Skip to content

Commit 41040b1

Browse files
authored
Merge pull request #5806 from MicrosoftDocs/main
[AutoPublish] main to live - 12/01 04:39 PST | 12/01 18:09 IST
2 parents b3f5600 + a84079c commit 41040b1

File tree

61 files changed

+514
-385
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+514
-385
lines changed

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,17 @@ Learn more:
2929
- [What's new in Microsoft Defender for Endpoint on other operating systems and services](#whats-new-in-defender-for-endpoint-on-other-operating-systems-and-services)
3030
- [Preview features](/defender-xdr/preview)
3131

32+
## December 2025
33+
34+
|Feature |Preview/GA |Description |
35+
|---------|------------|-------------|
36+
|[Triage collection](/azure/sentinel/datalake/sentinel-mcp-triage-tool) |Preview |Use triage collection to prioritize incidents and hunt threats with the Sentinel Model Context Protocol (MCP) server.|
37+
3238
## November 2025
3339

3440
|Feature |Preview/GA |Description |
3541
|---------|------------|-------------|
36-
|New predictive shielding response actions. |Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
42+
|New predictive shielding response actions |Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
3743
|[Custom data collection](custom-data-collection.md) |Preview |Custom data collection enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs. |
3844
| Defender deployment tool<br/>- [for Windows devices](./defender-deployment-tool-windows.md)<br/>- [for Linux devices](./linux-install-with-defender-deployment-tool.md) | Preview | The new Defender deployment tool is a lightweight, self-updating application that streamlines onboarding devices to the Defender endpoint security solution. The tool takes care of prerequisites, automates migrations from older solutions, and removes the need for complex onboarding scripts, separate downloads, and manual installations. It currently supports Windows and Linux devices. |
3945
| [Defender endpoint security solution for Windows 7 SP1 and Windows Server 2008 R2 SP1](./onboard-downlevel.md#use-the-defender-deployment-tool-to-deploy-defender-endpoint-security) | Preview | A Defender for endpoint security solution is now available for legacy Windows 7 SP1 and Windows Server 2008 R2 SP1 devices. The solution provides advanced protection capabilities and improved functionality for these devices compared to other solutions. The new solution is available using the new [Defender deployment tool](./defender-deployment-tool-windows.md). |

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 38 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Compare Microsoft Defender Vulnerability Management plans and capabilities
33
description: Compare Defender Vulnerability Management Offerings. Learn about the differences between the plans and select the plan that suits your organization's needs.
44
search.appverid: MET150
5-
author: denisebmsft
6-
ms.author: deniseb
7-
manager: deniseb
5+
author: limwainstein
6+
ms.author: lwainstein
7+
manager: bagol
88
audience: ITPro
99
ms.topic: overview
1010
ms.service: defender-vuln-mgmt
@@ -14,6 +14,11 @@ ms.collection:
1414
- m365-security
1515
- Tier1
1616
ms.date: 02/28/2025
17+
appliesto:
18+
- Microsoft Defender Vulnerability Management
19+
- Microsoft Defender for Endpoint Plan 2
20+
- Microsoft Defender XDR
21+
- Microsoft Defender for Servers Plan 1 & 2
1722
---
1823

1924
# Compare Microsoft Defender Vulnerability Management plans and capabilities
@@ -50,22 +55,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
5055

5156
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
5257
|:----|:----:|:----:|:----:|
53-
|[Device discovery](/defender-endpoint/device-discovery)|✔|-|✔|
54-
|[Device inventory](/defender-endpoint/machines-view-overview)|✔|-|✔|
55-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|-|✔|
56-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|-|✔|
57-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|-|✔|
58-
|[Remediation tracking](tvm-remediation.md)|✔|-|✔|
59-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|-|✔|
60-
|[Software inventory](tvm-software-inventory.md)|✔|-|✔|
61-
|[Software usages insights](tvm-usage-insights.md)|✔|-|✔|
62-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|✔|
63-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|✔ **see note**|
64-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|✔|
65-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|✔|
66-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|✔|
67-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|✔|
68-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔|✔|
58+
|[Device discovery](/defender-endpoint/device-discovery)|Supported|-|Supported|
59+
|[Device inventory](/defender-endpoint/machines-view-overview)|Supported|-|Supported|
60+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|-|Supported|
61+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|-|Supported|
62+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|-|Supported|
63+
|[Remediation tracking](tvm-remediation.md)|Supported|-|Supported|
64+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|-|Supported|
65+
|[Software inventory](tvm-software-inventory.md)|Supported|-|Supported|
66+
|[Software usages insights](tvm-usage-insights.md)|Supported|-|Supported|
67+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|Supported|
68+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|Supported **see note**|
69+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|Supported|
70+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|Supported|
71+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|Supported|
72+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|Supported|
73+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported|Supported|
6974

7075
> [!NOTE]
7176
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -87,20 +92,20 @@ The following table lists the availability of Defender Vulnerability Management
8792

8893
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
8994
|:----|:----:|:----:|
90-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|✔|
91-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|✔|
92-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|✔|
93-
|[Remediation tracking](tvm-remediation.md)|✔|✔|
94-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|✔|
95-
|[Software inventory](tvm-software-inventory.md)|✔|✔|
96-
|[Software usages insights](tvm-usage-insights.md)|✔|✔|
97-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|
98-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|
99-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|
100-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|
101-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|
102-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|
103-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔**see note**|
95+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|Supported|
96+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|Supported|
97+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|Supported|
98+
|[Remediation tracking](tvm-remediation.md)|Supported|Supported|
99+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|Supported|
100+
|[Software inventory](tvm-software-inventory.md)|Supported|Supported|
101+
|[Software usages insights](tvm-usage-insights.md)|Supported|Supported|
102+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|
103+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|
104+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|
105+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|
106+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|
107+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|
108+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported**see note**|
104109

105110
> [!NOTE]
106111
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,22 @@ description: Find answers to frequently asked questions (FAQs) about Microsoft D
44
ms.service: defender-vuln-mgmt
55
f1.keywords:
66
- NOCSH
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: lwainstein
8+
author: limwainstein
99
ms.localizationpriority: medium
10-
manager: deniseb
10+
manager: bagol
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- Tier1
1515
ms.topic: faq
1616
search.appverid: met150
1717
ms.date: 05/02/2025
18+
appliesto:
19+
- Microsoft Defender Vulnerability Management
20+
- Microsoft Defender for Endpoint Plan 2
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Servers Plan 1 & 2
1823
---
1924

2025
# Microsoft Defender Vulnerability Management frequently asked questions

defender-vulnerability-management/defender-vulnerability-management-trial.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,22 @@ description: Learn about the Microsoft Defender Vulnerability Management trial
44
ms.service: defender-vuln-mgmt
55
f1.keywords:
66
- NOCSH
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: lwainstein
8+
author: limwainstein
99
ms.localizationpriority: medium
10-
manager: deniseb
10+
manager: bagol
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- Tier1
1515
ms.topic: how-to
1616
search.appverid: met150
1717
ms.date: 02/28/2025
18+
appliesto:
19+
- Microsoft Defender Vulnerability Management
20+
- Microsoft Defender for Endpoint Plan 2
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Servers Plan 1 & 2
1823
---
1924

2025
# About the Microsoft Defender Vulnerability Management trial

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: List the reported inaccuracies that were fixed
44
search.appverid: MET150
55
ms.service: defender-vuln-mgmt
66
ms.pagetype: security
7-
ms.author: deniseb
8-
author: denisebmsft
9-
manager: deniseb
7+
ms.author: lwainstein
8+
author: limwainstein
9+
manager: bagol
1010
ms.reviewer: v-hbijlani; mobani
1111
audience: ITPro
1212
ms.collection:
@@ -15,6 +15,11 @@ ms.collection:
1515
ms.localizationpriority: medium
1616
ms.topic: troubleshooting
1717
ms.date: 07/07/2025
18+
appliesto:
19+
- Microsoft Defender Vulnerability Management
20+
- Microsoft Defender for Endpoint Plan 2
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Servers Plan 1 & 2
1823
---
1924

2025
# Vulnerability support in Microsoft Defender Vulnerability Management

defender-vulnerability-management/get-defender-vulnerability-management.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Sign up for Microsoft Defender Vulnerability Management
33
description: Get Microsoft Defender Vulnerability Management
44
search.appverid: MET150
5-
author: denisebmsft
6-
ms.author: deniseb
7-
manager: deniseb
5+
author: limwainstein
6+
ms.author: lwainstein
7+
manager: bagol
88
audience: Admin
99
ms.topic: overview
1010
ms.service: defender-vuln-mgmt
@@ -15,6 +15,11 @@ ms.collection:
1515
- tier1
1616
- essentials-get-started
1717
ms.date: 03/06/2025
18+
appliesto:
19+
- Microsoft Defender Vulnerability Management
20+
- Microsoft Defender for Endpoint Plan 2
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Servers Plan 1 & 2
1823
---
1924

2025
# Sign up for Microsoft Defender Vulnerability Management

defender-vulnerability-management/mdvm-onboard-devices.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Onboard to Microsoft Defender Vulnerability Management
33
description: Learn how to onboard endpoints to Microsoft Defender Vulnerability Management service
4-
ms.author: deniseb
5-
author: denisebmsft
4+
ms.author: lwainstein
5+
author: limwainstein
66
ms.localizationpriority: medium
7-
manager: deniseb
7+
manager: bagol
88
audience: ITPro
99
ms.collection:
1010
- m365-security
@@ -15,18 +15,17 @@ ms.topic: install-set-up-deploy
1515
ms.service: defender-vuln-mgmt
1616
search.appverid: met150
1717
ms.date: 08/01/2023
18+
appliesto:
19+
- Microsoft Defender Vulnerability Management
20+
- Microsoft Defender for Endpoint Plan 2
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Servers Plan 1 & 2
1823
---
1924

2025
# Onboard to Microsoft Defender Vulnerability Management
2126

2227
[!INCLUDE [mdvm-msem-note](../includes/mdvm-msem-note.md)]
2328

24-
**Applies to:**
25-
26-
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)
27-
- [Microsoft Defender XDR](/defender-xdr)
28-
- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
29-
3029
To onboard devices to Defender Vulnerability Management you follow the same steps as you would for onboarding devices to Microsoft Defender for Endpoint.
3130

3231
Use this article for guidance on how to onboard devices to Defender Vulnerability Management.

defender-vulnerability-management/retention-logic-mdvm.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Understand retention logic in Microsoft Defender Vulnerability Management
33
description: Get an overview of retention logic for inactive devices or uninstalled software in Microsoft Defender Vulnerability Management.
4-
author: denisebmsft
5-
ms.author: deniseb
6-
manager: deniseb
4+
author: limwainstein
5+
ms.author: lwainstein
6+
manager: bagol
77
ms.reviewer: mobani
88
ms.topic: concept-article
99
ms.service: defender-vuln-mgmt
@@ -15,6 +15,11 @@ ms.collection:
1515
search.appverid: met150
1616
audience: ITPro
1717
ms.date: 05/08/2025
18+
appliesto:
19+
- Microsoft Defender Vulnerability Management
20+
- Microsoft Defender for Endpoint Plan 2
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Servers Plan 1 & 2
1823
---
1924

2025
# Understand retention logic in Microsoft Defender Vulnerability Management

defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,6 @@ To change the date range, select the **Date events occurred** filter above the t
6969

7070
![Event timeline selected custom date range.](/defender/media/defender-vulnerability-management/event-timeline-drilldown.png)
7171

72-
In the Exposure management **Recommendations** page, hover over the **Score history** graph to view new security configuration assessments that affect your score.
73-
7472
If there are no events that affect your devices or your score for devices, no events are displayed.
7573

7674
# [Existing customers](#tab/existing-customers-secure-score)

defender-vulnerability-management/trial-user-guide-defender-vulnerability-management.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: Trial user guide - Microsoft Defender Vulnerability Management
33
description: Learn how Microsoft Defender Vulnerability Management can help you protect all your users and data.
44
ms.service: defender-vuln-mgmt
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: lwainstein
6+
author: limwainstein
77
ms.localizationpriority: medium
8-
manager: deniseb
8+
manager: bagol
99
audience: ITPro
1010
ms.collection:
1111
- m365-security-compliance
@@ -15,6 +15,11 @@ ms.topic: overview
1515
ms.custom: trial-user guide
1616
search.appverid: met150
1717
ms.date: 02/28/2025
18+
appliesto:
19+
- Microsoft Defender Vulnerability Management
20+
- Microsoft Defender for Endpoint Plan 2
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Servers Plan 1 & 2
1823
---
1924

2025
# Trial user guide: Microsoft Defender Vulnerability Management
@@ -37,10 +42,6 @@ Microsoft Defender Vulnerability Management delivers asset visibility, continuou
3742

3843
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-asset.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management features and capabilities.":::
3944

40-
Watch the following video to learn more about Defender Vulnerability Management:
41-
42-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=4ee839c5-4ccb-4cc9-9945-ae8228e35121]
43-
4445
## Let's get started
4546

4647
### Step 1: Set up

0 commit comments

Comments
 (0)