Pereiti prie pagrindinio turinio

Ši naršyklė nebepalaikoma.

Atnaujinkite į „Microsoft Edge“, kad pasinaudotumėte naujausiomis funkcijomis, saugos naujinimais ir techniniu palaikymu.

„Microsoft Edge“ atsisiuntimas Daugiau informacijos apie „Internet Explorer“ ir „Microsoft Edge“
Skaityti anglų kalba Redaguoti

Bendrinti naudojant

„Facebook“ x.com LinkedIn El. paštas

Microsoft Defender Vulnerability Management

Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation.

Overview

Overview

  • What is Microsoft Defender Vulnerability Management?
  • Compare Microsoft Defender Vulnerability Management offerings

Get started

Get started

  • Get Defender Vulnerability Management

Discover and explore inventories

How-To Guide

  • Device inventory
  • Software inventory
  • Browser extensions
  • Certificate inventory
  • Hardware and firmware assessment

Detect and assess threats

How-To Guide

  • Dashboard insights
  • Exposure score
  • Microsoft Secure Score for Devices
  • Security baselines
  • Hunt for exposed devices
  • Authenticated scan for Windows

Identify risk and prioritize remediation

How-To Guide

  • Address security recommendations
  • Network share configuration assessment
  • Exceptions for security recommendations
  • Plan for end-of-support software
  • Mitigate zero-day vulnerabilities
  • Vulnerabilities in my organization
  • Event timeline

Track and mitigate remediation activities

How-To Guide

  • Remediate vulnerabilities
  • Block vulnerable applications
  • Vulnerable devices report
lt-lt
Jūsų privatumo pasirinkimai
  • AI Disclaimer
  • Ankstesnės versijos
  • Tinklaraštis
  • Prisidėti
  • Privatumas
  • Naudojimo sąlygos
  • Prekių ženklai
  • © Microsoft 2025