Skip to content

Commit 0ce3600

Browse files
authored
Merge pull request #54232 from MicrosoftDocs/NEW-configure-defender-vulnerability-management
Request to push from release branch to main
2 parents 15ef1ce + 20d9324 commit 0ce3600

18 files changed

Lines changed: 499 additions & 0 deletions
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-defender-vulnerability-management.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: "Introduction"
7+
ms.date: 04/06/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
durationInMinutes: 2
12+
content: |
13+
[!include[](includes/1-introduction.md)]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-defender-vulnerability-management.explore-vulnerability-management-integration-defender-servers
3+
title: Explore Microsoft Defender Vulnerability Management (MDVM) integration with Defender for Servers
4+
metadata:
5+
title: Explore MDVM Integration with Defender for Servers
6+
description: "Explore how Microsoft Defender Vulnerability Management integrates with Defender for Servers Plan 1 and Plan 2, comparing agent-based and agentless scanning approaches and the plan capability matrix for Azure VMs."
7+
ms.date: 04/06/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
durationInMinutes: 8
12+
content: |
13+
[!include[](includes/2-explore-vulnerability-management-integration-defender-servers.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-defender-vulnerability-management.configure-vulnerability-scanning-azure-vms
3+
title: Configure vulnerability scanning for Azure VMs
4+
metadata:
5+
title: Configure Vulnerability Scanning for Azure VMs
6+
description: "Configure vulnerability scanning for Azure VMs at subscription and machine scope using Defender for Cloud Environment Settings, including scanning method selection and fixing per-machine coverage gaps via security recommendations."
7+
ms.date: 04/06/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
durationInMinutes: 6
12+
content: |
13+
[!include[](includes/3-configure-vulnerability-scanning-azure-vms.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-defender-vulnerability-management.review-manage-vulnerability-findings
3+
title: Review and manage vulnerability findings
4+
metadata:
5+
title: Review and Manage Vulnerability Findings
6+
description: "Review vulnerability findings and CVE details in the Microsoft Defender portal, create disable rules to manage accepted risks, and export findings using Azure Resource Graph."
7+
ms.date: 04/06/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
durationInMinutes: 7
12+
content: |
13+
[!include[](includes/4-review-manage-vulnerability-findings.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-defender-vulnerability-management.apply-premium-vulnerability-management-capabilities
3+
title: Apply Plan 2 premium MDVM capabilities
4+
metadata:
5+
title: Apply Plan 2 Premium MDVM Capabilities
6+
description: "Apply Defender for Servers Plan 2 premium capabilities including security baselines assessment using CIS and STIG benchmarks, baseline exception management, and Block Vulnerable Applications configuration for Azure VM device groups."
7+
ms.date: 04/06/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
durationInMinutes: 7
12+
content: |
13+
[!include[](includes/5-apply-premium-vulnerability-management-capabilities.md)]
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-defender-vulnerability-management.knowledge-check
3+
title: Knowledge check
4+
metadata:
5+
title: Knowledge check
6+
description: "Knowledge check"
7+
ms.date: 04/06/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
module_assessment: true
12+
ai_generated_module_assessment: false
13+
durationInMinutes: 3
14+
quiz:
15+
title: ""
16+
questions:
17+
- content: "Which vulnerability scanning method is available in both Defender for Servers Plan 1 and Plan 2?"
18+
choices:
19+
- content: "Agentless scanning using periodic disk snapshots"
20+
isCorrect: false
21+
explanation: "Agentless scanning is available in Defender for Servers Plan 2 only. Plan 1 doesn't include agentless scanning."
22+
- content: "Agent-based scanning via the Defender for Endpoint sensor"
23+
isCorrect: true
24+
explanation: "Agent-based scanning uses the Defender for Endpoint sensor and is available in both Plan 1 and Plan 2. It provides near-real-time vulnerability detection on VMs where the sensor is deployed."
25+
- content: "Bring-your-own-license (BYOL) scanning using Qualys or Rapid7"
26+
isCorrect: false
27+
explanation: "BYOL scanner integration doesn't require a Defender for Servers plan at all. It isn't a capability that differentiates Plan 1 from Plan 2."
28+
- content: "You need to enable vulnerability scanning for a subscription that has Defender for Servers already active. Where do you configure the Vulnerability assessment toggle in the Azure portal?"
29+
choices:
30+
- content: "Defender for Cloud > Regulatory compliance > Compliance standards"
31+
isCorrect: false
32+
explanation: "Regulatory compliance is used for evaluating compliance against security standards. Vulnerability assessment configuration is managed through Environment settings."
33+
- content: "Defender for Cloud > Recommendations > Machines should have a vulnerability assessment solution"
34+
isCorrect: false
35+
explanation: "This recommendation addresses per-machine gaps, not the subscription-level vulnerability assessment configuration. Subscription-level settings are in Environment settings."
36+
- content: "Defender for Cloud > Environment settings > subscription > Defender for Servers plan Settings > Settings and monitoring"
37+
isCorrect: true
38+
explanation: "The Vulnerability assessment toggle is in Defender for Cloud > Environment settings > select subscription > Monitoring coverage column > Defender for Servers Settings > Settings and monitoring. From there, select Edit configuration to choose your scanning method."
39+
- content: "Contoso Manufacturing wants to suppress vulnerability findings for software managed by an external vendor under a contractual security agreement. Which criteria can they specify in a Defender for Cloud disable rule?"
40+
choices:
41+
- content: "Categories, CVEs, CVSS scores, minimum severity, and patchable status"
42+
isCorrect: true
43+
explanation: "Disable rules support filtering by finding IDs, CVEs, categories, security check text, CVSS2 and CVSS3 scores (1-10), minimum severity (Medium or High), and patchable status. Categories can be used to exclude findings associated with specific software categories."
44+
- content: "Resource group name, VM operating system, and Azure region"
45+
isCorrect: false
46+
explanation: "Disable rules filter findings by vulnerability attributes such as CVE identifiers, severity, and CVSS scores—not by resource metadata like resource group, OS version, or region."
47+
- content: "Subscription ID, deployment date, and patch release version"
48+
isCorrect: false
49+
explanation: "These criteria aren't available in Defender for Cloud disable rules. Disable rules work with vulnerability attributes such as finding IDs, CVEs, categories, and severity levels."
50+
- content: "What prerequisite must be met on an Azure VM before you can use Block Vulnerable Applications?"
51+
choices:
52+
- content: "The VM must have a network security group with outbound rules restricting internet access"
53+
isCorrect: false
54+
explanation: "Network security group configuration isn't a prerequisite for Block Vulnerable Applications. The requirement is related to the endpoint protection agent on the VM."
55+
- content: "Microsoft Defender Antivirus must be in active mode on the VM"
56+
isCorrect: true
57+
explanation: "Block Vulnerable Applications has three mandatory requirements: Microsoft Defender Antivirus must be in active mode, cloud-delivered protection must be enabled, and Allow or block file must be turned on in Advanced features. For VMs where Defender Antivirus is in passive mode, this feature doesn't apply."
58+
- content: "The VM must be onboarded to Azure Automanage and assigned a configuration profile"
59+
isCorrect: false
60+
explanation: "Azure Automanage isn't a prerequisite for Block Vulnerable Applications. The feature requires Microsoft Defender Antivirus in active mode and is available through Defender for Servers Plan 2."
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-defender-vulnerability-management.summary
3+
title: Summary
4+
metadata:
5+
title: Summary
6+
description: "Summary"
7+
ms.date: 04/06/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
durationInMinutes: 2
12+
content: |
13+
[!include[](includes/7-summary.md)]
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
Contoso Manufacturing operates a large Azure environment with hundreds of Windows Server VMs running production line automation, supply chain management, and ERP workloads. After Contoso enables Microsoft Defender for Servers across their subscriptions, the Cloud Security Engineering team discovers they have no consistent visibility into software vulnerabilities across VM fleets. Some VMs are covered by agent-based scanning through the Defender for Endpoint integration, while others have no scanner deployed. The team can see security recommendations in Defender for Cloud but can't tell which Common Vulnerabilities and Exposures (CVEs) affect which machines. They also can't demonstrate Center for Internet Security (CIS) benchmark compliance with internal auditors or enforce security baselines across their Windows Server fleet.
2+
3+
Microsoft Defender Vulnerability Management (MDVM) provides built-in vulnerability scanning and security baseline assessment for Azure VMs when integrated with Defender for Servers. In this module, you configure MDVM settings to address Contoso's visibility gaps, review vulnerability findings, and enforce compliance policies.
4+
5+
**In this module, you:**
6+
7+
- Explore how Microsoft Defender Vulnerability Management integrates with Defender for Servers Plan 1 and Plan 2 to provide agent-based and agentless vulnerability scanning for Azure VMs
8+
- Configure vulnerability scanning for Azure VMs at subscription and machine scope using Defender for Cloud Environment Settings
9+
- Review vulnerability findings, interpret CVE and severity data, and create disable rules to manage accepted risks in the Defender portal
10+
- Apply Defender for Servers Plan 2 premium capabilities—security baselines assessment and application blocking—to enforce VM security posture
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
Contoso Manufacturing enabled Defender for Servers across their Azure VM fleet, but inconsistent agent deployment means some machines have rich vulnerability data while others remain invisible. Microsoft Defender Vulnerability Management (MDVM) is natively integrated into Defender for Servers and provides continuous vulnerability scanning—but the scanning method, coverage depth, and premium features depend on which plan tier you use and whether VMs have the Defender for Endpoint agent deployed. Here, you explore how MDVM integrates with Defender for Servers, compare agent-based and agentless scanning approaches, and understand which capabilities unlock at each plan tier.
2+
3+
| Scanning Approach | Availability | How It Works |
4+
|-------------------|--------------|--------------|
5+
| Agent-based | Plan 1 and Plan 2 | Uses the Defender for Endpoint sensor deployed on VMs for near-real-time vulnerability detection |
6+
| Agentless | Plan 2 only | Scans VMs without requiring agent installation, providing visibility even for unmanaged machines |
7+
8+
## Explore how MDVM integrates with Defender for Servers
9+
10+
MDVM is automatically enabled when you activate Defender for Servers. MDVM gives you continuous vulnerability scanning across Azure VMs, on-premises machines connected through Azure Arc, and multicloud VMs from AWS or GCP. For Contoso Manufacturing's scenario, every Windows Server VM in their production automation, supply chain, and ERP environments gets scanned without manual configuration. While this module focuses on Windows Server VMs, MDVM vulnerability scanning also supports macOS and a broad range of Linux distributions for organizations with mixed-OS environments.
11+
12+
MDVM delivers four core capabilities that transform raw vulnerability data into actionable security intelligence.
13+
14+
| Feature | Description |
15+
|---------|-------------|
16+
| **Continuous asset discovery** | Tracks every software package, application, and service running on your servers. |
17+
| **Risk-based intelligent prioritization** | Ranks vulnerabilities by combining Common Vulnerabilities and Exposures (CVE) severity scores with active threat intelligence and breach likelihood predictions, so your team focuses on exploitable risks rather than theoretical weaknesses. |
18+
| **CVE-linked findings** | Provides detailed remediation guidance for each vulnerability, including software version upgrades, patches, or configuration changes. |
19+
| **Remediation tracking** | Monitors progress across your VM fleet, showing which vulnerabilities remain open and which teams own responsibility for fixes. |
20+
21+
The integration happens at the infrastructure layer rather than requiring separate licensing or configuration. When Defender for Cloud deploys the Defender for Endpoint agent on a VM, MDVM scanning activates automatically. For VMs without agents, Plan 2 customers benefit from agentless scanning that operates transparently in the background.
22+
23+
## Compare agent-based and agentless scanning approaches
24+
25+
:::image type="content" source="../media/agent-versus-agentless.png" alt-text="Diagram comparing agent-based and agentless vulnerability scanning paths in Defender for Servers, showing how each method collects data and reports findings to Defender for Cloud.":::
26+
27+
Defender for Servers supports two distinct scanning methods, each optimized for different deployment scenarios and visibility requirements. Understanding which approach applies to your VMs determines how fresh your vulnerability data is and which machines appear in your security dashboard.
28+
29+
**Agent-based scanning** uses the **Microsoft Defender for Endpoint (MDE)** sensor that Defender for Cloud automatically deploys on your VMs. This sensor runs continuously on the machine, monitoring software installations, configuration changes, and system behavior in near-real-time. When a new CVE is published or software is updated, the agent detects the change within minutes. The agent reports findings to Defender for Cloud. Agent-based scanning is available in **both Plan 1 and Plan 2**, making it the baseline scanning method for all Defender for Servers customers. For Contoso Manufacturing's production VMs that already have MDE deployed, this approach provides the richest and freshest vulnerability data.
30+
31+
> [!NOTE]
32+
> Enabling Defender for Servers (Plan 1 or Plan 2) includes a bundled Microsoft Defender for Endpoint Plan 2 license for your servers—you don't need a separate MDE subscription. When you enable Defender for Servers, MDE integration is turned on by default, and the agent is automatically provisioned on supported VMs.
33+
34+
**Agentless scanning** operates without requiring any software installation on target VMs. Defender for Cloud takes periodic snapshots of VM disks and analyzes the file system, registry, and installed software inventory offline. This approach discovers vulnerabilities even on VMs that aren't connected to the corporate network, have no agents deployed, or run in isolated environments. Agentless scanning is **exclusive to Plan 2**, extending visibility to machines that fall outside your agent footprint. For Contoso Manufacturing's development VMs or temporary workloads that don't justify agent deployment, agentless scanning fills critical visibility gaps.
35+
36+
When both scanning methods are available on the same VM, Defender for Cloud applies a priority rule: **agent-based results take precedence** because they're fresher and more detailed. If a machine has both MDE agent installed and agentless scanning enabled, you see agent-based findings in your dashboard. If a machine lacks the MDE agent, Defender for Cloud automatically scans it agentlessly (Plan 2 only), ensuring no VM goes unmonitored. Organizations using BYOL scanners from Qualys or Rapid7 follow a similar priority—partner agent results appear for machines with those agents installed, while agentless MDVM results fill gaps for machines without partner coverage.
37+
38+
## Evaluate Defender for Servers plan tiers and MDVM features
39+
40+
Defender for Servers offers two plan tiers with distinctly different MDVM capabilities. Choosing between Plan 1 and Plan 2 affects not just scanning methods, but the depth of security insights you receive.
41+
42+
**Plan 1** provides foundational vulnerability management through agent-based scanning. Every VM with the Defender for Endpoint sensor gets continuous monitoring, configuration assessment, risk-based prioritization, remediation tracking, software inventory, and software usage insights. This tier gives Contoso Manufacturing's security team everything they need to identify and remediate critical vulnerabilities across their production Windows Server fleet. The limitation is coverage: VMs without agents remain invisible, and advanced assessment features aren't available.
43+
44+
**Plan 2** includes everything in Plan 1 plus agentless scanning and six advanced assessment capabilities that compliance-focused organizations require. **Security baselines assessment** evaluates VMs against CIS Benchmarks and DISA STIG standards, generating compliance scores for audit reporting. **Block vulnerable applications** lets you prevent execution of software with known critical vulnerabilities until patches are applied. **Digital certificate assessment** identifies expired or weak certificates that create authentication risks. **Browser extensions assessment** discovers risky or malicious browser plugins on server VMs. **Network share analysis** maps exposed file shares and their permissions. **Hardware and firmware assessment** detects vulnerabilities in BIOS, UEFI, and hardware components that software-only scanners miss.
45+
46+
For Contoso Manufacturing, the choice depends on coverage requirements and compliance obligations. If their Compliance Manager needs CIS Benchmark scores for audit reports or their security policies require blocking vulnerable applications, Plan 2 is essential. If their cloud security engineer simply needs vulnerability visibility across the entire VM fleet—including development and temporary workloads—Plan 2's agentless scanning extends coverage without operational overhead.
47+
48+
| Feature | Plan 1 | Plan 2 |
49+
|---------|--------|--------|
50+
| Agent-based vulnerability scanning | Supported | Supported |
51+
| Agentless vulnerability scanning | - | Supported |
52+
| Configuration assessment | Supported | Supported |
53+
| Risk-based prioritization | Supported | Supported |
54+
| Remediation tracking | Supported | Supported |
55+
| Software inventory | Supported | Supported |
56+
| Software usage insights | Supported | Supported |
57+
| Security baselines assessment (CIS/STIG) | - | Supported |
58+
| Block vulnerable applications | - | Supported |
59+
| Digital certificate assessment | - | Supported |
60+
| Browser extensions assessment | - | Supported |
61+
| Network share analysis | - | Supported |
62+
| Hardware and firmware assessment | - | Supported |
63+
64+
Organizations with existing Qualys or Rapid7 deployments can integrate BYOL (bring your own license) scanners with Defender for Cloud instead of using integrated MDVM scanning. BYOL scanners report findings to their own management platforms, which feed vulnerability data back to Defender for Cloud's security dashboard. This option doesn't require a paid Defender for Servers plan, though you lose access to MDVM's premium features like security baselines assessment and remediation tracking. This module focuses on the integrated MDVM experience rather than BYOL scenarios.

0 commit comments

Comments
 (0)