Prejsť na hlavný obsah

Tento prehliadač už nie je podporovaný.

Inovujte na Microsoft Edge a využívajte najnovšie funkcie, aktualizácie zabezpečenia a technickú podporu.

Stiahnuť Microsoft Edge Ďalšie informácie o prehliadačoch Internet Explorer a Microsoft Edge
Čítať v angličtine Upraviť

Zdieľať cez

Facebook x.com LinkedIn E-mail

Microsoft Defender Vulnerability Management

Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation.

Overview

Overview

  • What is Microsoft Defender Vulnerability Management?
  • Compare Microsoft Defender Vulnerability Management offerings

Get started

Get started

  • Get Defender Vulnerability Management

Discover and explore inventories

How-To Guide

  • Device inventory
  • Software inventory
  • Browser extensions
  • Certificate inventory
  • Hardware and firmware assessment

Detect and assess threats

How-To Guide

  • Dashboard insights
  • Exposure score
  • Microsoft Secure Score for Devices
  • Security baselines
  • Hunt for exposed devices
  • Authenticated scan for Windows

Identify risk and prioritize remediation

How-To Guide

  • Address security recommendations
  • Network share configuration assessment
  • Exceptions for security recommendations
  • Plan for end-of-support software
  • Mitigate zero-day vulnerabilities
  • Vulnerabilities in my organization
  • Event timeline

Track and mitigate remediation activities

How-To Guide

  • Remediate vulnerabilities
  • Block vulnerable applications
  • Vulnerable devices report
sk-sk
Vaše voľby ochrany osobných údajov
  • AI Disclaimer
  • Predchádzajúce verzie
  • Blog
  • Prispieť
  • Ochrana osobných údajov
  • Podmienky používania
  • Ochranné známky
  • © Microsoft 2025