You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-prerequisites.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
- essentials-get-started
14
14
ms.topic: concept-article
15
15
search.appverid: met150
16
-
ms.date: 02/23/2025
16
+
ms.date: 05/09/2025
17
17
---
18
18
19
19
# Prerequisites & permissions for Microsoft Defender Vulnerability Management
@@ -22,8 +22,8 @@ ms.date: 02/23/2025
22
22
23
23
Microsoft Defender Vulnerability Management is available as an add-on for [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint) or as a standalone subscription.
24
24
25
+
- Defender Vulnerability Management is licensed per user. Each user must have a valid license, and that license covers all of the endpoints they use. Organizations must ensure they have enough user-based licenses to cover everyone using the service.
25
26
- Defender for Endpoint Plan 2 includes core vulnerability management capabilities. The Defender Vulnerability Management add-on extends these capabilities with consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools.
26
-
27
27
- The standalone version of Defender Vulnerability Management helps your security team to efficiently discover, assess, and remediate vulnerabilities and misconfigurations. This offering is recommended for customers who already have Defender for Endpoint Plan 1 or Microsoft 365 E3, and new customers.
28
28
29
29
For more information about Defender for Endpoint licensing, see [Microsoft 365 guidance for security & compliance: Defender for Endpoint](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-defender-for-endpoint).
@@ -33,15 +33,13 @@ To start a trial or to purchase Defender Vulnerability Management, see [Sign up
33
33
## Device requirements
34
34
35
35
- Devices must be running a [Supported operating systems, platforms, and capabilities](tvm-supported-os.md) with available updates installed
36
-
37
36
- Devices must meet the minimum requirements for [Defender for Endpoint](/defender-endpoint/minimum-requirements)
38
37
39
38
## Roles and permissions
40
39
41
40
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control](/defender-xdr/manage-rbac) (Unified RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.
42
41
43
42
-**Read** permissions enable your security team to view Defender Vulnerability Management data for software, weaknesses, missing KBs, advanced hunting, security baselines assessment, and devices.
44
-
45
43
-**Manage** permissions enable your security team to address vulnerabilities, manage remediation activities, and manage exceptions to security recommendations
46
44
47
45
For more information, see [Start using Microsoft Defender XDR Unified RBAC model](/defender-xdr/manage-rbac#start-using-microsoft-defender-xdr-unified-rbac-model).
0 commit comments