Microsoft Defender Vulnerability Management Add-on - subscription license - 1 user

Article-No.:
206494
Manufacturer-No.:
CFQ7TTC0JPGV:0002
Technical specifications

General

Category
Online & appliance based services
Packaged Quantity
1

Software Family

Microsoft Family
Other

Software

License Type
Subscription license
License Qty
1 user
Licensing Program
Microsoft New Commerce Experience (NCE)
License Category
Subscription license
Description
Reducing cyber risk requires comprehensive risk-based vulnerability management to identify, assess, remediate, and track all your biggest vulnerabilities across your most critical assets, all in a single solution. Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk. With Defender Vulnerability Management, you can empower your security and IT teams to bridge workflow gaps and prioritize and address critical vulnerabilities and misconfigurations across your organization.
  • Security baselines assessment
    Create customizable baseline profiles to measure risk compliance against established benchmarks, such as, Center for Internet Security (CIS) and Security Technical Implementation Guides (STIG).
  • Visibility into software and vulnerabilities
    Get a view of the organization's software inventory, and software changes like installations, uninstalls, and patches.
  • Network share assessment
    Assess vulnerable internal network shares configuration with actionable security recommendations.
  • Authenticated scan for Windows
    Scan unmanaged Windows devices regularly for software vulnerabilities by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices.
  • Threat analytics and event timelines
    Use event timelines, and entity-level vulnerability assessments to understand and prioritize vulnerabilities.
  • Browser extensions assessment
    View a list of the browser extensions installed across different browsers in your organization. View information on an extension's permissions and associated risk levels.
  • Digital certificates assessment
    View a list of certificates installed across your organization in a single central certificate inventory page. Identify certificates before they expire and detect potential vulnerabilities due to weak signature algorithms.
  • Hardware and firmware assessment
    View a list of known hardware and firmware in your organization organized by system models, processors, and BIOS. Each view includes details such as the name of the vendor, number of weaknesses, threats insights, and the number of exposed devices.
AlertBrowse fileDownload file