Skip to content

Commit 028e5ec

Browse files
committed
Fixing capabilities table
1 parent 15acafb commit 028e5ec

File tree

1 file changed

+30
-30
lines changed

1 file changed

+30
-30
lines changed

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -55,22 +55,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
5555

5656
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
5757
|:----|:----:|:----:|:----:|
58-
|[Device discovery](/defender-endpoint/device-discovery)|✔|-|✔|
59-
|[Device inventory](/defender-endpoint/machines-view-overview)|✔|-|✔|
60-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|-|✔|
61-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|-|✔|
62-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|-|✔|
63-
|[Remediation tracking](tvm-remediation.md)|✔|-|✔|
64-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|-|✔|
65-
|[Software inventory](tvm-software-inventory.md)|✔|-|✔|
66-
|[Software usages insights](tvm-usage-insights.md)|✔|-|✔|
67-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|✔|
68-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|✔ **see note**|
69-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|✔|
70-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|✔|
71-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|✔|
72-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|✔|
73-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔|✔|
58+
|[Device discovery](/defender-endpoint/device-discovery)|Supported|-|Supported|
59+
|[Device inventory](/defender-endpoint/machines-view-overview)|Supported|-|Supported|
60+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|-|Supported|
61+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|-|Supported|
62+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|-|Supported|
63+
|[Remediation tracking](tvm-remediation.md)|Supported|-|Supported|
64+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|-|Supported|
65+
|[Software inventory](tvm-software-inventory.md)|Supported|-|Supported|
66+
|[Software usages insights](tvm-usage-insights.md)|Supported|-|Supported|
67+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|Supported|
68+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|Supported **see note**|
69+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|Supported|
70+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|Supported|
71+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|Supported|
72+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|Supported|
73+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported|Supported|
7474

7575
> [!NOTE]
7676
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -92,20 +92,20 @@ The following table lists the availability of Defender Vulnerability Management
9292

9393
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
9494
|:----|:----:|:----:|
95-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|✔|
96-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|✔|
97-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|✔|
98-
|[Remediation tracking](tvm-remediation.md)|✔|✔|
99-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|✔|
100-
|[Software inventory](tvm-software-inventory.md)|✔|✔|
101-
|[Software usages insights](tvm-usage-insights.md)|✔|✔|
102-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|
103-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|
104-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|
105-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|
106-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|
107-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|
108-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔**see note**|
95+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|Supported|
96+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|Supported|
97+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|Supported|
98+
|[Remediation tracking](tvm-remediation.md)|Supported|Supported|
99+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|Supported|
100+
|[Software inventory](tvm-software-inventory.md)|Supported|Supported|
101+
|[Software usages insights](tvm-usage-insights.md)|Supported|Supported|
102+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|
103+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|
104+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|
105+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|
106+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|
107+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|
108+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported**see note**|
109109

110110
> [!NOTE]
111111
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).

0 commit comments

Comments
 (0)