|
| 1 | +--- |
| 2 | +title: Transition to the integrated Microsoft Defender Vulnerability Management vulnerability assessment solution |
| 3 | +description: Learn how to transition to the Microsoft Defender Vulnerability Management solution in Microsoft Defender for Cloud |
| 4 | +services: defender-for-cloud |
| 5 | +ms.service: defender-for-cloud |
| 6 | +ms.topic: how-to |
| 7 | +ms.date: 12/18/2023 |
| 8 | +--- |
| 9 | + |
| 10 | +# Transition to the integrated Microsoft Defender Vulnerability Management vulnerability assessment solution |
| 11 | + |
| 12 | +With the Defender for Servers plan in Microsoft Defender for Cloud, you can scan compute assets for vulnerabilities. If you're currently using a vulnerability assessment solution other than the Microsoft Defender Vulnerability Management vulnerability assessment solution, this article provides instructions on transitioning to the integrated Defender Vulnerability Management solution. |
| 13 | + |
| 14 | +To transition to the integrated Defender Vulnerability Management solution, you can use the Azure portal, use an Azure policy definition (for Azure VMs), or use REST APIs. |
| 15 | + |
| 16 | +- [Transition with Azure policy (for Azure VMs)](#transition-with-azure-policy-for-azure-vms) |
| 17 | +- [Transition with Defender for Cloud’s portal](#transition-with-defender-for-clouds-portal) |
| 18 | +- [Transition with REST API](#transition-with-rest-api) |
| 19 | + |
| 20 | +## Transition with Azure policy (for Azure VMs) |
| 21 | + |
| 22 | +1. Sign in to the [Azure portal](https://portal.azure.com/). |
| 23 | + |
| 24 | +1. Navigate to **Policy** > **Definitions**. |
| 25 | + |
| 26 | +1. Search for `Setup subscriptions to transition to an alternative vulnerability assessment solution`. |
| 27 | + |
| 28 | +1. Select **Assign**. |
| 29 | + |
| 30 | +1. Select a scope and enter an assignment name. |
| 31 | + |
| 32 | +1. Select **Review + create**. |
| 33 | + |
| 34 | +1. Review the information you entered and select **Create**. |
| 35 | + |
| 36 | +This policy ensures that all Virtual Machines (VM) within a selected subscription are safeguarded with the built-in Defender Vulnerability Management solution. |
| 37 | + |
| 38 | +Once you complete the transition to the Defender Vulnerability Management solution, you need to [Remove the old vulnerability assessment solution](#remove-the-old-vulnerability-assessment-solution) |
| 39 | + |
| 40 | +## Transition with Defender for Cloud’s portal |
| 41 | + |
| 42 | +In the Defender for Cloud portal, you have the ability to change the vulnerability assessment solution to the built-in Defender Vulnerability Management solution. |
| 43 | + |
| 44 | +1. Sign in to the [Azure portal](https://portal.azure.com/). |
| 45 | + |
| 46 | +1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** |
| 47 | + |
| 48 | +1. Select the relevant subscription. |
| 49 | + |
| 50 | +1. Locate the Defender for Servers plan and select **Settings**. |
| 51 | + |
| 52 | + :::image type="content" source="media/how-to-migrate-to-built-in/settings-server.png" alt-text="Screenshot of the Defender for Cloud plan page that shows where to locate and select the settings button under the servers plan." lightbox="media/how-to-migrate-to-built-in/settings-server.png"::: |
| 53 | + |
| 54 | +1. Toggle `Vulnerability assessment for machines` to **On**. |
| 55 | + |
| 56 | + If `Vulnerability assessment for machines` was already set to on, select **Edit configuration** |
| 57 | + |
| 58 | + :::image type="content" source="media/how-to-migrate-to-built-in/edit-configuration.png" alt-text="Screenshot of the servers plan that shows where the edit configuration button is located." lightbox="media/how-to-migrate-to-built-in/edit-configuration.png"::: |
| 59 | + |
| 60 | +1. Select **Microsoft Defender Vulnerability Management**. |
| 61 | + |
| 62 | +1. Select **Apply**. |
| 63 | + |
| 64 | +1. Ensure that `Endpoint protection` or `Agentless scanning for machines` are toggled to **On**. |
| 65 | + |
| 66 | + :::image type="content" source="media/how-to-migrate-to-built-in/two-to-one.png" alt-text="Screenshot that shows where to turn on endpoint protection and agentless scanning for machines is located." lightbox="media/how-to-migrate-to-built-in/two-to-one.png"::: |
| 67 | + |
| 68 | +1. Select **Continue**. |
| 69 | + |
| 70 | +1. Select **Save**. |
| 71 | + |
| 72 | +Once you complete the transition to the Defender Vulnerability Management solution, you need to [Remove the old vulnerability assessment solution](#remove-the-old-vulnerability-assessment-solution) |
| 73 | + |
| 74 | +## Transition with REST API |
| 75 | + |
| 76 | +### REST API for Azure VMs |
| 77 | + |
| 78 | +Using this REST API, you can easily migrate your subscription, at scale, from any vulnerability assessment solution to the Defender Vulnerability Management solution. |
| 79 | + |
| 80 | +`PUT https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Security/serverVulnerabilityAssessmentsSettings/AzureServersSetting?api-version=2022-01-01-preview` |
| 81 | + |
| 82 | +```json |
| 83 | +{ |
| 84 | + "kind": "AzureServersSetting", |
| 85 | + "properties": { |
| 86 | + "selectedProvider": "MdeTvm" |
| 87 | + } |
| 88 | + } |
| 89 | +``` |
| 90 | + |
| 91 | +Once you complete the transition to the Defender Vulnerability Management solution, you need to [Remove the old vulnerability assessment solution](#remove-the-old-vulnerability-assessment-solution) |
| 92 | + |
| 93 | +### REST API for multicloud VMs |
| 94 | + |
| 95 | +Using this REST API, you can easily migrate your subscription, at scale, from any vulnerability assessment solution to the Defender Vulnerability Management solution. |
| 96 | + |
| 97 | +`PUT https://management.azure.com/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.Security/securityconnectors/{connectorName}?api-version=2022-08-01-preview` |
| 98 | + |
| 99 | +```json |
| 100 | +{ |
| 101 | + "properties": { |
| 102 | + "hierarchyIdentifier": "{GcpProjectNumber}", |
| 103 | + "environmentName": "GCP", |
| 104 | + "offerings": [ |
| 105 | + { |
| 106 | + "offeringType": "CspmMonitorGcp", |
| 107 | + "nativeCloudConnection": { |
| 108 | + "workloadIdentityProviderId": "{cspm}", |
| 109 | + "serviceAccountEmailAddress": "{emailAddressRemainsAsIs}" |
| 110 | + } |
| 111 | + }, |
| 112 | + { |
| 113 | + "offeringType": "DefenderCspmGcp" |
| 114 | + }, |
| 115 | + { |
| 116 | + "offeringType": "DefenderForServersGcp", |
| 117 | + "defenderForServers": { |
| 118 | + "workloadIdentityProviderId": "{defender-for-servers}", |
| 119 | + "serviceAccountEmailAddress": "{emailAddressRemainsAsIs}" |
| 120 | + }, |
| 121 | + "arcAutoProvisioning": { |
| 122 | + "enabled": true, |
| 123 | + "configuration": {} |
| 124 | + }, |
| 125 | + "mdeAutoProvisioning": { |
| 126 | + "enabled": true, |
| 127 | + "configuration": {} |
| 128 | + }, |
| 129 | + "vaAutoProvisioning": { |
| 130 | + "enabled": true, |
| 131 | + "configuration": { |
| 132 | + "type": "TVM" |
| 133 | + } |
| 134 | + }, |
| 135 | + "subPlan": "{P1/P2}" |
| 136 | + } |
| 137 | + ], |
| 138 | + "environmentData": { |
| 139 | + "environmentType": "GcpProject", |
| 140 | + "projectDetails": { |
| 141 | + "projectId": "{GcpProjectId}", |
| 142 | + "projectNumber": "{GcpProjectNumber}", |
| 143 | + "workloadIdentityPoolId": "{identityPoolIdRemainsTheSame}" |
| 144 | + } |
| 145 | + } |
| 146 | + }, |
| 147 | + "location": "{connectorRegion}" |
| 148 | +} |
| 149 | +``` |
| 150 | + |
| 151 | +## Remove the old vulnerability assessment solution |
| 152 | + |
| 153 | +After migrating to the built-in Defender Vulnerability Management solution in Defender for Cloud, you need to offboard each VM from their old vulnerability assessment solution using either of the following methods: |
| 154 | + |
| 155 | +- [Delete the VM extension with PowerShell](/powershell/module/az.compute/remove-azvmextension?view=azps-11.0.0). |
| 156 | +- [REST API DELETE request](/rest/api/compute/virtual-machine-extensions/delete?view=rest-compute-2023-07-01&tabs=HTTP). |
| 157 | + |
| 158 | +## Next steps |
| 159 | + |
| 160 | +[Common questions about vulnerability scanning questions](faq-scanner-detection.yml) |
0 commit comments