Skip to content

Commit b26093b

Browse files
authored
Merge pull request #2969 from MicrosoftDocs/main
pushing MDVM updates live
2 parents 8f0208b + 30d69f5 commit b26093b

7 files changed

+118
-102
lines changed

defender-endpoint/api/isolate-machine.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,27 +9,22 @@ manager: deniseb
99
audience: ITPro
1010
ms.collection:
1111
- m365-security
12-
- tier3
1312
- must-keep
1413
ms.topic: reference
1514
ms.subservice: reference
1615
ms.custom: api
1716
search.appverid: met150
18-
ms.date: 09/26/2024
17+
ms.date: 02/28/2025
1918
---
2019

2120
# Isolate machine API
2221

2322
[!INCLUDE [Microsoft Defender XDR rebranding](../../includes/microsoft-defender.md)]
2423

25-
2624
**Applies to:**
27-
- [Microsoft Defender for Endpoint Plan 1](../microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint](../microsoft-defender-endpoint.md)
25+
- [Microsoft Defender for Endpoint Plan 1 or Plan 2](/defender-endpoint/microsoft-defender-endpoint)
2926
- [Microsoft Defender XDR](/defender-xdr)
30-
31-
32-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
27+
- [Microsoft Defender for Business](/defender-business)
3328

3429
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
3530

@@ -47,11 +42,12 @@ Isolates a device from accessing external network.
4742

4843
> [!IMPORTANT]
4944
> - Full isolation is available for devices on Windows 10, version 1703, and on Windows 11.
50-
> - Full isolation is available in **public preview** for all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](../microsoft-defender-endpoint-linux.md#system-requirements).
45+
> - Full isolation is available for all supported Linux devices. See [Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux).
5146
> - Selective isolation is available for devices on Windows 10, version 1709 or later, and on Windows 11.
5247
> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
5348
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action.
5449
50+
5551
## Permissions
5652

5753
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)

defender-endpoint/attack-surface-reduction-rules-deployment-operationalize.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ If you want to focus on the AsrOfficeChildProcess rule and get details on the ac
7373

7474
```kusto
7575
DeviceEvents
76-
| where (Actiontype startswith "AsrOfficechild")
76+
| where (ActionType startswith "AsrOfficechild")
7777
| extend RuleId=extractjson("$Ruleid", AdditionalFields, typeof(string))
7878
| project DeviceName, FileName, FolderPath, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine
7979
```

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ f1.keywords: NOCSH
1313
ms.collection:
1414
- m365-security
1515
- Tier1
16-
ms.date: 11/07/2024
16+
ms.date: 02/28/2025
1717
---
1818

1919
# Compare Microsoft Defender Vulnerability Management plans and capabilities
@@ -38,12 +38,13 @@ This article helps clarify the Defender Vulnerability Management capabilities in
3838
> [!NOTE]
3939
> The Microsoft Defender Vulnerability Management trial isn't currently available to US Government customers using GCC High, and DoD. For more information on purchase options available, see [Microsoft Defender Vulnerability Management](https://www.microsoft.com/security/business/threat-protection/microsoft-defender-vulnerability-management-pricing?msockid=17c438e9b0b8628c22d52cd3b1c763eb).
4040
41+
- We recommend working with a Microsoft reseller to start your trial. If you're not already working with a reseller, see [Microsoft Security partners](https://www.microsoft.com/security/business/find-a-partner?msockid=3e48fd857a12656b2b0ce88f7b3f6460).
4142
- If you already have Defender for Endpoint Plan 2 [Try Defender Vulnerability Management Add-on trial for Defender for Endpoint Plan 2 customers](get-defender-vulnerability-management.md#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
4243
- For new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 customers the **Microsoft Defender Vulnerability Management Standalone is now generally available**. To try it, go to [Try Defender Vulnerability Management Standalone](get-defender-vulnerability-management.md#try-defender-vulnerability-management-standalone).
4344

4445
## Vulnerability Management capabilities for endpoints
4546

46-
The table below shows the availability of Defender Vulnerability Management capabilities for endpoints:
47+
The following table summarizes the availability of Defender Vulnerability Management capabilities for endpoints:
4748

4849
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
4950
|:----|:----:|:----:|:----:|
@@ -57,33 +58,30 @@ The table below shows the availability of Defender Vulnerability Management capa
5758
|[Software inventory](tvm-software-inventory.md)||-||
5859
|[Software usages insights](tvm-usage-insights.md)||-||
5960
|[Security baselines assessment](tvm-security-baselines.md)|-|||
60-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-||**see note** <sup>1</sup>|
61+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-||**see note**|
6162
|[Browser extensions assessment](tvm-browser-extensions.md)|-|||
6263
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|||
6364
|[Network share analysis](tvm-network-share-assessment.md)|-|||
6465
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|||
6566
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|||
6667

6768
> [!NOTE]
68-
> <sup>1</sup> Block vulnerable applications requirement: For Defender Vulnerability Management standalone customers, to use block vulnerable applications Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
69-
70-
> [!NOTE]
71-
> Microsoft 365 Business Premium and the standalone version of Microsoft Defender for Business include the capabilities that are listed under **Defender for Endpoint Plan 2** in the preceding table.
69+
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
7270
7371
## Vulnerability Management capabilities for servers
7472

75-
For Microsoft Defender for Cloud customers, Defender Vulnerability Management is natively integrated within Defender for Cloud to perform vulnerability assessments for cloud based virtual machines and recommendations will automatically populate in the Defender for Cloud portal.
73+
For Microsoft Defender for Cloud customers, Defender Vulnerability Management is natively integrated within Defender for Cloud to perform vulnerability assessments for cloud-based virtual machines. Recommendations automatically populate in the Defender for Cloud portal.
7674

7775
Defender Vulnerability Management premium capabilities are available to server devices with Microsoft Defender for Servers Plan 2.
7876

7977
> [!NOTE]
80-
> Client devices will require the Defender Vulnerability Management add-on license to access Defender Vulnerability Management premium capabilities.
78+
> Client devices require the Defender Vulnerability Management add-on license to access Defender Vulnerability Management premium capabilities.
8179
>
8280
> To use the premium vulnerability management capabilities for your client devices, see [Try Defender Vulnerability Management Add-on trial for Defender for Endpoint Plan 2 customers](get-defender-vulnerability-management.md#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
8381
84-
The capabilities are only available through the [Microsoft Defender 365 portal](https://security.microsoft.com/homepage).
82+
The capabilities are only available through the [Microsoft Defender portal](https://security.microsoft.com/homepage).
8583

86-
The table below shows the availability of Defender Vulnerability Management capabilities across the Defender for Servers plans.
84+
The following table lists the availability of Defender Vulnerability Management capabilities across the Defender for Servers plans.
8785

8886
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
8987
|:----|:----:|:----:|
@@ -100,10 +98,10 @@ The table below shows the availability of Defender Vulnerability Management capa
10098
|[Digital certificate assessment](tvm-certificate-inventory.md)|-||
10199
|[Network share analysis](tvm-network-share-assessment.md)|-||
102100
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-||
103-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|**see note** <sup>2</sup>|
101+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|**see note**|
104102

105-
> [!IMPORTANT]
106-
> <sup>2</sup> The Windows authenticated scan feature will be deprecated by the end of November 2025 and will not be supported beyond that date. More information about this change are in the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
103+
> [!NOTE]
104+
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
107105
108106
## Next steps
109107

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- Tier1
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 11/07/2024
17+
ms.date: 02/08/2025
1818
---
1919

2020
# Microsoft Defender Vulnerability Management frequently asked questions
@@ -50,6 +50,8 @@ If the customer has Defender for Endpoint Plan 2 they have the core vulnerabilit
5050

5151
### How do customers sign up for a trial?
5252

53+
We recommend working with a Microsoft reseller. If you're not already working with a reseller, see [Microsoft Security partners](https://www.microsoft.com/security/business/find-a-partner?msockid=3e48fd857a12656b2b0ce88f7b3f6460).
54+
5355
For existing Defender for Endpoint Plan 2 customers who want to evaluate the experience first-hand, we encourage directly onboarding onto the Microsoft Defender Vulnerability Management add-on free 90-day trial. For more information, see [Defender Vulnerability Management Add-on](get-defender-vulnerability-management.md#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
5456

5557
For new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 customers, see [Defender Vulnerability Management Standalone](get-defender-vulnerability-management.md#try-defender-vulnerability-management-standalone) to sign up for the free 90-day trial.
@@ -74,6 +76,8 @@ After your trial ends, you have a 30 day grace period of active trial before the
7476

7577
After 180 days, your license will be deactivated and your profiles will be deleted.
7678

79+
You can [request one extension](https://productledgrowth.powerappsportals.com/Admin-Led-Trials/request-trial/) of your current trial for 30 days within the last 15 days of the trial period. For any questions, please contact your field seller.
80+
7781
## Block vulnerable applications FAQs
7882

7983
### I want to block a vulnerable application but it's not showing up as available to block?

defender-vulnerability-management/defender-vulnerability-management-trial.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,49 +14,52 @@ ms.collection:
1414
- Tier1
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 10/22/2024
17+
ms.date: 02/28/2025
1818
---
1919

2020
# About the Microsoft Defender Vulnerability Management trial
2121

22-
Microsoft Defender Vulnerability Management provides advanced vulnerability management capabilities to minimize your organization's cyber risk. Get real-time asset discovery, continuous risk-based assessment and prioritization, and built in remediation tools.
22+
Microsoft Defender Vulnerability Management provides advanced vulnerability management capabilities to minimize your organization's cyber risk. Get real-time asset discovery, continuous risk-based assessment and prioritization, and built in remediation tools. It includes capabilities so your teams can intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
2323

24-
It includes capabilities so your teams can intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
24+
To start your trial, we recommend working with a Microsoft reseller. If you're not already working with a reseller, see [Microsoft Security partners](https://www.microsoft.com/security/business/find-a-partner?msockid=3e48fd857a12656b2b0ce88f7b3f6460).
2525

2626
## How to sign up for the Defender Vulnerability Management trial
2727

2828
> [!NOTE]
29-
> The sign up process outlined below is only relevant to customers who have access to the [Microsoft Defender 365 portal](https://security.microsoft.com/homepage).
29+
> The sign up process outlined below is only relevant to customers who have access to the [Microsoft Defender portal](https://security.microsoft.com/homepage).
3030
>
31-
> If you don't have access to the Microsoft Defender 365 portal learn more about how you can sign up to the [Microsoft Defender Vulnerability Management Standalone trial](get-defender-vulnerability-management.md#try-defender-vulnerability-management-standalone).
31+
> If you don't have access to the Microsoft Defender portal, learn more about how you can sign up to the [Microsoft Defender Vulnerability Management Standalone trial](get-defender-vulnerability-management.md#try-defender-vulnerability-management-standalone).
3232
>
3333
> If you're a Microsoft Defender for Cloud customers, see [Vulnerability Management capabilities for servers](./defender-vulnerability-management-capabilities.md#vulnerability-management-capabilities-for-servers) to learn more about the Defender Vulnerabilities Management capabilities available to your organization.
3434
35-
To sign up for the Defender Vulnerability Management trial, you can go directly to the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub) page or by selecting **Trials** on the left navigation from the [Microsoft Defender 365 portal](https://security.microsoft.com/homepage).
35+
To sign up for the Defender Vulnerability Management trial, you can go directly to the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub) page or by selecting **Trials** on the left navigation from the [Microsoft Defender portal](https://security.microsoft.com/homepage).
3636

3737
Once you've reached the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub):
3838

3939
- If you have Defender for Endpoint Plan 2, find the **Defender Vulnerability Management add-on** card and select **Try now**.
4040
- If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer, choose the **Defender Vulnerability Management** card and select **Try now**.
4141

4242
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-trialshub.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management trial hub landing page.":::
43+
4344
2. Review the information about what's included in the trial, then select **Begin trial**.
4445

4546
Your trial will be effective immediately:
4647

4748
- The Defender Vulnerability Management add-on trial lasts for 90 days.
4849
- The Defender Vulnerability Management Standalone trial lasts for 90 days.
4950

50-
It can take up to 6 hours for all vulnerability management features to appear in your left navigation. Sign out and sign back in to see the updates.
51+
It can take up to six hours for all vulnerability management features to appear in your left navigation. Sign out and sign back in to see the updates.
5152

5253
To make the most of your trial, see [Trial user guide: Microsoft Defender Vulnerability Management](./trial-user-guide-defender-vulnerability-management.md)
5354

5455
## Required roles for starting the trial
5556

5657
As a Global Administrator, you can start the trial or you can allow to users start the trial on behalf of your organization by enabling this option:
5758

58-
1. In the Microsoft 365 admin center, go to **Settings** > **Org settings** > **Services** > **User owned apps and services**
59+
1. In the Microsoft 365 admin center, go to **Settings** > **Org settings** > **Services** > **User owned apps and services**.
60+
5961
2. Check **Let users start trials on behalf of your organization**
62+
6063
3. Select **Save**
6164

6265
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-user-starttrial.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management user trial setting.":::
@@ -76,7 +79,7 @@ You can start using Defender Vulnerability Management features as soon as you se
7679

7780
### Extending the trial
7881

79-
You can extend the trial within the last 15 days of the trial period. You're limited to a maximum of two trial periods. If you don't extend by the time your trial period ends, you'll need to wait at least 30 days before signing up for a second trial.
82+
You can [request one extension](https://productledgrowth.powerappsportals.com/Admin-Led-Trials/request-trial/) of your current trial for 30 days within the last 15 days of the trial period. For any questions, please contact your field seller.
8083

8184
### Ending the trial
8285

0 commit comments

Comments
 (0)