You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/defender-vulnerability-management-faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -138,7 +138,7 @@ Windows authenticated scan will officially be deprecated on November 30, 2025. A
138
138
139
139
### What happens to my data after the product is deprecated?
140
140
141
-
All user data is handled according to our [data storage and privacy policy](tvm-prerequisites.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
141
+
All user data is handled according to our [Data storage and privacy](defender-vulnerability-management.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-prerequisites.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ ms.date: 02/23/2025
20
20
21
21
## Licensing requirements
22
22
23
-
Microsoft Defender Vulnerability Management is available as an add-on for [Microsoft Defender for Endpoint Plan 2](../defender-endpoint/microsoft-defender-endpoint.md) or as a standalone subscription.
23
+
Microsoft Defender Vulnerability Management is available as an add-on for [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint) or as a standalone subscription.
24
24
25
25
- Defender for Endpoint Plan 2 includes core vulnerability management capabilities. The Defender Vulnerability Management add-on extends these capabilities with consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools.
26
26
@@ -34,17 +34,17 @@ To start a trial or to purchase Defender Vulnerability Management, see [Sign up
34
34
35
35
- Devices must be running a [Supported operating systems, platforms, and capabilities](tvm-supported-os.md) with available updates installed
36
36
37
-
- Devices must meet the minimum requirements for [Defender for Endpoint](../defender-endpoint/minimum-requirements.md)
37
+
- Devices must meet the minimum requirements for [Defender for Endpoint](/defender-endpoint/minimum-requirements)
38
38
39
39
## Roles and permissions
40
40
41
-
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control]((../defender-xdr/manage-rbac.md)) (RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.
41
+
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control]((/defender-xdr/manage-rbac)) (RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.
42
42
43
43
-**Read** permissions enable your security team to view Defender Vulnerability Management data for software, weaknesses, missing KBs, advanced hunting, security baselines assessment, and devices.
44
44
45
45
-**Manage** permissions enable your security team to address vulnerabilities, manage remediation activities, and manage exceptions to security recommendations
46
46
47
-
For more information, see [Start using Microsoft Defender XDR Unified RBAC model](../defender-xdr/manage-rbac.md#start-using-microsoft-defender-xdr-unified-rbac-model).
47
+
For more information, see [Start using Microsoft Defender XDR Unified RBAC model](/defender-xdr/manage-rbac#start-using-microsoft-defender-xdr-unified-rbac-model).
0 commit comments