Pređite na glavni sadržaj

Ovaj pregledač više nije podržan.

Nadogradite na Microsoft Edge biste iskoristili najnovije funkcije, bezbednosne ispravke i tehničku podršku.

Preuzimanje pregledača Microsoft Edge Više informacija o pregledačima Internet Explorer i Microsoft Edge
Pročitaj na engleskom Uredi

Deli putem

Facebook x.com LinkedIn E-pošta

Microsoft Defender Vulnerability Management

Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation.

Overview

Overview

  • What is Microsoft Defender Vulnerability Management?
  • Compare Microsoft Defender Vulnerability Management offerings

Get started

Get started

  • Get Defender Vulnerability Management

Discover and explore inventories

How-To Guide

  • Device inventory
  • Software inventory
  • Browser extensions
  • Certificate inventory
  • Hardware and firmware assessment

Detect and assess threats

How-To Guide

  • Dashboard insights
  • Exposure score
  • Microsoft Secure Score for Devices
  • Security baselines
  • Hunt for exposed devices
  • Authenticated scan for Windows

Identify risk and prioritize remediation

How-To Guide

  • Address security recommendations
  • Network share configuration assessment
  • Exceptions for security recommendations
  • Plan for end-of-support software
  • Mitigate zero-day vulnerabilities
  • Vulnerabilities in my organization
  • Event timeline

Track and mitigate remediation activities

How-To Guide

  • Remediate vulnerabilities
  • Block vulnerable applications
  • Vulnerable devices report
sr-latn-rs
Vaši izbori privatnosti
  • AI Disclaimer
  • Prethodne verzije
  • Blog
  • Saradnja
  • Privatnost
  • Uslovi korišćenja
  • Žigovi
  • © Microsoft 2025