• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

Microsoft Releases New Defender Vulnerability Management Tool In Public Preview

Microsoft says Defender Vulnerability Management includes the company's full set of vulnerability management capabilities.

May 13, 2022 Zachary Comeau Leave a Comment

Microsoft Defender Vulnerability Management
stock.adobe.com/monticellllo

Microsoft is releasing a public preview of Microsoft Defender Vulnerability Management, a new single solution that includes Microsoft’s full set of vulnerability management capabilities to help companies mitigate software bugs more easily.

According to Microsoft, the new Defender feature builds on core threat and vulnerability management tools launched in 2019, including threat and vulnerability management features in Microsoft Defender Advanced Threat Protection.

Microsoft Defender Vulnerability Management will be available in public preview as both a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers, the Redmond, Wash. company says in a Tech Community blog.

Microsoft says Defender Vulnerability Management features Microsoft’s full suite of vulnerability management capabilities, as well as consolidated asset inventories, expanded coverages and other new capabilities. Those new capabilities include security baseline assessments, browser extension assessments, digital certificate assessments, network shares analysis, blocking vulnerable applications and vulnerability assessment for unmanaged endpoints.

“For customers looking for a proactive, risk-based vulnerability management solution, Microsoft Defender Vulnerability Management helps you efficiently discover, assess, and remediate vulnerabilities and misconfigurations in one place,” Microsoft says. “Get continuous asset visibility, consolidated inventories, intelligent assessment tools, risk-based prioritization, and built-in remediation workflows.”

For current Defender for Endpoint Plan 2 customers, the add-on option can enhance their vulnerability management program with consolidated inventories, expanded asset coverage, cross-platform support and new assessment and mitigation tools. It also retains existing vulnerability management tools currently generally available, including device discovery and inventory, vulnerability assessments, configuration assessments, continuous monitoring, threat analytics and intelligence, risk-base prioritization and remediation tracking.

Currently, security baseline assessments to proactively manage an organization’s security posture, browser extension inventory and assessments, and digital certificate inventory and assessments, and network shares analysis are currently available via the public preview.

The ability to block vulnerable applications while they are being remediated is currently in beta. This allows admins to block specific versions of applications for certain device groups that are known to contain vulnerabilities. Admins can also view devices impacted by the security bug, view file indicators created by the mitigation and export the full list of SHA 256 indicators created by a mitigation for reporting and validation.

Coming soon is a vulnerability assessment tool for unmanaged endpoints that remotely scans unmanaged Windows devices for vulnerabilities and targets the devices by IP or range. Admins can use the tool to provide posture assessments of unmanage devices and newly discovered unmanaged endpoints.

Read the company’s blog for more information about how to sign up for the public preview.

Tagged With: Cybersecurity, Microsoft, Microsoft Defender, Vulnerability Management

Related Content:

  • XorDdos, Linux DDoS Trojan Watch Out For This Linux DDoS Trojan, Microsoft…
  • CISA, MSP Is Your IT Department Augmented by an MSP?…
  • digital transformation Three Causes of Pervasive Workplace Friction and How…
  • Department of Justice Ethical Hackers DOJ Officially Revises Policy, Will Not Charge Ethical…

Free downloadable guide you may like:

  • The State of the IT Department in 2022

    The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to making business decisions. Check out our new report to see what your peers in IT think about top concerns and opportunities in 2022.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

Hybrid Work Challenges
The Three Most Common Hybrid Work Challenges Two Years Into the Pandemic

Many of us have been working in a hybrid environment for two years now. Our editors thought this would be a good time to take a look at what’s work...

These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a ...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2022 Emerald X, LLC. All rights reserved.