365/security/defender-endpoint/advanced-hunting-overview), [detection](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response), [analytics](/microsoft-365/security/defender-endpoint/threat-analytics), and [automated investigation and response](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response).
69
69
-**Provisioning:** Automatic provisioning of the Defender for Endpoint sensor on every supported machine that's connected to Defender for Cloud.
70
70
-**Licensing:** Charges Defender for Endpoint licenses per hour instead of per seat, lowering costs by protecting virtual machines only when they are in use.
71
71
-**Plan 2:** Includes all the components of Plan 1 along with additional capabilities such as File Integrity Monitoring (FIM), Just-in-time (JIT) VM access, and more.
@@ -80,7 +80,7 @@ The following components and requirements are needed to receive full protection
80
80
- The Azure Arc agent is needed to read security information on the host level and allow Defender for Cloud to deploy the agents/extensions required for complete protection.
81
81
To auto-provision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
82
82
-**Defender for Endpoint capabilities**: The [Microsoft Defender for Endpoint](./integration-defender-for-endpoint.md?tabs=linux) agent provides comprehensive endpoint detection and response (EDR) capabilities.
83
-
-**Vulnerability assessment**: Using either the integrated [Qualys vulnerability scanner](./deploy-vulnerability-assessment-vm.md), or the [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide) solution.
83
+
-**Vulnerability assessment**: Using either the integrated [Qualys vulnerability scanner](./deploy-vulnerability-assessment-vm.md), or the [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) solution.
84
84
-**Log Analytics agent/[Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA) (in preview)**: Collects security-related configuration information and event logs from machines.
0 commit comments