Marc Borgers

6. Apr. 20231 Min.

Lesetipp: Verwundbare / unerwünschte Anwendungen mit Microsoft Defender for Endpoint blocken

Jeffry Appel hat einen lesenswerten Blog-Artikel darüber geschrieben, wie man "verwundbare/unerwünschte" Anwendungen mit Defender for Endpoint and Vulnerability Management blocken kann: Block "vulnerable/unwanted" applications with Defender for Endpoint and Vulnerability Management (jeffreyappel.nl)

NEW BLOG: Block “vulnerable/unwanted” applications with Defender for Endpoint and Vulnerability Management.
 

 
Blocking vulnerable applications is important. With the use of Defender Vulnerability Management (MDVM), more insights are available based on exploited CVEs/ public exploits and other threat information.
 

 
When using Defender for Endpoint Vulnerability Management add-on, there is a feature for blocking vulnerable applications. Example; Block Google Chrome versions related to CVE-2023-1217/ CVE-2023-1216
 

 
Microsoft Defender for Servers Plan 2 includes access to the premium vulnerability management capabilities. The Vulnerability Management add-on is part of the Defender for Servers Plan 2 plan, no additional licensing/ cost is needed when servers are part of Defender for Servers Plan 2.

Link: https://jeffreyappel.nl/block-vulnerable-unwanted-applications-with-defender-for-endpoint-and-vulnerability-management/

Archive: https://web.archive.org/web/20230405181922/https://jeffreyappel.nl/block-vulnerable-unwanted-applications-with-defender-for-endpoint-and-vulnerability-management/

    22