You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/defender-vulnerability-management-capabilities.md
+30-30Lines changed: 30 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,22 +55,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
55
55
56
56
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|Supported|
73
+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported|Supported|
74
74
75
75
> [!NOTE]
76
76
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -92,20 +92,20 @@ The following table lists the availability of Defender Vulnerability Management
92
92
93
93
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|
108
+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported**see note**|
109
109
110
110
> [!NOTE]
111
111
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-asset.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management features and capabilities.":::
44
44
45
-
Watch the following video to learn more about Defender Vulnerability Management:
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-software-inventory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ In the [Microsoft Defender portal](https://security.microsoft.com), in the navig
49
49
50
50
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
51
51
52
-
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
52
+
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
53
53
54
54
You can filter the list view based on product code (CPE), OS platform, weaknesses found in the software, threats associated with them, and tags like whether the software has reached end-of-support.
0 commit comments