Onboard to Microsoft Defender Vulnerability Management
- Microsoft Defender Vulnerability Management
- Microsoft Defender XDR
- Microsoft Defender for Servers Plan 2
To onboard devices to Defender Vulnerability Management you follow the same steps as you would for onboarding devices to Microsoft Defender for Endpoint.
Use this article for guidance on how to onboard devices to Defender Vulnerability Management.
Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to sign up for a free trial.
Onboard devices using any of the supported management tools
To onboard device to Defender Vulnerability Management you'll need to go the onboarding section of the Microsoft Defender portal. Depending on the operating system, you'll be guided on the appropriate steps and the management and deployment tool options available.
This video provides a quick overview of the onboarding process and the different tools and methods.
To start onboarding your devices to Defender Vulnerability Management:
- Go to the Onboarding section in the Microsoft Defender portal.
- Choose the operating system for the devices you wish to onboard.
- Select the Deployment method you plan to use.
- Follow the instructions to onboard your devices.
For more information and steps on how to onboard your devices using the different deployment tools, see Select deployment method.
To offboard device from Defender Vulnerability Management you'll need to go the offboarding section of the Microsoft Defender portal.
For more information on how to offboard your devices, see offboard devices.
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.