This is the Trace Id: 01d8c5b78160a559dffa7e311cf5045d
Skip to main content Microsoft Defender Microsoft Entra Microsoft Intune Microsoft Purview Microsoft Security Copilot Microsoft Sentinel View all products AI-powered cybersecurity Cloud security Data security & governance Identity & network access Privacy & risk management Security for AI Small and medium business Unified SecOps Zero Trust Pricing Services Partners Why Microsoft Security Cybersecurity awareness Customer stories Security 101 Product trials How we protect Microsoft Industry recognition Microsoft Security Insider Microsoft Digital Defense Report Security Response Center Microsoft Security Blog Microsoft Security Events Microsoft Tech Community Documentation Technical Content Library Training & certifications Compliance Program for Microsoft Cloud Microsoft Trust Center Security Engineering Portal Service Trust Portal Microsoft Secure Future Initiative Business Solutions Hub Contact Sales Start free trial Microsoft Security Azure Dynamics 365 Microsoft 365 Microsoft Teams Windows 365 Microsoft AI Azure Space Mixed reality Microsoft HoloLens Microsoft Viva Quantum computing Sustainability Education Automotive Financial services Government Healthcare Manufacturing Retail Find a partner Become a partner Partner Network Microsoft Marketplace Software companies Blog Microsoft Advertising Developer Center Documentation Events Licensing Microsoft Learn Microsoft Research View Sitemap

Microsoft Defender Vulnerability Management

Reduce cybersecurity threats with a risk-based approach to vulnerability management.
Light green gradient background
OVERVIEW

Risk-based vulnerability management

Reduce risk with continuous vulnerability assessment, risk-based prioritization, and remediation.
  • Eliminate periodic scans with continuous monitoring and alerts. Detect risks even when endpoints are not connected to the corporate network.
    Person using a large laptop in a dimly lit workspace.
  • Prioritize the biggest vulnerabilities on your most critical assets using Microsoft threat intelligence, breach likelihood predictions, and business contexts.
    Person working on a laptop near a window overlooking buildings.
  • Bridge the gap between security and IT teams to seamlessly remediate vulnerabilities with robust contextual recommendations, built-in workflows, and application block capabilities to enable protection faster.
    Two people sitting in a modern office lounge with laptops and notebooks.
  • Use agent-based or agentless scans across cloud workloads, servers, containers, and endpoints with support for Windows, Linux, macOS, iOS, and Android.
    Person holding a smartphone while wearing a denim jacket in an indoor setting.
How it works

Get ahead of cyberthreats

Continuously discover, prioritize, and remediate the biggest risks to organizations across endpoints and cloud workloads.
Capabilities

Key capabilities

Proactively reduce risk to your organization with Defender Vulnerability Management.
Detect risks across managed and unmanaged endpoints with built-in modules and agentless scanners, even when devices aren’t connected to the corporate network.
Software inventory table in Microsoft Defender
Back to tabs
PLANS AND PRICING

Flexible pricing options

Microsoft Defender Vulnerability Management

 

 

Get proactive protection across different domains including endpoints, servers, and cloud workloads with Defender Vulnerability Management.

Vulnerability management plans

  • For Microsoft Defender for Endpoint Plan 2 customers: Seamlessly enhance your vulnerability management program—without the need for additional agents—using the Defender Vulnerability Management add-on.
  • For Microsoft Defender for Cloud customers: Get agentless vulnerability management for servers, containers, and container registries with Defender Vulnerability Management—natively integrated within Defender for Cloud.
  • For other customers: Complement your existing EDR solution with the Defender Vulnerability Management standalone offering.
Resources

Documentation and latest updates

A person looking into a tab.
Get Started

Protect everything

Make your future more secure. Explore your security options today.

Follow Microsoft Security

English (United States) Consumer Health Privacy Sitemap Contact Microsoft Privacy Manage cookies Terms of use Trademarks Safety & eco Recycling About our ads