Cybersecurity, threat intelligence, and vulnerability protection are critical to my business. I implemented this solution to ensure I have the best protection for my endpoints.
I usually use it in Defender for endpoint side, such as within the 365 Defender umbrella, Defender for Vulnerability Management. I onboard devices of the organization with the help of Intune or MDM Management. I take care of scanning and doing vulnerability assessments, looking for any future or upcoming vulnerabilities on the devices for the endpoint perspective. Additionally, I use the attack surface reduction rules to take care of Defender for endpoint security.
Technical Support Lead at a computer software company with 5,001-10,000 employees
Real User
Top 20
2024-01-24T08:00:00Z
Jan 24, 2024
We use the solution, and we also suggest it to customers. It is used for vulnerability management and patch management. It can also be used for automatically deploying patches. It is used for threat detection and response.
In our company, we have integrated the entire Microsoft Defender Vulnerability Management into one of our products, and we basically get involved in the process of remediating vulnerabilities as we find them on our Windows-based machines.
As a managed security service provider, I deliver patch management, security configuration updates, and overall security, including using Defender and other toolsets and solutions for my clients. Microsoft Defender Vulnerability Management is evolving to conduct vulnerability assessments of endpoints and configurations, particularly within cloud incidents like Office 365. Microsoft's Security Scorecard, integrated with Defender, provides a dynamic measure of the security profile, guiding users on necessary enhancements such as patching and security configurations. Defender continually monitors patching status, ensuring machines are up-to-date and possess the latest security configurations. This integration provides a comprehensive approach to security within the Microsoft environment.
Learn what your peers think about Microsoft Defender Vulnerability Management. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
Principal Consultant Cyber Security at a computer software company with 501-1,000 employees
Consultant
Top 10
2023-08-02T02:53:00Z
Aug 2, 2023
We use Microsoft Defender Vulnerability Management to identify vulnerabilities and determine which applications are vulnerable in the environment. It finds out the specific updates missing on endpoints. There are several auto-investigation techniques available in the product.
Microsoft Defender Vulnerability Management enables organizations to identify vulnerabilities, manage patches, and fortify threat detection. It offers endpoint assessments, cloud incident management, and dynamic security through Microsoft's Security Scorecard integration.Organizations leverage Microsoft Defender Vulnerability Management for advanced threat detection and response. It provides robust tools for vulnerability assessment and cloud incident management, integrated with Microsoft's...
Cybersecurity, threat intelligence, and vulnerability protection are critical to my business. I implemented this solution to ensure I have the best protection for my endpoints.
I usually use it in Defender for endpoint side, such as within the 365 Defender umbrella, Defender for Vulnerability Management. I onboard devices of the organization with the help of Intune or MDM Management. I take care of scanning and doing vulnerability assessments, looking for any future or upcoming vulnerabilities on the devices for the endpoint perspective. Additionally, I use the attack surface reduction rules to take care of Defender for endpoint security.
We use the solution, and we also suggest it to customers. It is used for vulnerability management and patch management. It can also be used for automatically deploying patches. It is used for threat detection and response.
In our company, we have integrated the entire Microsoft Defender Vulnerability Management into one of our products, and we basically get involved in the process of remediating vulnerabilities as we find them on our Windows-based machines.
As a managed security service provider, I deliver patch management, security configuration updates, and overall security, including using Defender and other toolsets and solutions for my clients. Microsoft Defender Vulnerability Management is evolving to conduct vulnerability assessments of endpoints and configurations, particularly within cloud incidents like Office 365. Microsoft's Security Scorecard, integrated with Defender, provides a dynamic measure of the security profile, guiding users on necessary enhancements such as patching and security configurations. Defender continually monitors patching status, ensuring machines are up-to-date and possess the latest security configurations. This integration provides a comprehensive approach to security within the Microsoft environment.
Microsoft Defender Vulnerability Management is a great tool to prevent and reduce attacks.
We use Microsoft Defender Vulnerability Management to identify vulnerabilities and determine which applications are vulnerable in the environment. It finds out the specific updates missing on endpoints. There are several auto-investigation techniques available in the product.