Please login to see the price
Article-No.:
206494
Manufacturer-No.:
CFQ7TTC0JPGV:0002
EAN/GTIN:
Technical specifications
General
Category
Online & appliance based services
Packaged Quantity
1
Software Family
Microsoft Family
Other
Software
License Type
Subscription license
License Qty
1 user
Licensing Program
Microsoft New Commerce Experience (NCE)
License Category
Subscription license
Description
Reducing cyber risk requires comprehensive risk-based vulnerability management to identify, assess, remediate, and track all your biggest vulnerabilities across your most critical assets, all in a single solution. Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk. With Defender Vulnerability Management, you can empower your security and IT teams to bridge workflow gaps and prioritize and address critical vulnerabilities and misconfigurations across your organization.
- Security baselines assessment
Create customizable baseline profiles to measure risk compliance against established benchmarks, such as, Center for Internet Security (CIS) and Security Technical Implementation Guides (STIG). - Visibility into software and vulnerabilities
Get a view of the organization's software inventory, and software changes like installations, uninstalls, and patches. - Network share assessment
Assess vulnerable internal network shares configuration with actionable security recommendations. - Authenticated scan for Windows
Scan unmanaged Windows devices regularly for software vulnerabilities by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices. - Threat analytics and event timelines
Use event timelines, and entity-level vulnerability assessments to understand and prioritize vulnerabilities. - Browser extensions assessment
View a list of the browser extensions installed across different browsers in your organization. View information on an extension's permissions and associated risk levels. - Digital certificates assessment
View a list of certificates installed across your organization in a single central certificate inventory page. Identify certificates before they expire and detect potential vulnerabilities due to weak signature algorithms. - Hardware and firmware assessment
View a list of known hardware and firmware in your organization organized by system models, processors, and BIOS. Each view includes details such as the name of the vendor, number of weaknesses, threats insights, and the number of exposed devices.
There is no liability or guarantee that all information is complete, correct and up to date at all times.