Jeffry Appel hat einen lesenswerten Blog-Artikel darüber geschrieben, wie man "verwundbare/unerwünschte" Anwendungen mit Defender for Endpoint and Vulnerability Management blocken kann: Block "vulnerable/unwanted" applications with Defender for Endpoint and Vulnerability Management (jeffreyappel.nl)
NEW BLOG: Block “vulnerable/unwanted” applications with Defender for Endpoint and Vulnerability Management.
Blocking vulnerable applications is important. With the use of Defender Vulnerability Management (MDVM), more insights are available based on exploited CVEs/ public exploits and other threat information.
When using Defender for Endpoint Vulnerability Management add-on, there is a feature for blocking vulnerable applications. Example; Block Google Chrome versions related to CVE-2023-1217/ CVE-2023-1216
Microsoft Defender for Servers Plan 2 includes access to the premium vulnerability management capabilities. The Vulnerability Management add-on is part of the Defender for Servers Plan 2 plan, no additional licensing/ cost is needed when servers are part of Defender for Servers Plan 2.
Link: https://jeffreyappel.nl/block-vulnerable-unwanted-applications-with-defender-for-endpoint-and-vulnerability-management/
Archive: https://web.archive.org/web/20230405181922/https://jeffreyappel.nl/block-vulnerable-unwanted-applications-with-defender-for-endpoint-and-vulnerability-management/