Compare Microsoft Defender Vulnerability Management offerings

Important

Some information in this article relates to prereleased products/services that might be substantially modified before they are commercially released. Microsoft makes no warranties, express or implied, for the information provided here.

Applies to

Note

Microsoft Defender Vulnerability Management, a new standalone offering will provide the complete set of vulnerability tools and capabilities discussed in this article. To learn more, go to What is Microsoft Defender Vulnerability Management.

Note

Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the Microsoft Defender Vulnerability Management public preview trial.

This article helps clarify what Defender Vulnerability Management capabilities are included in the following plans:

Defender Vulnerability Management

Core capabilities part of Defender for Endpoint Plan 2

Defender Vulnerability Management add-on

Additional capabilities for Defender for Endpoint Plan 2

Defender Vulnerability Management Standalone

Full vulnerability Management capabilities

Device discovery

Device inventory

Vulnerability assessment

Configuration assessment

Risk based prioritization

Remediation tracking

Continuous monitoring

Software assessment

Software usages insights

Security baselines assessment

Block vulnerable applications

Browser extensions

Digital certificate assessment

Network share analysis

Device discovery

Device inventory

Vulnerability assessment

Continuous monitoring

Risk based prioritization

Remediation tracking

Configuration assessment

Software assessment

Software usages insights

Security baselines assessment

Block vulnerable applications

Browser extensions

Digital certificate assessment

Network share analysis

Note

Microsoft 365 Business Premium and the standalone version of Microsoft Defender for Business include the capabilities that are listed under Core capabilities part of Defender for Endpoint Plan 2 in the preceding table.

Next steps