Skip to content

Commit 5a5d4d9

Browse files
authored
Merge pull request #5805 from limwainstein/mdvm-fixing-pages
Mdvm fixing pages
2 parents 25d097c + cc5667d commit 5a5d4d9

File tree

4 files changed

+31
-35
lines changed

4 files changed

+31
-35
lines changed

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -55,22 +55,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
5555

5656
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
5757
|:----|:----:|:----:|:----:|
58-
|[Device discovery](/defender-endpoint/device-discovery)|✔|-|✔|
59-
|[Device inventory](/defender-endpoint/machines-view-overview)|✔|-|✔|
60-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|-|✔|
61-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|-|✔|
62-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|-|✔|
63-
|[Remediation tracking](tvm-remediation.md)|✔|-|✔|
64-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|-|✔|
65-
|[Software inventory](tvm-software-inventory.md)|✔|-|✔|
66-
|[Software usages insights](tvm-usage-insights.md)|✔|-|✔|
67-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|✔|
68-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|✔ **see note**|
69-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|✔|
70-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|✔|
71-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|✔|
72-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|✔|
73-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔|✔|
58+
|[Device discovery](/defender-endpoint/device-discovery)|Supported|-|Supported|
59+
|[Device inventory](/defender-endpoint/machines-view-overview)|Supported|-|Supported|
60+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|-|Supported|
61+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|-|Supported|
62+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|-|Supported|
63+
|[Remediation tracking](tvm-remediation.md)|Supported|-|Supported|
64+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|-|Supported|
65+
|[Software inventory](tvm-software-inventory.md)|Supported|-|Supported|
66+
|[Software usages insights](tvm-usage-insights.md)|Supported|-|Supported|
67+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|Supported|
68+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|Supported **see note**|
69+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|Supported|
70+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|Supported|
71+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|Supported|
72+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|Supported|
73+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported|Supported|
7474

7575
> [!NOTE]
7676
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -92,20 +92,20 @@ The following table lists the availability of Defender Vulnerability Management
9292

9393
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
9494
|:----|:----:|:----:|
95-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|✔|
96-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|✔|
97-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|✔|
98-
|[Remediation tracking](tvm-remediation.md)|✔|✔|
99-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|✔|
100-
|[Software inventory](tvm-software-inventory.md)|✔|✔|
101-
|[Software usages insights](tvm-usage-insights.md)|✔|✔|
102-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|
103-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|
104-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|
105-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|
106-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|
107-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|
108-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔**see note**|
95+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|Supported|
96+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|Supported|
97+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|Supported|
98+
|[Remediation tracking](tvm-remediation.md)|Supported|Supported|
99+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|Supported|
100+
|[Software inventory](tvm-software-inventory.md)|Supported|Supported|
101+
|[Software usages insights](tvm-usage-insights.md)|Supported|Supported|
102+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|
103+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|
104+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|
105+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|
106+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|
107+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|
108+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported**see note**|
109109

110110
> [!NOTE]
111111
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).

defender-vulnerability-management/trial-user-guide-defender-vulnerability-management.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,6 @@ Microsoft Defender Vulnerability Management delivers asset visibility, continuou
4242

4343
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-asset.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management features and capabilities.":::
4444

45-
Watch the following video to learn more about Defender Vulnerability Management:
46-
47-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=4ee839c5-4ccb-4cc9-9945-ae8228e35121]
48-
4945
## Let's get started
5046

5147
### Step 1: Set up

defender-vulnerability-management/tvm-software-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ In the [Microsoft Defender portal](https://security.microsoft.com), in the navig
4949

5050
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
5151

52-
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
52+
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
5353

5454
You can filter the list view based on product code (CPE), OS platform, weaknesses found in the software, threats associated with them, and tags like whether the software has reached end-of-support.
5555

-69.6 KB
Loading

0 commit comments

Comments
 (0)