Preskoči na glavni sadržaj

Ovaj preglednik više nije podržan.

Prijeđite na Microsoft Edge, gdje vas čekaju najnovije značajke, sigurnosna ažuriranja i tehnička podrška.

Preuzmi Microsoft Edge Dodatne informacije o preglednicima Internet Explorer i Microsoft Edge
Čitajte na engleskom Uređivanje

Dijeli putem

Facebook x.com LinkedIn E-pošta

Microsoft Defender Vulnerability Management

Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation.

Overview

Overview

  • What is Microsoft Defender Vulnerability Management?
  • Compare Microsoft Defender Vulnerability Management offerings

Get started

Get started

  • Get Defender Vulnerability Management

Discover and explore inventories

How-To Guide

  • Device inventory
  • Software inventory
  • Browser extensions
  • Certificate inventory
  • Hardware and firmware assessment

Detect and assess threats

How-To Guide

  • Dashboard insights
  • Exposure score
  • Microsoft Secure Score for Devices
  • Security baselines
  • Hunt for exposed devices
  • Authenticated scan for Windows

Identify risk and prioritize remediation

How-To Guide

  • Address security recommendations
  • Network share configuration assessment
  • Exceptions for security recommendations
  • Plan for end-of-support software
  • Mitigate zero-day vulnerabilities
  • Vulnerabilities in my organization
  • Event timeline

Track and mitigate remediation activities

How-To Guide

  • Remediate vulnerabilities
  • Block vulnerable applications
  • Vulnerable devices report
hr-hr
Vaši odabiri za zaštitu privatnosti
  • Izjava o odricanju od odgovornosti za umjetnu inteligenciju
  • Prethodne verzije
  • Blog
  • Suradnja
  • Zaštita privatnosti
  • Uvjeti korištenja
  • Zaštitni znakovi
  • © Microsoft 2026