Microsoft Defender Vulnerability Management

Reduce cybersecurity threats with a risk-based approach to vulnerability management.

Risk-based vulnerability management

Reduce risk with continuous vulnerability assessment, risk-based prioritization, and remediation.

Continuously discover and monitor assets

Eliminate periodic scans with continuous monitoring and alerts. Detect risk even when devices are not connected to the corporate network.

Focus on what matters

Prioritize the biggest vulnerabilities on your most critical assets using Microsoft threat intelligence, breach likelihood predictions, and business contexts.

Track and mitigate risks with ease

Bridge the gap between security and IT teams to seamlessly remediate vulnerabilities with robust contextual recommendations, built-in workflows, and application block capabilities to enable protection faster.

Get comprehensive coverage

Get coverage that works across Linux and macOS, Windows and network devices, and iOS and Android.

Watch the video

See how Defender Vulnerability Management can help your organization reduce cybersecurity risks.

Get ahead of threats

Continuously discover, prioritize, and remediate the biggest risks to organizations across endpoints and cloud workloads.

Key capabilities

Proactively reduce risk to your organization with Defender Vulnerability Management.

Dashboard showing exposure score and recommendations.

Discover vulnerabilities in real time

Detect risk across managed and unmanaged endpoints with built-in-modules and agentless scanners, even when devices aren’t connected to the corporate network.

Software inventory showing a list of applications in Microsoft 365 Security.

Reduce risks with continuous assessments

Eliminate periodic scans and access entity-level inventories of devices, software applications, digital certificates, browser extensions, and firmware assessments.

A list of security recommendations in Microsoft 365 Security.

View prioritized security recommendations

Focus on threats that pose the highest risk with a single view of prioritized recommendations from multiple security feeds.

A list of remediation activities in Microsoft 365 Security

Block vulnerable applications

Proactively block known vulnerable versions of apps or warn users with customized desktop alerts.

A list of blocked apps in Microsoft 365 Security.

Seamlessly remediate and track progress

Connect teams with built-in workflows and integrations. Track progress and trends in real time with remediation tracking and device reports.

Dashboard showing exposure score and recommendations.

Discover vulnerabilities in real time

Detect risk across managed and unmanaged endpoints with built-in-modules and agentless scanners, even when devices aren’t connected to the corporate network.

Software inventory showing a list of applications in Microsoft 365 Security.

Reduce risks with continuous assessments

Eliminate periodic scans and access entity-level inventories of devices, software applications, digital certificates, browser extensions, and firmware assessments.

A list of security recommendations in Microsoft 365 Security.

View prioritized security recommendations

Focus on threats that pose the highest risk with a single view of prioritized recommendations from multiple security feeds.

A list of remediation activities in Microsoft 365 Security

Block vulnerable applications

Proactively block known vulnerable versions of apps or warn users with customized desktop alerts.

A list of blocked apps in Microsoft 365 Security.

Seamlessly remediate and track progress

Connect teams with built-in workflows and integrations. Track progress and trends in real time with remediation tracking and device reports.

Compare plans

For Defender for Endpoint Plan 2 and Microsoft 365 E5 customers

Microsoft Defender Vulnerability Management

Microsoft Defender Vulnerability Management CAD $2.60

user/month

(Includes up to five devices per user; annual subscription—auto renews)

Plus applicable tax

Defender for Endpoint Plan 2 and Microsoft 365 E5 customers can add new advanced vulnerability management tools to their existing subscription with the Defender Vulnerability Management add-on.


Key capabilities:

  • Security baseline assessment
  • Authenticated scans for vulnerability assessment
  • Browser plug-ins assessment
  • Digital certificate assessment
  • Network shares analysis
  • Hardware and firmware assessment
  • Block vulnerable applications

*Requires Defender for Endpoint Plan 2 or Microsoft 365 E5 license.

For other customers, complement your endpoint detection and response (EDR) solution

Microsoft Defender Vulnerability Management standalone (currently in preview)

Complement your EDR solution with the Defender Vulnerability Management standalone to meet your vulnerability management program needs.

Includes all the premium capabilities in the Defender Vulnerability Management add-on, plus:

  • Vulnerability assessment
  • Configuration assessment
  • Continuous monitoring
  • Threat analytics and threat intelligence
  • Risk-based prioritization
  • Remediation tracking

Vulnerability management capabilities in the cloud

Defender Vulnerability Management capabilities are also available in Microsoft Defender for Servers.

Related products

Microsoft Defender for Endpoint

Defender for Endpoint delivers leading endpoint security to rapidly stop attacks, scale your security resources, and evolve your defenses.

Microsoft Secure Score

Microsoft Secure Score provides visibility, assessment, and intelligent guidance to strengthen your security.

Microsoft Defender for Servers

Defender for Servers is a workload protection plan that provides advanced threat protection for servers running in Azure, AWS, GCP, and on premises.

Documentation and latest updates

Protect everything

Make your future more secure. Explore your security options today.

Blade019_protecting everything_872x500.jpg

Defender Vulnerability Management delivers asset visibility, intelligent assessments and prioritization, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices to prioritize and address critical vulnerabilities and misconfigurations across your organization. It provides continuous monitoring and alerts through the agent-based module built into devices and authenticated scanning. Using Microsoft threat intelligence, breach likelihood predictions, business contexts, and device assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk. Automated remediation tools, built-in workflows, and real-time measurements through your organization’s exposure score, Microsoft Secure Score for Devices, and security baseline assessment empower teams to bridge workflow gaps, quickly reduce risk, and track progress across the organization.