Reader small image

You're reading from  Microsoft 365 Security and Compliance for Administrators

Product typeBook
Published inMar 2024
PublisherPackt
ISBN-139781837638376
Edition1st Edition
Right arrow
Authors (2):
Sasha Kranjac
Sasha Kranjac
author image
Sasha Kranjac

Sasha Kranjac has been recognized as a Microsoft Regional Director (RD), Microsoft Most Valuable Professional (MVP) in two categories (Azure and Security), he is Microsoft Certified Trainer (MCT), MCT Regional Lead, Certified EC-Council Instructor (CEI), a CompTIA Instructor, speaker at international conferences, user groups, and events, and a book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server. Sasha is the CEO of Kloudatech, an IT training and consulting company, a Microsoft Partner, an AWS Partner, and a CompTIA Authorized Delivery Partner, specialized in cybersecurity, cloud security architecture and IT training. They deliver high quality vendor and custom IT training and PowerClass Workshops internationally. He is also the CEO of Kranjac Consulting and Training, a consulting, training, and engineering company, specialized in civil engineering and CAD design.
Read more about Sasha Kranjac

Omar Kudović
Omar Kudović
author image
Omar Kudović

Omar Kudovic works as a Senior System Engineer in SYS Company d.o.o. Sarajevo. He has a few professional Microsoft certifications, such as Security Expert: Cybersecurity Architect and Azure Enterprise Expert. For the last 12 years, he has been awarded the Microsoft Most Valuable Professional (MVP) in the Office 365 Apps and Services category. For the past few years, he has been actively working on the application of Microsoft Security and Compliance solutions in government and business organizations. Participated as a lecturer at hundreds of IT conferences in the world. In private life, passionate music collector and audiophile.
Read more about Omar Kudović

View More author details
Right arrow

Microsoft Defender Vulnerability Management

In an era where our daily lives are intricately intertwined with the digital realm, safeguarding sensitive data and critical systems has never been more crucial. Enter Microsoft Defender Vulnerability Management—a cybersecurity solution that’s not just smart but also surprisingly user-friendly. Developed by the tech giant Microsoft Corporation, it’s like your organization’s digital guardian, protecting you from the ever-shifting landscape of cyber threats.

Picture this: a world where everything from your personal information to your business’s sensitive data is just a click away from potential hackers and digital mischief-makers. In such a world, robust cybersecurity isn’t just a choice; it’s a necessity, and that’s precisely where Microsoft Defender Vulnerability Management takes center stage. This powerful tool is more than just lines of code and algorithms. It’s like the...

Getting started with Microsoft Defender Vulnerability Management

In the ever-evolving landscape of cybersecurity, organizations need reliable tools to help them identify and address vulnerabilities in their systems and networks. Microsoft Defender Vulnerability Management (MDVM) is a comprehensive solution designed to do just that. One of its key features is the Microsoft Defender Vulnerability Management dashboard, a central hub for tracking and mitigating vulnerabilities. In this article, we will explore the MDVM dashboard and discuss its capabilities, benefits, and how it can enhance an organization’s security posture.

Microsoft Defender Vulnerability Management licensing and technical requirements

MDVM is a component of the broader Microsoft Defender for Endpoint security suite. Licensing for MDVM is typically associated with Microsoft Defender for Endpoint licensing, as MDVM is included as part of that suite. Microsoft offers various licensing options for Microsoft...

Recommendations and remediation

An integral part of the MDVM is the Devices page, placed under the Assets category, where you can view all devices protected with Microsoft Defender for Endpoint—ones for which the software inventories will be assessed by MDVM—and all their details, such as risk and exposure level, tags, incidents and alerts, timeline, security recommendations, and security policies, as well as software inventory, discovered vulnerabilities, and much more.

Important note

More about Microsoft Defender for Endpoint, Devices, and related pages is described in more detail in Chapter 4. In this chapter, we will focus on MDVM features.

Security recommendations

The Security recommendations page contains information about protected devices’ security recommendations, operating system versions and related OS components, the number of weaknesses found, remediation types and activities, impact on the secure score and overall security posture, the...

Inventories and weaknesses

To understand the software landscape throughout your organization’s MDVM, use the Inventories page, where you can dive deeper into browser extensions usage and the state of certificates and firmware vulnerabilities, whereas the Weaknesses page contains a list of common vulnerabilities exploits (CVEs) currently applicable to your environment. Let’s get into more detail about each of these two important MDVM pages.

Inventories

The vulnerability management Inventory page gives you an understanding of the software usage in your organization in the past 30 days. Similar to the Recommendations page, this software usage information page has the same columns, such as weaknesses, threats, vendors, and others, but here, this information is relevant to the median usage of the software rather than to the specific recommendation or a vulnerability:

Figure 7.15 – MDVM inventories page

Figure 7.15 – MDVM inventories page

On the Inventories page, besides...

Summary

MDVM is a cybersecurity solution that helps organizations identify, assess, and remediate vulnerabilities in their IT infrastructure. It integrates with Microsoft Defender for Endpoint and other Microsoft security tools to provide a comprehensive and user-friendly security platform. With Defender Vulnerability Management, you can enable your security and IT teams to work together and focus on the most urgent vulnerabilities and misconfigurations in your organization.

In the next chapter, we will cover Microsoft Defender for Identity, a cloud-based security solution that protects on-premises Active Directory environments from advanced and targeted attacks, monitors user activities, devices, and resources, and detects anomalies and threats using machine learning and behavioral analysis.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Microsoft 365 Security and Compliance for Administrators
Published in: Mar 2024Publisher: PacktISBN-13: 9781837638376
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Authors (2)

author image
Sasha Kranjac

Sasha Kranjac has been recognized as a Microsoft Regional Director (RD), Microsoft Most Valuable Professional (MVP) in two categories (Azure and Security), he is Microsoft Certified Trainer (MCT), MCT Regional Lead, Certified EC-Council Instructor (CEI), a CompTIA Instructor, speaker at international conferences, user groups, and events, and a book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server. Sasha is the CEO of Kloudatech, an IT training and consulting company, a Microsoft Partner, an AWS Partner, and a CompTIA Authorized Delivery Partner, specialized in cybersecurity, cloud security architecture and IT training. They deliver high quality vendor and custom IT training and PowerClass Workshops internationally. He is also the CEO of Kranjac Consulting and Training, a consulting, training, and engineering company, specialized in civil engineering and CAD design.
Read more about Sasha Kranjac

author image
Omar Kudović

Omar Kudovic works as a Senior System Engineer in SYS Company d.o.o. Sarajevo. He has a few professional Microsoft certifications, such as Security Expert: Cybersecurity Architect and Azure Enterprise Expert. For the last 12 years, he has been awarded the Microsoft Most Valuable Professional (MVP) in the Office 365 Apps and Services category. For the past few years, he has been actively working on the application of Microsoft Security and Compliance solutions in government and business organizations. Participated as a lecturer at hundreds of IT conferences in the world. In private life, passionate music collector and audiophile.
Read more about Omar Kudović