You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/vulnerability-management-integration.md
+13-14Lines changed: 13 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ This article describes the integration of Microsoft Defender Vulnerability Manag
15
15
16
16
## Overview
17
17
18
-
Microsoft Defender Vulnerability Management has a new home under Exposure Management in the Microsoft Defender portal. This integration brings comprehensive vulnerability management capabilities for both cloud and device environments into a single, unified experience.
18
+
[Microsoft Defender Vulnerability Management](/defender-vulnerability-management/) has a new home under Exposure Management in the Microsoft Defender portal. This integration brings comprehensive vulnerability management capabilities for both cloud and device environments into a single, unified experience.
19
19
20
20
:::image type="content" source="./media/vulnerability-management/vulnerability-management-home.png" alt-text="Screenshot of the vulnerability management home page in Exposure Management." lightbox="./media/vulnerability-management/vulnerability-management-home.png":::
21
21
@@ -33,9 +33,9 @@ All vulnerability management functions are accessible through the Microsoft Defe
33
33
34
34
The integration provides comprehensive vulnerability context by combining device vulnerabilities with cloud security findings, enabling better risk assessment and prioritization.
35
35
36
-
### Vulnerability management in Exposure Management
36
+
### Vulnerability Management in Exposure Management
37
37
38
-
The following vulnerability management experiences reside within Exposure Management:
38
+
The following Vulnerability Management experiences reside within Exposure Management:
39
39
40
40
-**Overview dashboard**: Refocused on vulnerabilities only, with a new layout
41
41
-**Vulnerabilities (weaknesses)**: Includes side-by-side Devices and Cloud views
@@ -78,37 +78,35 @@ The following vulnerability management experiences reside within Exposure Manage
78
78
79
79
With the integration of Defender for Cloud in the Defender portal, cloud vulnerability management provides enhanced capabilities:
80
80
81
-
82
81
-**Risk-based prioritization**: For the first time, cloud vulnerabilities are prioritized by risk in the Defender portal, helping focus on what matters most
83
82
-**Multi-cloud support**: Comprehensive coverage across Azure, AWS, and GCP environments in a unified interface
84
83
-**Enhanced visibility**: Integrated view that combines cloud security posture with vulnerability data for better context
85
84
-**Unified dashboard**: Access cloud vulnerabilities alongside device vulnerabilities for complete digital estate visibility
86
85
87
-
88
86
## Recommendations integration
89
87
90
-
The Vulnerability Management recommendations experience is part of the unified recommendations catalog:
88
+
The **Vulnerability Management** recommendations experience is part of the unified recommendations catalog.
91
89
92
90
### Devices Misconfigurations
93
91
94
-
- Source data from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management
95
-
- Contributes to the Devices Secure Score using Microsoft's established calculation methodology
92
+
- Source data from **Vulnerability Management**, Microsoft secure score, and **Exposure Management**
93
+
- Contributes to the Devices secure score using Microsoft's established calculation methodology
96
94
- Enhanced with additional context and capabilities from multiple sources
97
95
98
96
### Devices Vulnerabilities
99
97
100
-
- Maintains the same exposure score and prioritization logic customers know from Vulnerability Management
98
+
- Maintains the same exposure score and prioritization logic customers know from **Vulnerability Management**
101
99
- Preserves familiar structure and workflows for vulnerability management teams
102
100
- Integrated into the unified experience while maintaining specialized focus
103
101
104
102
## Migration considerations
105
103
106
104
### What stays the same
107
105
108
-
-**Core functionality**: All essential Vulnerability Management capabilities remain available
106
+
-**Core functionality**: All essential **Vulnerability Management** capabilities remain available
109
107
-**Data and scoring**: Exposure scores and vulnerability data remain unchanged
110
108
-**Workflows**: Existing remediation and management processes are preserved
111
-
-**Permissions**: Current Vulnerability Management role assignments continue to work
109
+
-**Permissions**: Current **Vulnerability Management** role assignments continue to work
112
110
113
111
### What's enhanced
114
112
@@ -121,15 +119,15 @@ The Vulnerability Management recommendations experience is part of the unified r
121
119
122
120
### For existing Vulnerability Management users
123
121
124
-
1.**Access your data**: Navigate to Exposure Management in the Defender portal
122
+
1.**Access your data**: Navigate to **Exposure Management** in the Defender portal
125
123
1.**Explore the new layout**: Familiarize yourself with the integrated dashboard
126
-
1.**Review unified recommendations**: Check the Devices tab in the recommendations page
124
+
1.**Review unified recommendations**: Check the **Devices** tab in the **Recommendations** page
127
125
1.**Leverage cloud integration**: If you have Defender for Cloud, explore the Cloud vulnerabilities view
128
126
129
127
### For new users
130
128
131
129
1.**Review prerequisites**: Ensure you have appropriate licensing and permissions
132
-
1.**Start with overview**: Use the Vulnerability Management overview dashboard to understand your exposure
130
+
1.**Start with overview**: Use the **Vulnerability Management** overview dashboard to understand your exposure
133
131
1.**Explore recommendations**: Navigate to the unified recommendations for actionable insights
134
132
1.**Set up cloud integration**: Consider Defender for Cloud for comprehensive vulnerability coverage
135
133
@@ -139,3 +137,4 @@ The Vulnerability Management recommendations experience is part of the unified r
139
137
-[Explore attack paths with integrated vulnerability context](work-attack-paths-overview.md)
140
138
-[Manage critical assets across devices and cloud](critical-asset-management.md)
141
139
-[Learn about the unified Secure Score experience](compare-secure-score-security-exposure-management.md)
140
+
-[Learn more about Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
0 commit comments