Skip to content

Commit 1dc0c67

Browse files
authored
Merge pull request #2892 from MicrosoftDocs/main
pushing MDVM fixes live
2 parents fed31d8 + aa797be commit 1dc0c67

10 files changed

+153
-176
lines changed

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Windows authenticated scan will officially be deprecated on November 30, 2025. A
138138

139139
### What happens to my data after the product is deprecated?
140140

141-
All user data is handled according to our [data storage and privacy policy](tvm-prerequisites.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
141+
All user data is handled according to our [Data storage and privacy](defender-vulnerability-management.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
142142

143143
### Will the product be replaced?
144144

defender-vulnerability-management/defender-vulnerability-management.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- essentials-overview
1414
search.appverid: met150
1515
audience: ITPro
16-
ms.date: 04/03/2024
16+
ms.date: 02/23/2025
1717
---
1818

1919
# What is Microsoft Defender Vulnerability Management
@@ -94,6 +94,10 @@ See the following articles for related Defender for Endpoint APIs:
9494
- [Vulnerability APIs](/defender-endpoint/api/vulnerability)
9595
- [List vulnerabilities by machine and software](/defender-endpoint/api/get-all-vulnerabilities-by-machines)
9696

97+
## Data storage and privacy
98+
99+
The same data security and privacy practices for Microsoft Defender for Endpoint apply to Microsoft Defender Vulnerability Management, for more information, see [Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy).
100+
97101
## Next steps
98102

99103
- [Compare security features in Microsoft Defender Vulnerability Management](defender-vulnerability-management-capabilities.md)

defender-vulnerability-management/get-defender-vulnerability-management.md

Lines changed: 19 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -14,36 +14,34 @@ ms.collection:
1414
- m365-security
1515
- tier1
1616
- essentials-get-started
17-
ms.date: 08/14/2023
17+
ms.date: 02/23/2025
1818
---
1919

2020
# Sign up for Microsoft Defender Vulnerability Management
2121

2222
> [!NOTE]
23-
> Microsoft Defender Vulnerability Management isn't currently available to Microsoft Defender for Business customers.
24-
25-
## Starting a trial
26-
27-
> [!NOTE]
23+
> Microsoft Defender Vulnerability Management isn't currently available in [Microsoft Defender for Business](/defender-business/mdb-overview).
2824
> The Microsoft Defender Vulnerability Management trial isn't currently available to US Government customers using GCC High, and DoD.
29-
>
3025
> For more information on purchase options available, see [Microsoft Defender Vulnerability Management](https://www.microsoft.com/security/business/threat-protection/microsoft-defender-vulnerability-management-pricing?msockid=17c438e9b0b8628c22d52cd3b1c763eb).
3126
32-
Microsoft Defender Vulnerability Management is available as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers.
27+
28+
## Starting a trial
29+
30+
Microsoft Defender Vulnerability Management is available as a standalone subscription or as an add-on for [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint) customers.
3331

3432
- If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer sign up to try the [Defender Vulnerability Management Standalone Trial](#try-defender-vulnerability-management-standalone)
3533
- If you already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Add-on Trial](#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers)
3634

37-
> [!NOTE]
38-
> Trials will be available to customers using the New Commerce Experience (NCE) for a 30 day period. After the 30 day period customers will be able to purchase Microsoft Defender Vulnerability Management through NCE.
39-
35+
Trials are available to customers using the New Commerce Experience (NCE) for a 30 day period. After the 30 day period customers are able to purchase Microsoft Defender Vulnerability Management through NCE.
4036

4137
## Required roles for starting the trial
4238

4339
As a Global Administrator, you can start the trial or you can allow to users start the trial on behalf of your organization by enabling this option:
4440

4541
1. In the Microsoft 365 admin center, go to **Settings** > **Org settings** > **Services** > **User owned apps and services**
42+
4643
2. Check **Let users start trials on behalf of your organization**
44+
4745
3. Select **Save**
4846

4947
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-user-starttrial.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management user trial setting.":::
@@ -57,17 +55,19 @@ It can take a few hours for the changes to take effect. Once it does, return to
5755

5856
## Try Defender Vulnerability Management Standalone
5957

60-
If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer, you will sign up to trial the **Defender Vulnerability Management Standalone trial**.
58+
If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer, you can sign up for the **Defender Vulnerability Management Standalone trial**.
6159

6260
> [!IMPORTANT]
6361
> You must be logged into the tenant as a global administrator to perform this task.
6462
6563
To sign up:
6664

67-
1. Log in as a global admin to the tenant where the Defender Vulnerability Management Standalone trial service will be added.
68-
2. Visit [Microsoft Defender Vulnerability Management Trial](https://aka.ms/MdvmStandaloneStartTrial).
69-
3. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
70-
4. Once you have signed in, select the **Try now** button to confirm your order of the 90 day subscription of the Defender Vulnerability Management Standalone trial.
65+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) for the tenant where the Defender Vulnerability Management Standalone trial service will be added.
66+
67+
2. Go to [Microsoft Defender Vulnerability Management Trial](https://aka.ms/MdvmStandaloneStartTrial), and follow the prompts.
68+
69+
3. Select the **Try now** button to confirm your order of the 90 day subscription of the Defender Vulnerability Management Standalone trial.
70+
7171
5. Select **Continue**. You'll now be directed to the Microsoft Defender portal.
7272

7373
> [!NOTE]
@@ -78,8 +78,11 @@ To sign up:
7878
If you already have Defender for Endpoint Plan 2, sign up to the **Defender Vulnerability Management Add-on trial** to get access to the additional capabilities. To sign up:
7979

8080
1. Visit [Microsoft Defender Vulnerability Management Add-on Trial](https://aka.ms/MdvmAddonStartTrial).
81+
8182
2. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
83+
8284
3. Once you have signed in, select the **Try now** button to confirm your order of the 90 day subscription of the Microsoft Defender Vulnerability Add-on trial.
85+
8386
4. Select **Continue**. You'll now be directed to the Microsoft Defender portal.
8487

8588
> [!NOTE]

defender-vulnerability-management/tvm-browser-extensions.md

Lines changed: 13 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Browser extensions assessment
2+
title: Browser extensions assessment in Microsoft Defender Vulnerability Management
33
description: Find out about the browsers extensions installed in your environment
44
ms.service: defender-vuln-mgmt
55
ms.pagetype: security
@@ -13,38 +13,33 @@ ms.collection:
1313
- Tier1
1414
ms.topic: conceptual
1515
search.appverid: met150
16-
ms.date: 10/24/2023
16+
ms.date: 02/23/2025
1717
---
1818

19-
# Browser extensions assessment
19+
# Browser extensions assessment in Microsoft Defender Vulnerability Management
2020

2121
**Applies to:**
2222

2323
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)
2424
- [Microsoft Defender XDR](/defender-xdr)
2525
- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
2626

27-
> [!NOTE]
28-
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
29-
30-
A browser extension is a small software application that adds functionality to a web browser. Visibility into the browser extensions installed can help you ensure the safe usage of extensions in your organization.
31-
32-
The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it and if it's turned on or off on a device.
27+
This browser extension is a small software application that adds functionality to a web browser for use with Microsoft Defender Vulnerability Management. This extension provides your security team with visibility into installed browser extensions to help ensure the safe usage of extensions in your organization.
3328

34-
The information available will not only help you learn about the installed extensions, but it can help you make decisions on how you want to manage the extensions.
29+
The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it, and whether it's turned on or off on a device.
3530

36-
> [!TIP]
37-
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
31+
The information available helps your security team learn about the installed extensions, and use that information to make decisions on how you want to manage extensions.
3832

3933
## View your browser extensions
4034

4135
1. Go to **Vulnerability management** \> **Inventories** in the [Microsoft Defender portal](https://security.microsoft.com).
36+
4237
2. Select the **Browser extensions** tab.
4338

4439
> [!NOTE]
45-
> Browser extension assessment is only available on Windows devices. Only extensions that exist in Edge, Chrome, and Firefox, will appear in browser extension list.
40+
> Browser extension assessment is only available on Windows devices. Only extensions that exist in Microsoft Edge, Chrome, and Firefox, appear in browser extension list.
4641
47-
The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number that have it turned on.
42+
The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number of devices with the extensions turned on.
4843

4944
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions.png" alt-text="Screenshot of the Browser extensions page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions.png":::
5045

@@ -56,7 +51,7 @@ Select a browser extension to open its flyout pane, where you can learn more abo
5651

5752
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_details.png" alt-text="Screenshot of the Browser extensions details pane" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_details.png":::
5853

59-
Where applicable, there will be a link available on this page to access the extension in the store it was installed from.
54+
Where applicable, there's a link available on this page to access the extension in the store it was installed from.
6055

6156
### Browser extension permissions
6257

@@ -69,7 +64,7 @@ Select the **Permissions** tab, from the browser extension flyout pane, to see i
6964
The permission risk level generated is based on the type of access the permission is requesting. You can use this information to help make an informed decision on whether you want to allow or block this extension.
7065

7166
> [!NOTE]
72-
> Risk is subjective, and it's up to each organization to determine the types of risk they are willing to take on.
67+
> Risk is subjective, and it's up to each organization to determine the types of risk they're willing to take on.
7368
7469
Select a permission to see a further flyout with more information.
7570

@@ -85,7 +80,7 @@ From here, you can search for a particular device the extension is installed on,
8580

8681
Select the **Extensions versions** tab, from the browser extension flyout pane, to see information on the versions of the extension installed in your organization.
8782

88-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_versions.png" alt-text="Screenshot of the Browser extensions versions tab" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_versions.png":::
83+
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_versions.png" alt-text="Screenshot of the Browser extensions versions tab" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_versions.png":::
8984

9085
### View extensions users
9186

@@ -98,6 +93,7 @@ Select the **Users** tab, from the browser extension flyout pane, to see a list
9893
You can also view a list of extensions installed on a device:
9994

10095
1. Select the device from the **Installed devices** tab in the flyout panel and select **Open device page** or select the device directly from the **Device inventory** page.
96+
10197
2. Select **Inventories** and then **Browser extensions** to see a list of extensions installed on that device.
10298

10399
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_devicepage.png" alt-text="Screenshot of the Browser extensions in the devices page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_devicepage.png":::

defender-vulnerability-management/tvm-dashboard-insights.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.custom: admindeeplinkDEFENDER
1414
ms.topic: conceptual
1515
search.appverid: met150
16-
ms.date: 03/04/2022
16+
ms.date: 02/23/2025
1717
---
1818

1919
# Microsoft Defender Vulnerability Management dashboard
@@ -39,7 +39,7 @@ You can use Defender Vulnerability Management dashboard in the Microsoft Defende
3939
- Select exception options and track active exceptions
4040

4141
> [!NOTE]
42-
> Devices that are not active in the last 30 days are not factored in on the data that reflects your organization's vulnerability management exposure score and Microsoft Secure Score for Devices.
42+
> Devices that aren't active in the last 30 days aren't factored in on the data that reflects your organization's vulnerability management exposure score and Microsoft Secure Score for Devices.
4343
4444
Watch this video for a quick overview of what is in the Defender Vulnerability Management dashboard.
4545

@@ -52,24 +52,20 @@ Watch this video for a quick overview of what is in the Defender Vulnerability M
5252

5353
:::image type="content" source="/defender/media/defender-vulnerability-management/tvmdashboard.png" lightbox="/defender/media/tvmdashboard.png" alt-text="Defender Vulnerability Management dashboard ":::
5454

55-
<br>
56-
57-
****
58-
5955
|Area|Description|
6056
|---|---|
6157
|**Selected device groups (#/#)**|Filter the vulnerability management data you want to see in the dashboard and cards by device groups. What you select in the filter applies throughout the vulnerability management pages.|
6258
|[**Exposure score**](tvm-exposure-score.md)|See the current state of your organization's device exposure to threats and vulnerabilities. Several factors affect your organization's exposure score: weaknesses discovered in your devices, likelihood of your devices to be breached, value of the devices to your organization, and relevant alerts discovered with your devices. The goal is to lower the exposure score of your organization to be more secure. To reduce the score, you need to remediate the related security configuration issues listed in the security recommendations.|
63-
|[**Microsoft Secure Score for Devices**](tvm-microsoft-secure-score-devices.md)|See the security posture of the operating system, applications, network, accounts, and security controls of your organization. The goal is to remediate the related security configuration issues to increase your score for devices. Selecting the bars will take you to the **Security recommendation** page.|
59+
|[**Microsoft Secure Score for Devices**](tvm-microsoft-secure-score-devices.md)|See the security posture of the operating system, applications, network, accounts, and security controls of your organization. The goal is to remediate the related security configuration issues to increase your score for devices. Selecting the bars take you to the **Security recommendation** page.|
6460
|**Device exposure distribution**|See how many devices are exposed based on their exposure level. Select a section in the doughnut chart to go to the **Devices list** page and view the affected device names, exposure level, risk level, and other details such as domain, operating system platform, its health state, when it was last seen, and its tags.|
65-
|**Expiring certificates**|See how many certificates have expired or are due to expire in the next 30, 60 or 90 days.|
61+
|**Expiring certificates**|See how many certificates are expired or are due to expire in the next 30, 60 or 90 days.|
6662
|**Top security recommendations**|See the collated security recommendations that are sorted and prioritized based on your organization's risk exposure and the urgency that it requires. Select **Show more** to see the rest of the security recommendations in the list. Select **Show exceptions** for the list of recommendations that have an exception.|
6763
|**Top vulnerable software**|Get real-time visibility into your organization's software inventory with a stack-ranked list of vulnerable software installed on your network's devices and how they impact your organizational exposure score. Select an item for details or **Show more** to see the rest of the vulnerable software list in the **Software inventory** page.|
6864
|**Top remediation activities**|Track the remediation activities generated from the security recommendations. You can select each item on the list to see the details in the **Remediation** page or select **Show more** to view the rest of the remediation activities, and active exceptions.|
6965
|**Top exposed devices**|View exposed device names and their exposure level. Select a device name from the list to go to the device page where you can view the alerts, risks, incidents, security recommendations, installed software, and discovered vulnerabilities associated with the exposed devices. Select **Show more** to see the rest of the exposed devices list. From the devices list, you can manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate device.|
7066
|
7167

72-
## Related topics
68+
## Related articles
7369

7470
- [Exposure score](tvm-exposure-score.md)
7571
- [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md)

0 commit comments

Comments
 (0)