You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/defender-vulnerability-management-capabilities.md
+30-30Lines changed: 30 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,22 +55,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
55
55
56
56
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|Supported|
73
+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported|Supported|
74
74
75
75
> [!NOTE]
76
76
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -92,20 +92,20 @@ The following table lists the availability of Defender Vulnerability Management
92
92
93
93
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|
108
+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported**see note**|
109
109
110
110
> [!NOTE]
111
111
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-asset.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management features and capabilities.":::
44
44
45
-
Watch the following video to learn more about Defender Vulnerability Management:
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-software-inventory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ In the [Microsoft Defender portal](https://security.microsoft.com), in the navig
49
49
50
50
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
51
51
52
-
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
52
+
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
53
53
54
54
You can filter the list view based on product code (CPE), OS platform, weaknesses found in the software, threats associated with them, and tags like whether the software has reached end-of-support.
Copy file name to clipboardExpand all lines: exposure-management/whats-new.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,10 +26,12 @@ Learn more about MSEM by reading the [Microsoft Security and Compliance blog](ht
26
26
27
27
## November 2025
28
28
29
-
### Integration of Microsoft Defender for Cloud’s CSPM capabilities and Microsoft Defender Vulnerability Management and into Exposure Management
29
+
### Integration of Microsoft Defender for Cloud’s CSPM capabilities and Microsoft Defender Vulnerability Management into Exposure Management
30
30
31
31
This major milestone brings comprehensive Microsoft Defender for Cloud’s posture capabilities (secure score, recommendations, and attack paths) and vulnerability management integration to Microsoft Security Exposure Management, which significantly expands the scope and capabilities of the platform.
32
32
33
+
**Unified portal experience** – All exposure management and vulnerability management functions are now accessible in the Microsoft Defender portal at security.microsoft.com under the Exposure Management section.
34
+
33
35
#### New unified recommendations catalog
34
36
35
37
**One place, full coverage** – You can now explore all Microsoft security recommendations in a single, streamlined experience that consolidates recommendations from:
@@ -58,11 +60,11 @@ This major milestone brings comprehensive Microsoft Defender for Cloud’s postu
58
60
59
61
#### Devices misconfigurations and vulnerabilities
60
62
61
-
**Separated workflows** – For the first time, misconfigurations recommendations are separated from vulnerabilities, recognizing they represent distinct workflows handled by different personas.
63
+
**Separated workflows** – For the first time, misconfiguration recommendations are separated from vulnerabilities, recognizing they represent distinct workflows handled by different personas.
62
64
63
-
-**Devices Misconfigurations**: Configuration issues from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management, contributing to Devices Secure Score
65
+
-**Devices Misconfigurations**: Configuration issues from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management, contributing to Devices Secure Score.
64
66
65
-
-**Devices Vulnerabilities**: Software vulnerabilities from Vulnerability Management with the same exposure score and prioritization logic customers know, preserving familiar structure and workflows
67
+
-**Devices Vulnerabilities**: Software vulnerabilities from Vulnerability Management with the same exposure score and prioritization logic customers know, preserving familiar structure and workflows.
66
68
67
69
#### Cloud Resources with risk-based prioritization
68
70
@@ -102,10 +104,6 @@ This major milestone brings comprehensive Microsoft Defender for Cloud’s postu
102
104
103
105
Learn more about the [integration with Microsoft Vulnerability Management](vulnerability-management-integration.md) and the specific [changes to the Microsoft Vulnerability Management experience](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management#microsoft-defender-vulnerability-management-and-microsoft-security-exposure-management-integration).
104
106
105
-
#### Portal and navigation updates
106
-
107
-
**Unified portal experience** – All exposure management and vulnerability management functions are now accessible in the Microsoft Defender portal at security.microsoft.com under the Exposure Management section.
108
-
109
107
#### Expanded Critical Asset Management
110
108
111
109
**Comprehensive coverage** – Critical asset management now covers the unified inventory spanning endpoints, cloud resources, and external assets discovered through third-party integrations.
0 commit comments