Skip to content

Commit 3a303b6

Browse files
authored
Merge branch 'main' into mcp-link
2 parents cdb354f + 5a5d4d9 commit 3a303b6

File tree

5 files changed

+37
-43
lines changed

5 files changed

+37
-43
lines changed

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -55,22 +55,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
5555

5656
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
5757
|:----|:----:|:----:|:----:|
58-
|[Device discovery](/defender-endpoint/device-discovery)|✔|-|✔|
59-
|[Device inventory](/defender-endpoint/machines-view-overview)|✔|-|✔|
60-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|-|✔|
61-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|-|✔|
62-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|-|✔|
63-
|[Remediation tracking](tvm-remediation.md)|✔|-|✔|
64-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|-|✔|
65-
|[Software inventory](tvm-software-inventory.md)|✔|-|✔|
66-
|[Software usages insights](tvm-usage-insights.md)|✔|-|✔|
67-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|✔|
68-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|✔ **see note**|
69-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|✔|
70-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|✔|
71-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|✔|
72-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|✔|
73-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔|✔|
58+
|[Device discovery](/defender-endpoint/device-discovery)|Supported|-|Supported|
59+
|[Device inventory](/defender-endpoint/machines-view-overview)|Supported|-|Supported|
60+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|-|Supported|
61+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|-|Supported|
62+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|-|Supported|
63+
|[Remediation tracking](tvm-remediation.md)|Supported|-|Supported|
64+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|-|Supported|
65+
|[Software inventory](tvm-software-inventory.md)|Supported|-|Supported|
66+
|[Software usages insights](tvm-usage-insights.md)|Supported|-|Supported|
67+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|Supported|
68+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|Supported **see note**|
69+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|Supported|
70+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|Supported|
71+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|Supported|
72+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|Supported|
73+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported|Supported|
7474

7575
> [!NOTE]
7676
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -92,20 +92,20 @@ The following table lists the availability of Defender Vulnerability Management
9292

9393
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
9494
|:----|:----:|:----:|
95-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|✔|
96-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|✔|
97-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|✔|
98-
|[Remediation tracking](tvm-remediation.md)|✔|✔|
99-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|✔|
100-
|[Software inventory](tvm-software-inventory.md)|✔|✔|
101-
|[Software usages insights](tvm-usage-insights.md)|✔|✔|
102-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|
103-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|
104-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|
105-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|
106-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|
107-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|
108-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔**see note**|
95+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|Supported|
96+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|Supported|
97+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|Supported|
98+
|[Remediation tracking](tvm-remediation.md)|Supported|Supported|
99+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|Supported|
100+
|[Software inventory](tvm-software-inventory.md)|Supported|Supported|
101+
|[Software usages insights](tvm-usage-insights.md)|Supported|Supported|
102+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|
103+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|
104+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|
105+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|
106+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|
107+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|
108+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported**see note**|
109109

110110
> [!NOTE]
111111
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).

defender-vulnerability-management/trial-user-guide-defender-vulnerability-management.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,6 @@ Microsoft Defender Vulnerability Management delivers asset visibility, continuou
4242

4343
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-asset.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management features and capabilities.":::
4444

45-
Watch the following video to learn more about Defender Vulnerability Management:
46-
47-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=4ee839c5-4ccb-4cc9-9945-ae8228e35121]
48-
4945
## Let's get started
5046

5147
### Step 1: Set up

defender-vulnerability-management/tvm-software-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ In the [Microsoft Defender portal](https://security.microsoft.com), in the navig
4949

5050
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
5151

52-
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
52+
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
5353

5454
You can filter the list view based on product code (CPE), OS platform, weaknesses found in the software, threats associated with them, and tags like whether the software has reached end-of-support.
5555

-69.6 KB
Loading

exposure-management/whats-new.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,12 @@ Learn more about MSEM by reading the [Microsoft Security and Compliance blog](ht
2626
2727
## November 2025
2828

29-
### Integration of Microsoft Defender for Cloud’s CSPM capabilities and Microsoft Defender Vulnerability Management and into Exposure Management
29+
### Integration of Microsoft Defender for Cloud’s CSPM capabilities and Microsoft Defender Vulnerability Management into Exposure Management
3030

3131
This major milestone brings comprehensive Microsoft Defender for Cloud’s posture capabilities (secure score, recommendations, and attack paths) and vulnerability management integration to Microsoft Security Exposure Management, which significantly expands the scope and capabilities of the platform.
3232

33+
**Unified portal experience** – All exposure management and vulnerability management functions are now accessible in the Microsoft Defender portal at security.microsoft.com under the Exposure Management section.
34+
3335
#### New unified recommendations catalog
3436

3537
**One place, full coverage** – You can now explore all Microsoft security recommendations in a single, streamlined experience that consolidates recommendations from:
@@ -58,11 +60,11 @@ This major milestone brings comprehensive Microsoft Defender for Cloud’s postu
5860

5961
#### Devices misconfigurations and vulnerabilities
6062

61-
**Separated workflows** – For the first time, misconfigurations recommendations are separated from vulnerabilities, recognizing they represent distinct workflows handled by different personas.
63+
**Separated workflows** – For the first time, misconfiguration recommendations are separated from vulnerabilities, recognizing they represent distinct workflows handled by different personas.
6264

63-
- **Devices Misconfigurations**: Configuration issues from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management, contributing to Devices Secure Score
65+
- **Devices Misconfigurations**: Configuration issues from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management, contributing to Devices Secure Score.
6466

65-
- **Devices Vulnerabilities**: Software vulnerabilities from Vulnerability Management with the same exposure score and prioritization logic customers know, preserving familiar structure and workflows
67+
- **Devices Vulnerabilities**: Software vulnerabilities from Vulnerability Management with the same exposure score and prioritization logic customers know, preserving familiar structure and workflows.
6668

6769
#### Cloud Resources with risk-based prioritization
6870

@@ -102,10 +104,6 @@ This major milestone brings comprehensive Microsoft Defender for Cloud’s postu
102104

103105
Learn more about the [integration with Microsoft Vulnerability Management](vulnerability-management-integration.md) and the specific [changes to the Microsoft Vulnerability Management experience](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management#microsoft-defender-vulnerability-management-and-microsoft-security-exposure-management-integration).
104106

105-
#### Portal and navigation updates
106-
107-
**Unified portal experience** – All exposure management and vulnerability management functions are now accessible in the Microsoft Defender portal at security.microsoft.com under the Exposure Management section.
108-
109107
#### Expanded Critical Asset Management
110108

111109
**Comprehensive coverage** – Critical asset management now covers the unified inventory spanning endpoints, cloud resources, and external assets discovered through third-party integrations.

0 commit comments

Comments
 (0)