Microsoft Defender Vulnerability Management
Reduce cybersecurity threats with a risk-based approach to vulnerability management.
Endpoint and server protection
| Included in Microsoft Defender for Endpoint Plan 2 and Defender for Servers Plan 1Defender Vulnerability Management core capabilities are integrated with endpoint detection and response (EDR) and server protection in Defender for Endpoint Plan 2 and Defender for Servers Plan 1.
| Most popular Microsoft Defender Vulnerability Management Add-onOriginally starting from USD$2.00 now starting from USD$2.00 USD$2.00 USD$2.00 user/month Defender for Endpoint Plan 2 and Microsoft 365 E5 customers can add on premium vulnerability management capabilities for comprehensive endpoint protection, including versions of E5 that do not include Microsoft Teams. | Most popular Included in Defender for Servers Plan 2Premium Defender Vulnerability Management capabilities are included in Defender for Servers Plan 2 for comprehensive server protection.
| Microsoft Defender Vulnerability ManagementOriginally starting from USD$3.00 now starting from USD$3.00 USD$3.00 USD$3.00 user/month Complement other EDR solutions with comprehensive vulnerability management. |
Included in Microsoft Defender for Endpoint Plan 2 and Defender for Servers Plan 1 | Microsoft Defender Vulnerability Management add-on | Included in Defender for Servers Plan 2 | Microsoft Defender Vulnerability Management Standalone | |
---|---|---|---|---|
| ||||
Defender Vulnerability Management core capabilities | | | | |
Device discovery | | | | |
Device inventory | | | | |
Vulnerability assessment | | | | |
Configuration assessment | | | | |
Risk-based prioritization | | | | |
Remediation tracking | | | | |
Continuous monitoring | | | | |
Software inventory | | | | |
Software usages insights | | | | |
Defender Vulnerability Management premium capabilities | | | | |
Security baselines assessment | | | | |
Block vulnerable applications | | | | |
Browser extensions assessment | | | | |
Digital certificate assessment | | | | |
Network share analysis | | | | |
Hardware and firmware assessment | | | | |
Authenticated scan for Windows | | | | |
Cloud workload protection
Microsoft Defender Cloud Security Posture Management
Included in Defender Cloud Security Posture Management (Defender CSPM) in Microsoft Defender for Cloud at no additional cost
Remediate your most critical risk with advanced vulnerability management capabilities for multicloud servers and containers in Defender CSPM.
- Use built-in and agentless scanners to discover vulnerabilities and misconfigurations in near real time.
- Reduce cyber risk with vulnerability and misconfiguration assessments, software inventories, and usage insights.
- Quickly prioritize your biggest risks in a single view with integrated CVE details.
- Seamlessly remediate your biggest vulnerabilities with built-in workflows and remediation tracking.
Get started with Defender Vulnerability Management
Make your future more secure. Explore your security options today.
Follow Microsoft Security