Learn how to deploy and configure the features of Defender Vulnerability Management across its supported platforms, and how to respond to threats.
Overview
Syllabus
Introduction
- Microsoft Defender Vulnerability Management and cybersecurity risk
- What is Microsoft Defender Vulnerability Management?
- What's included in Microsoft Defender Vulnerability Management?
- What you'll need
- Onboarding devices
- Device inventories
- Software inventories
- Browser extension, certificate, and firmware inventories
- Device discovery modes
- Network device authenticated scan
- Windows authenticated scan
- Managing security recommendations
- Remediation capabilities
- Blocking vulnerable apps
- Secure Score
- MDVM reports and notifications
- Security baselines assessment
- Advanced hunting
- Next steps
Taught by
Ruairidh Campbell