Skip to content

Commit efc1008

Browse files
authored
Merge pull request #219450 from bmansheim/update-tvm-mdvm
Update TVM to MDVM
2 parents f1e95a6 + 0915b9b commit efc1008

16 files changed

+41
-40
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -754,7 +754,11 @@
754754
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-va-acr.md",
755755
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure",
756756
"redirect_document_id": true
757-
}
758-
757+
},
758+
{
759+
"source_path_from_root": "/articles/defender-for-cloud/deploy-vulnerability-assessment-tvm.md",
760+
"redirect_url": "/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management",
761+
"redirect_document_id": true
762+
}
759763
]
760764
}

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -278,8 +278,8 @@
278278
- name: Find vulnerabilities and software inventory with agentless scanning
279279
href: enable-vulnerability-assessment-agentless.md
280280
- name: Find vulnerabilities with threat and vulnerability management
281-
displayName: mde, tvm, vulnerability, va, arc, hybrid
282-
href: deploy-vulnerability-assessment-tvm.md
281+
displayName: mde, tvm, vulnerability, va, arc, hybrid, defender vulnerability management
282+
href: deploy-vulnerability-assessment-defender-vulnerability-management.md
283283
- name: Find vulnerabilities with the integrated Qualys scanner
284284
displayName: qualys, va, vulnerability, arc, hybrid
285285
href: deploy-vulnerability-assessment-vm.md

articles/defender-for-cloud/custom-dashboards-azure-workbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Defender for Cloud includes vulnerability scanners for your machines, containers
9191

9292
Learn more about using these scanners:
9393

94-
- [Find vulnerabilities with Microsoft threat and vulnerability management](deploy-vulnerability-assessment-tvm.md)
94+
- [Find vulnerabilities with Microsoft threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md)
9595
- [Find vulnerabilities with the integrated Qualys scanner](deploy-vulnerability-assessment-vm.md)
9696
- [Scan your ACR images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)
9797
- [Scan your ECR images for vulnerabilities](defender-for-containers-vulnerability-assessment-elastic.md)

articles/defender-for-cloud/defender-for-cloud-glossary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ This glossary provides a brief description of important terms and concepts for t
115115
## T
116116
| Term | Description | Learn more |
117117
|--|--|--|
118-
|**TVM**|Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.|[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md)
118+
|**TVM**|Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.|[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md)
119119

120120
## Z
121121
| Term | Description | Learn more |

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Learn more about connecting your [AWS](quickstart-onboard-aws.md) and [GCP](quic
9595

9696
Defender for Cloud includes vulnerability assessment solutions for your virtual machines, container registries, and SQL servers as part of the enhanced security features. Some of the scanners are powered by Qualys. But you don't need a Qualys license, or even a Qualys account - everything's handled seamlessly inside Defender for Cloud.
9797

98-
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md).
98+
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md).
9999

100100
Review the findings from these vulnerability scanners and respond to them all from within Defender for Cloud. This broad approach brings Defender for Cloud closer to being the single pane of glass for all of your cloud security efforts.
101101

articles/defender-for-cloud/defender-for-servers-introduction.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,10 @@ The following table summarizes what's included in each plan.
3838
|:---|:---|:---:|:---:|
3939
| **Unified view** | The Defender for Cloud portal displays Defender for Endpoint alerts. You can then drill down into Defender for Endpoint portal, with additional information such as the alert process tree, the incident graph, and a detailed machine timeline showing historical data up to six months.| :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4040
| **Automatic MDE provisioning** | Automatic provisioning of Defender for Endpoint on Azure, AWS, and GCP resources. | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
41-
| **Microsoft threat and vulnerability management** | Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, without needing other agents or periodic scans. [Learn more](deploy-vulnerability-assessment-tvm.md). | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
41+
| **Microsoft Defender Vulnerability Management** | Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, without other agents or periodic scans. [Learn more](deploy-vulnerability-assessment-defender-vulnerability-management.md). | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4242
| **Threat detection for OS-level (Agent-based)** | Defender for Servers and Microsoft Defender for Endpoint (MDE) detect threats at the OS level, including VM behavioral detections and **Fileless attack detection**, which generates detailed security alerts that accelerate alert triage, correlation, and downstream response time.<br>[Learn more](alerts-reference.md#alerts-windows) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4343
| **Threat detection for network-level (Agentless)** | Defender for Servers detects threats directed at the control plane on the network, including network-based detections for Azure virtual machines. | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
44+
| **Microsoft Defender Vulnerability Management Add-on** | See a deeper analysis of the security posture of your protected servers, including risks related to browser extensions, network shares, and digital certificates. [Learn more](deploy-vulnerability-assessment-defender-vulnerability-management.md). | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4445
| **Security Policy and Regulatory Compliance** | Customize a security policy for your subscription and also compare the configuration of your resources with requirements in industry standards, regulations, and benchmarks. | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4546
| **Integrated vulnerability assessment powered by Qualys** | Use the Qualys scanner for real-time identification of vulnerabilities in Azure and hybrid VMs. Everything's handled by Defender for Cloud. You don't need a Qualys license or even a Qualys account. [Learn more](deploy-vulnerability-assessment-vm.md). | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4647
| **Log Analytics 500 MB free data ingestion** | Defender for Cloud leverages Azure Monitor to collect data from Azure VMs and servers, using the Log Analytics agent. | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
@@ -49,10 +50,6 @@ The following table summarizes what's included in each plan.
4950
| **Just-in-time VM access for management ports** | Defender for Cloud provides [JIT access](just-in-time-access-overview.md), locking down machine ports to reduce the machine's attack surface.| | :::image type="icon" source="./media/icons/yes-icon.png"::: |
5051
| **Adaptive network hardening** | Filtering traffic to and from resources with network security groups (NSG) improves your network security posture. You can further improve security by [hardening the NSG rules](adaptive-network-hardening.md) based on actual traffic patterns. | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
5152
| **Docker host hardening** | Defender for Cloud assesses containers hosted on Linux machines running Docker containers, and compares them with the Center for Internet Security (CIS) Docker Benchmark. [Learn more](harden-docker-hosts.md). | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
52-
<!--
53-
[Learn more](fileless-attack-detection.md).
54-
| Future – TVM P2 | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
55-
| Future – disk scanning insights | | :::image type="icon" source="./media/icons/yes-icon.png"::: | -->
5653

5754
> [!NOTE]
5855
> If you only enable Defender for Cloud at the workspace level, Defender for Cloud won't enable just-in-time VM access, adaptive application controls, and network detections for Azure resources.

articles/defender-for-cloud/deploy-vulnerability-assessment-tvm.md renamed to articles/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
---
2-
title: Use Microsoft Defender for Endpoint's threat and vulnerability management capabilities with Microsoft Defender for Cloud
3-
description: Enable, deploy, and use Microsoft Defender for Endpoint's threat and vulnerability management capabilities with Microsoft Defender for Cloud to discover weaknesses in your Azure and hybrid machines
2+
title: Use Microsoft Defender for Endpoint's Defender Vulnerability Management with Microsoft Defender for Cloud
3+
description: Enable, deploy, and use Microsoft Defender for Endpoint's Defender Vulnerability Management with Microsoft Defender for Cloud to discover weaknesses in your Azure and hybrid machines
44
ms.topic: how-to
55
ms.custom: ignite-2022
6-
ms.date: 07/13/2022
6+
ms.date: 11/24/2022
77
---
88

9-
# Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management
9+
# Investigate weaknesses with Microsoft Defender for Endpoint's Defender Vulnerability Management
1010

11-
[Microsoft's threat and vulnerability management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt) is a built-in module in Microsoft Defender for Endpoint that can:
11+
[Microsoft's Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) is a built-in module in Microsoft Defender for Endpoint that can:
1212

1313
- Discover vulnerabilities and misconfigurations in near real time
1414
- Prioritize vulnerabilities based on the threat landscape and detections in your organization
1515

16-
If you've enabled the [integration with Microsoft Defender for Endpoint](integration-defender-for-endpoint.md), you'll automatically get the threat and vulnerability management findings without the need for additional agents.
16+
If you've enabled the [integration with Microsoft Defender for Endpoint](integration-defender-for-endpoint.md), you'll automatically get the Defender Vulnerability Management findings without the need for more agents.
1717

18-
As it's a built-in module for Microsoft Defender for Endpoint, **threat and vulnerability management** doesn't require periodic scans.
18+
As it's a built-in module for Microsoft Defender for Endpoint, **Defender Vulnerability Management** doesn't require periodic scans.
1919

20-
For a quick overview of threat and vulnerability management, watch this video:
20+
For a quick overview of Defender Vulnerability Management, watch this video:
2121

22-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4mLsn]
22+
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Y1FX]
2323
2424
> [!TIP]
25-
> As well as alerting you to vulnerabilities, threat and vulnerability management provides additional functionality for Defender for Cloud's asset inventory tool. Learn more in [Software inventory](asset-inventory.md#access-a-software-inventory).
25+
> As well as alerting you to vulnerabilities, Defender Vulnerability Management also provides functionality for Defender for Cloud's asset inventory tool. Learn more in [Software inventory](asset-inventory.md#access-a-software-inventory).
2626
2727
You can learn more by watching this video from the Defender for Cloud in the Field video series:
2828
- [Microsoft Defender for Servers](episode-five.md)
@@ -38,13 +38,13 @@ You can learn more by watching this video from the Defender for Cloud in the Fie
3838
|Required roles and permissions:|[Owner](../role-based-access-control/built-in-roles.md#owner) (resource group level) can deploy the scanner<br>[Security Reader](../role-based-access-control/built-in-roles.md#security-reader) can view findings|
3939
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet)|
4040

41-
## Onboarding your machines to threat and vulnerability management
41+
## Onboarding your machines to Defender Vulnerability Management
4242

4343
The integration between Microsoft Defender for Endpoint and Microsoft Defender for Cloud takes place in the background, so it doesn't involve any changes at the endpoint level.
4444

45-
- **To manually onboard one or more machines** to threat and vulnerability management, use the security recommendation "[Machines should have a vulnerability assessment solution](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ffff0522-1e88-47fc-8382-2a80ba848f5d)":
45+
- **To manually onboard one or more machines** to Defender Vulnerability Management, use the security recommendation "[Machines should have a vulnerability assessment solution](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ffff0522-1e88-47fc-8382-2a80ba848f5d)":
4646

47-
:::image type="content" source="media/deploy-vulnerability-assessment-tvm/deploy-vulnerability-assessment-solutions.png" alt-text="Selecting a vulnerability assessment solution from the recommendation.":::
47+
:::image type="content" source="media/deploy-vulnerability-assessment-defender-vulnerability-management/deploy-vulnerability-assessment-solutions.png" alt-text="Selecting a vulnerability assessment solution from the recommendation.":::
4848

4949
- **To automatically find and view the vulnerabilities** on existing and new machines without the need to manually remediate the preceding recommendation, see [Automatically configure vulnerability assessment for your machines](auto-deploy-vulnerability-assessment.md).
5050

articles/defender-for-cloud/deploy-vulnerability-assessment-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Defender for Cloud includes vulnerability scanning for your machines at no extra
2121
>
2222
> Defender for Cloud's integrated vulnerability assessment solution works seamlessly with Azure Arc. When you've deployed Azure Arc, your machines will appear in Defender for Cloud and no Log Analytics agent is required.
2323
24-
If you don't want to use the vulnerability assessment powered by Qualys, you can use [Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md) or [deploy a BYOL solution](deploy-vulnerability-assessment-byol-vm.md) with your own Qualys license, Rapid7 license, or another vulnerability assessment solution.
24+
If you don't want to use the vulnerability assessment powered by Qualys, you can use [Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md) or [deploy a BYOL solution](deploy-vulnerability-assessment-byol-vm.md) with your own Qualys license, Rapid7 license, or another vulnerability assessment solution.
2525

2626
## Availability
2727

articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Agentless vulnerability assessment uses the Defender Vulnerability Management en
1717

1818
## Compatibility with agent-based vulnerability assessment solutions
1919

20-
Defender for Cloud already supports different agent-based vulnerability scans, including [Microsoft Defender for Endpoint (MDE)](deploy-vulnerability-assessment-tvm.md), [BYOL](deploy-vulnerability-assessment-byol-vm.md) and [Qualys](deploy-vulnerability-assessment-vm.md). Agentless scanning extends the visibility of Defender for Cloud to reach more devices.
20+
Defender for Cloud already supports different agent-based vulnerability scans, including [Microsoft Defender for Endpoint (MDE)](deploy-vulnerability-assessment-defender-vulnerability-management.md), [BYOL](deploy-vulnerability-assessment-byol-vm.md) and [Qualys](deploy-vulnerability-assessment-vm.md). Agentless scanning extends the visibility of Defender for Cloud to reach more devices.
2121

2222
When you enable agentless vulnerability assessment:
2323

@@ -106,6 +106,6 @@ In this article, you learned about how to scan your machines for software vulner
106106

107107
Learn more about:
108108

109-
- [Vulnerability assessment with Microsoft Defender for Endpoint](deploy-vulnerability-assessment-tvm.md)
109+
- [Vulnerability assessment with Microsoft Defender for Endpoint](deploy-vulnerability-assessment-defender-vulnerability-management.md)
110110
- [Vulnerability assessment with Qualys](deploy-vulnerability-assessment-vm.md)
111111
- [Vulnerability assessment with BYOL solutions](deploy-vulnerability-assessment-byol-vm.md)

0 commit comments

Comments
 (0)