Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info about Internet Explorer and Microsoft Edge
Read in English Edit

Share via

Facebook x.com LinkedIn Email

Microsoft Defender Vulnerability Management

Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation.

Overview

Overview

  • What is Microsoft Defender Vulnerability Management?
  • Compare Microsoft Defender Vulnerability Management offerings

Get started

Get started

  • Get Defender Vulnerability Management

Discover and explore inventories

How-To Guide

  • Device inventory
  • Software inventory
  • Browser extensions
  • Certificate inventory
  • Hardware and firmware assessment

Detect and assess threats

How-To Guide

  • Dashboard insights
  • Exposure score
  • Microsoft Secure Score for Devices
  • Security baselines
  • Hunt for exposed devices
  • Authenticated scan for Windows

Identify risk and prioritize remediation

How-To Guide

  • Address security recommendations
  • Network share configuration assessment
  • Exceptions for security recommendations
  • Plan for end-of-support software
  • Mitigate zero-day vulnerabilities
  • Vulnerabilities in my organization
  • Event timeline

Track and mitigate remediation activities

How-To Guide

  • Remediate vulnerabilities
  • Block vulnerable applications
  • Vulnerable devices report
en-us
Your Privacy Choices
  • AI Disclaimer
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2025