Trace Id is missing
Skip to main content
Microsoft Security

Microsoft Defender Vulnerability Management

Reduce cybersecurity threats with a risk-based approach to vulnerability management.

Endpoint and server protection

  • Partial checkmark icon Partial checkmark icons indicate a feature is partially included
  • Fully checkmark icon Checkmark icons indicate a feature is included

Included in Microsoft Defender for Endpoint Plan 2 and Defender for Servers Plan 1

Defender Vulnerability Management core capabilities are integrated with endpoint detection and response (EDR) and server protection in Defender for Endpoint Plan 2 and Defender for Servers Plan 1.

Most popular

Microsoft Defender Vulnerability Management Add-on

Originally starting from $2.00 now starting from $2.00

$2.00 $2.00

user/month

Defender for Endpoint Plan 2 and Microsoft 365 E5 customers can add on premium vulnerability management capabilities for comprehensive endpoint protection, including versions of E5 that do not include Microsoft Teams.

Most popular

Included in Defender for Servers Plan 2

Premium Defender Vulnerability Management capabilities are included in Defender for Servers Plan 2 for comprehensive server protection.

Microsoft Defender Vulnerability Management

Originally starting from $3.00 now starting from $3.00

$3.00 $3.00

user/month

Complement other EDR solutions with comprehensive vulnerability management.

Included in Microsoft Defender for Endpoint Plan 2 and Defender for Servers Plan 1
Microsoft Defender Vulnerability Management add-on
Included in Defender for Servers Plan 2
Microsoft Defender Vulnerability Management Standalone
  • Partial checkmark icon Partial checkmark icons indicate a feature is partially included
  • Fully checkmark icon Checkmark icons indicate a feature is included
Defender Vulnerability Management core capabilities
This feature is included
This feature is included
This feature is included
Device discovery
This feature is included
This feature is included
This feature is included
Device inventory
This feature is included
This feature is included
This feature is included
Vulnerability assessment
This feature is included
This feature is included
This feature is included
Configuration assessment
This feature is included
This feature is included
This feature is included
Risk-based prioritization
This feature is included
This feature is included
This feature is included
Remediation tracking
This feature is included
This feature is included
This feature is included
Continuous monitoring
This feature is included
This feature is included
This feature is included
Software inventory
This feature is included
This feature is included
This feature is included
Software usages insights
This feature is included
This feature is included
This feature is included
Defender Vulnerability Management premium capabilities
This feature is included
This feature is included
This feature is included
Security baselines assessment
This feature is included
This feature is included
This feature is included
Block vulnerable applications
This feature is included
This feature is included
This feature is included
Browser extensions assessment
This feature is included
This feature is included
This feature is included
Digital certificate assessment
This feature is included
This feature is included
This feature is included
Network share analysis
This feature is included
This feature is included
This feature is included
Hardware and firmware assessment
This feature is included
This feature is included
This feature is included
Authenticated scan for Windows
This feature is included
This feature is included
This feature is included
Back to tabs

Get started with Defender Vulnerability Management

Make your future more secure. Explore your security options today.

 

                            

Follow Microsoft Security