Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info about Internet Explorer and Microsoft Edge
Read in English
Read in English Edit
Twitter LinkedIn Facebook Email

Microsoft Defender Vulnerability Management

Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation.

Overview

Overview

  • What is Microsoft Defender Vulnerability Management?
  • Compare Microsoft Defender Vulnerability Management offerings

Get started

Get Started

  • Get Defender Vulnerability Management

Discover and explore inventories

How-To Guide

  • Device inventory
  • Software inventory
  • Browser extensions
  • Certificate inventory
  • Certificate inventory

Detect and assess threats

How-To Guide

  • Dashboard insights
  • Exposure score
  • Microsoft Secure Score for Devices
  • Security baselines
  • Hunt for exposed devices
  • Authenticated scan for Windows

Identify risk and prioritize remediation

How-To Guide

  • Address security recommendations
  • Network share configuration assessment
  • Exceptions for security recommendations
  • Plan for end-of-support software
  • Mitigate zero-day vulnerabilities
  • Vulnerabilities in my organization
  • Event timeline

Track and mitigate remediation activities

How-To Guide

  • Remediate vulnerabilities
  • Block vulnerable applications
  • Vulnerable devices report
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2023
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2023