You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-glossary.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@ This glossary provides a brief description of important terms and concepts for t
115
115
## T
116
116
| Term | Description | Learn more |
117
117
|--|--|--|
118
-
|**TVM**|Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.|[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md)
118
+
|**TVM**|Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.|[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ Learn more about connecting your [AWS](quickstart-onboard-aws.md) and [GCP](quic
95
95
96
96
Defender for Cloud includes vulnerability assessment solutions for your virtual machines, container registries, and SQL servers as part of the enhanced security features. Some of the scanners are powered by Qualys. But you don't need a Qualys license, or even a Qualys account - everything's handled seamlessly inside Defender for Cloud.
97
97
98
-
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md).
98
+
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md).
99
99
100
100
Review the findings from these vulnerability scanners and respond to them all from within Defender for Cloud. This broad approach brings Defender for Cloud closer to being the single pane of glass for all of your cloud security efforts.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-servers-introduction.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,9 +38,10 @@ The following table summarizes what's included in each plan.
38
38
|:---|:---|:---:|:---:|
39
39
|**Unified view**| The Defender for Cloud portal displays Defender for Endpoint alerts. You can then drill down into Defender for Endpoint portal, with additional information such as the alert process tree, the incident graph, and a detailed machine timeline showing historical data up to six months.| :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
40
40
|**Automatic MDE provisioning**| Automatic provisioning of Defender for Endpoint on Azure, AWS, and GCP resources. | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
41
-
|**Microsoft threat and vulnerability management**| Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, without needing other agents or periodic scans. [Learn more](deploy-vulnerability-assessment-tvm.md). | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
41
+
|**Microsoft Defender Vulnerability Management**| Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, without other agents or periodic scans. [Learn more](deploy-vulnerability-assessment-defender-vulnerability-management.md). | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
42
42
|**Threat detection for OS-level (Agent-based)**| Defender for Servers and Microsoft Defender for Endpoint (MDE) detect threats at the OS level, including VM behavioral detections and **Fileless attack detection**, which generates detailed security alerts that accelerate alert triage, correlation, and downstream response time.<br>[Learn more](alerts-reference.md#alerts-windows)| :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
43
43
|**Threat detection for network-level (Agentless)**| Defender for Servers detects threats directed at the control plane on the network, including network-based detections for Azure virtual machines. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
44
+
|**Microsoft Defender Vulnerability Management Add-on**| See a deeper analysis of the security posture of your protected servers, including risks related to browser extensions, network shares, and digital certificates. [Learn more](deploy-vulnerability-assessment-defender-vulnerability-management.md). || :::image type="icon" source="./media/icons/yes-icon.png"::: |
44
45
|**Security Policy and Regulatory Compliance**| Customize a security policy for your subscription and also compare the configuration of your resources with requirements in industry standards, regulations, and benchmarks. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
45
46
|**Integrated vulnerability assessment powered by Qualys**| Use the Qualys scanner for real-time identification of vulnerabilities in Azure and hybrid VMs. Everything's handled by Defender for Cloud. You don't need a Qualys license or even a Qualys account. [Learn more](deploy-vulnerability-assessment-vm.md). || :::image type="icon" source="./media/icons/yes-icon.png"::: |
46
47
|**Log Analytics 500 MB free data ingestion**| Defender for Cloud leverages Azure Monitor to collect data from Azure VMs and servers, using the Log Analytics agent. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
@@ -49,10 +50,6 @@ The following table summarizes what's included in each plan.
49
50
|**Just-in-time VM access for management ports**| Defender for Cloud provides [JIT access](just-in-time-access-overview.md), locking down machine ports to reduce the machine's attack surface.|| :::image type="icon" source="./media/icons/yes-icon.png"::: |
50
51
|**Adaptive network hardening**| Filtering traffic to and from resources with network security groups (NSG) improves your network security posture. You can further improve security by [hardening the NSG rules](adaptive-network-hardening.md) based on actual traffic patterns. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
51
52
|**Docker host hardening**| Defender for Cloud assesses containers hosted on Linux machines running Docker containers, and compares them with the Center for Internet Security (CIS) Docker Benchmark. [Learn more](harden-docker-hosts.md). || :::image type="icon" source="./media/icons/yes-icon.png"::: |
> If you only enable Defender for Cloud at the workspace level, Defender for Cloud won't enable just-in-time VM access, adaptive application controls, and network detections for Azure resources.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,28 +1,28 @@
1
1
---
2
-
title: Use Microsoft Defender for Endpoint's threat and vulnerability management capabilities with Microsoft Defender for Cloud
3
-
description: Enable, deploy, and use Microsoft Defender for Endpoint's threat and vulnerability management capabilities with Microsoft Defender for Cloud to discover weaknesses in your Azure and hybrid machines
2
+
title: Use Microsoft Defender for Endpoint's Defender Vulnerability Management with Microsoft Defender for Cloud
3
+
description: Enable, deploy, and use Microsoft Defender for Endpoint's Defender Vulnerability Management with Microsoft Defender for Cloud to discover weaknesses in your Azure and hybrid machines
4
4
ms.topic: how-to
5
5
ms.custom: ignite-2022
6
-
ms.date: 07/13/2022
6
+
ms.date: 11/24/2022
7
7
---
8
8
9
-
# Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management
9
+
# Investigate weaknesses with Microsoft Defender for Endpoint's Defender Vulnerability Management
10
10
11
-
[Microsoft's threat and vulnerability management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt) is a built-in module in Microsoft Defender for Endpoint that can:
11
+
[Microsoft's Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) is a built-in module in Microsoft Defender for Endpoint that can:
12
12
13
13
- Discover vulnerabilities and misconfigurations in near real time
14
14
- Prioritize vulnerabilities based on the threat landscape and detections in your organization
15
15
16
-
If you've enabled the [integration with Microsoft Defender for Endpoint](integration-defender-for-endpoint.md), you'll automatically get the threat and vulnerability management findings without the need for additional agents.
16
+
If you've enabled the [integration with Microsoft Defender for Endpoint](integration-defender-for-endpoint.md), you'll automatically get the Defender Vulnerability Management findings without the need for more agents.
17
17
18
-
As it's a built-in module for Microsoft Defender for Endpoint, **threat and vulnerability management** doesn't require periodic scans.
18
+
As it's a built-in module for Microsoft Defender for Endpoint, **Defender Vulnerability Management** doesn't require periodic scans.
19
19
20
-
For a quick overview of threat and vulnerability management, watch this video:
20
+
For a quick overview of Defender Vulnerability Management, watch this video:
> As well as alerting you to vulnerabilities, threat and vulnerability management provides additional functionality for Defender for Cloud's asset inventory tool. Learn more in [Software inventory](asset-inventory.md#access-a-software-inventory).
25
+
> As well as alerting you to vulnerabilities, Defender Vulnerability Management also provides functionality for Defender for Cloud's asset inventory tool. Learn more in [Software inventory](asset-inventory.md#access-a-software-inventory).
26
26
27
27
You can learn more by watching this video from the Defender for Cloud in the Field video series:
28
28
-[Microsoft Defender for Servers](episode-five.md)
@@ -38,13 +38,13 @@ You can learn more by watching this video from the Defender for Cloud in the Fie
38
38
|Required roles and permissions:|[Owner](../role-based-access-control/built-in-roles.md#owner) (resource group level) can deploy the scanner<br>[Security Reader](../role-based-access-control/built-in-roles.md#security-reader) can view findings|
39
39
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet)|
40
40
41
-
## Onboarding your machines to threat and vulnerability management
41
+
## Onboarding your machines to Defender Vulnerability Management
42
42
43
43
The integration between Microsoft Defender for Endpoint and Microsoft Defender for Cloud takes place in the background, so it doesn't involve any changes at the endpoint level.
44
44
45
-
-**To manually onboard one or more machines** to threat and vulnerability management, use the security recommendation "[Machines should have a vulnerability assessment solution](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ffff0522-1e88-47fc-8382-2a80ba848f5d)":
45
+
-**To manually onboard one or more machines** to Defender Vulnerability Management, use the security recommendation "[Machines should have a vulnerability assessment solution](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ffff0522-1e88-47fc-8382-2a80ba848f5d)":
46
46
47
-
:::image type="content" source="media/deploy-vulnerability-assessment-tvm/deploy-vulnerability-assessment-solutions.png" alt-text="Selecting a vulnerability assessment solution from the recommendation.":::
47
+
:::image type="content" source="media/deploy-vulnerability-assessment-defender-vulnerability-management/deploy-vulnerability-assessment-solutions.png" alt-text="Selecting a vulnerability assessment solution from the recommendation.":::
48
48
49
49
-**To automatically find and view the vulnerabilities** on existing and new machines without the need to manually remediate the preceding recommendation, see [Automatically configure vulnerability assessment for your machines](auto-deploy-vulnerability-assessment.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/deploy-vulnerability-assessment-vm.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Defender for Cloud includes vulnerability scanning for your machines at no extra
21
21
>
22
22
> Defender for Cloud's integrated vulnerability assessment solution works seamlessly with Azure Arc. When you've deployed Azure Arc, your machines will appear in Defender for Cloud and no Log Analytics agent is required.
23
23
24
-
If you don't want to use the vulnerability assessment powered by Qualys, you can use [Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md) or [deploy a BYOL solution](deploy-vulnerability-assessment-byol-vm.md) with your own Qualys license, Rapid7 license, or another vulnerability assessment solution.
24
+
If you don't want to use the vulnerability assessment powered by Qualys, you can use [Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md) or [deploy a BYOL solution](deploy-vulnerability-assessment-byol-vm.md) with your own Qualys license, Rapid7 license, or another vulnerability assessment solution.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Agentless vulnerability assessment uses the Defender Vulnerability Management en
17
17
18
18
## Compatibility with agent-based vulnerability assessment solutions
19
19
20
-
Defender for Cloud already supports different agent-based vulnerability scans, including [Microsoft Defender for Endpoint (MDE)](deploy-vulnerability-assessment-tvm.md), [BYOL](deploy-vulnerability-assessment-byol-vm.md) and [Qualys](deploy-vulnerability-assessment-vm.md). Agentless scanning extends the visibility of Defender for Cloud to reach more devices.
20
+
Defender for Cloud already supports different agent-based vulnerability scans, including [Microsoft Defender for Endpoint (MDE)](deploy-vulnerability-assessment-defender-vulnerability-management.md), [BYOL](deploy-vulnerability-assessment-byol-vm.md) and [Qualys](deploy-vulnerability-assessment-vm.md). Agentless scanning extends the visibility of Defender for Cloud to reach more devices.
21
21
22
22
When you enable agentless vulnerability assessment:
23
23
@@ -106,6 +106,6 @@ In this article, you learned about how to scan your machines for software vulner
106
106
107
107
Learn more about:
108
108
109
-
-[Vulnerability assessment with Microsoft Defender for Endpoint](deploy-vulnerability-assessment-tvm.md)
109
+
-[Vulnerability assessment with Microsoft Defender for Endpoint](deploy-vulnerability-assessment-defender-vulnerability-management.md)
110
110
-[Vulnerability assessment with Qualys](deploy-vulnerability-assessment-vm.md)
111
111
-[Vulnerability assessment with BYOL solutions](deploy-vulnerability-assessment-byol-vm.md)
0 commit comments