You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,11 +29,17 @@ Learn more:
29
29
-[What's new in Microsoft Defender for Endpoint on other operating systems and services](#whats-new-in-defender-for-endpoint-on-other-operating-systems-and-services)
30
30
-[Preview features](/defender-xdr/preview)
31
31
32
+
## December 2025
33
+
34
+
|Feature |Preview/GA |Description |
35
+
|---------|------------|-------------|
36
+
|[Triage collection](/azure/sentinel/datalake/sentinel-mcp-triage-tool)|Preview |Use triage collection to prioritize incidents and hunt threats with the Sentinel Model Context Protocol (MCP) server.|
37
+
32
38
## November 2025
33
39
34
40
|Feature |Preview/GA |Description |
35
41
|---------|------------|-------------|
36
-
|New predictive shielding response actions.|Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
42
+
|New predictive shielding response actions |Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
37
43
|[Custom data collection](custom-data-collection.md)|Preview |Custom data collection enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs. |
38
44
| Defender deployment tool<br/>- [for Windows devices](./defender-deployment-tool-windows.md)<br/>- [for Linux devices](./linux-install-with-defender-deployment-tool.md)| Preview | The new Defender deployment tool is a lightweight, self-updating application that streamlines onboarding devices to the Defender endpoint security solution. The tool takes care of prerequisites, automates migrations from older solutions, and removes the need for complex onboarding scripts, separate downloads, and manual installations. It currently supports Windows and Linux devices. |
39
45
|[Defender endpoint security solution for Windows 7 SP1 and Windows Server 2008 R2 SP1](./onboard-downlevel.md#use-the-defender-deployment-tool-to-deploy-defender-endpoint-security)| Preview | A Defender for endpoint security solution is now available for legacy Windows 7 SP1 and Windows Server 2008 R2 SP1 devices. The solution provides advanced protection capabilities and improved functionality for these devices compared to other solutions. The new solution is available using the new [Defender deployment tool](./defender-deployment-tool-windows.md). |
Copy file name to clipboardExpand all lines: defender-vulnerability-management/defender-vulnerability-management-capabilities.md
+38-33Lines changed: 38 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,9 @@
2
2
title: Compare Microsoft Defender Vulnerability Management plans and capabilities
3
3
description: Compare Defender Vulnerability Management Offerings. Learn about the differences between the plans and select the plan that suits your organization's needs.
4
4
search.appverid: MET150
5
-
author: denisebmsft
6
-
ms.author: deniseb
7
-
manager: deniseb
5
+
author: limwainstein
6
+
ms.author: lwainstein
7
+
manager: bagol
8
8
audience: ITPro
9
9
ms.topic: overview
10
10
ms.service: defender-vuln-mgmt
@@ -14,6 +14,11 @@ ms.collection:
14
14
- m365-security
15
15
- Tier1
16
16
ms.date: 02/28/2025
17
+
appliesto:
18
+
- Microsoft Defender Vulnerability Management
19
+
- Microsoft Defender for Endpoint Plan 2
20
+
- Microsoft Defender XDR
21
+
- Microsoft Defender for Servers Plan 1 & 2
17
22
---
18
23
19
24
# Compare Microsoft Defender Vulnerability Management plans and capabilities
@@ -50,22 +55,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
50
55
51
56
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|Supported|
73
+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported|Supported|
69
74
70
75
> [!NOTE]
71
76
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -87,20 +92,20 @@ The following table lists the availability of Defender Vulnerability Management
87
92
88
93
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|
108
+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported**see note**|
104
109
105
110
> [!NOTE]
106
111
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
-[Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
29
-
30
29
To onboard devices to Defender Vulnerability Management you follow the same steps as you would for onboarding devices to Microsoft Defender for Endpoint.
31
30
32
31
Use this article for guidance on how to onboard devices to Defender Vulnerability Management.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,8 +69,6 @@ To change the date range, select the **Date events occurred** filter above the t
69
69
70
70

71
71
72
-
In the Exposure management **Recommendations** page, hover over the **Score history** graph to view new security configuration assessments that affect your score.
73
-
74
72
If there are no events that affect your devices or your score for devices, no events are displayed.
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-asset.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management features and capabilities.":::
39
44
40
-
Watch the following video to learn more about Defender Vulnerability Management:
0 commit comments