What's new in Microsoft Defender Vulnerability Management Public Preview
This article provides information about new features and important product updates for the latest release of Microsoft Defender Vulnerability Management public preview.
Tip
Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to sign up for a free trial.
August 2023
Microsoft Defender Vulnerability Management permissions are now integrated with Microsoft 365 Defender Unified role-based access control (RBAC)
You can now control access and grant granular permissions for Microsoft Defender Vulnerability Management as part of the Microsoft 365 Defender Unified RBAC model. For more information, see Microsoft Defender 365 Unified role-based access control (RBAC). You can add the new permissions to a custom role by selecting them from the Security posture permissions group when creating the role. For more information, see Create custom roles with Microsoft 365 Defender Unified RBAC.
Microsoft Defender Vulnerability Management Standalone is now Generally Available
To learn more about what's included in Microsoft Defender Vulnerability Management plans, see Compare Microsoft Defender Vulnerability Management plans and capabilities.
March 2023
Microsoft Defender Vulnerability Management add-on is now Generally Available. This includes consolidated inventories, new assessments, and mitigation tools to further enhance your vulnerability management program. To learn more about what's included in Microsoft Defender Vulnerability Management plans, see Compare Microsoft Defender Vulnerability Management plans and capabilities.
December 2022
Vulnerability assessment of apps on Microsoft Defender for Endpoint for iOS is now Generally Available. Defender for Endpoint on iOS supports vulnerability assessments of apps only for enrolled (MDM) devices. For more details, see Configure vulnerability assessment of apps.
October 2022
Several Linux platforms have high numbers of CVEs that are reported in official channels as not having a fix available (Red Hat, CentOS, Debian, and Ubuntu). This results in a high volume of non-actionable CVEs appearing in Microsoft Defender Vulnerability Management.
To address this, Defender Vulnerability Management will no longer report such CVEs on the above Linux platforms. The new behavior may lead to reporting of fewer exposed devices and lower organization exposure score.
September 2022
- Vulnerability assessment of apps on Microsoft Defender for Endpoint for iOS is now in public preview. Defender for Endpoint on iOS supports vulnerability assessments of apps only for enrolled (MDM) devices. For more information, see Configure vulnerability assessment of apps. If you are interested in participating in the preview, share your tenant name and ID with us at: mdatpmobile@microsoft.com.
August 2022
Defender Vulnerability Management is now supported for Amazon Linux 2 and Fedora 33 or higher.
Browser extensions APIs
You can now use the new browser extensions APIs to view all browser extensions installed in your organization, including installed versions, permissions requested, and associated risk.Extended software inventory API support for non product code software
A new API is now available and returns all the data for installed software that doesn't have a Common Platform Enumeration(CPE). The information returned by this API, along with the information returned by the Export software inventory assessment API, for software that does have a CPE, gives you full visibility into the software installed across your organization and the devices it's installed on.
May 2022
- Security baselines assessment: Create and manage baseline profiles to monitor the posture of your devices against their desired security state.
- Blocking vulnerable applications: Give security admins the ability to block all currently known vulnerable versions of an application.
- Browser extensions assessment: View all browser extensions installed on devices in your organization, including installed versions, permissions requested, and associated risk.
- Digital certificates assessment: View certificate details on devices in your organization, including expiration date, algorithm used, and key size.
- Network shares analysis: View information about exposed network shares and the recommendations that can help protect against vulnerabilities that could be exploited by attackers.
For more information on what's new with other Microsoft Defender security products, see:
Feedback
Submit and view feedback for