top of page
IMG_0969_edited_edited.png
AutorenbildMarc Borgers

Lesetipp: Verwundbare / unerwünschte Anwendungen mit Microsoft Defender for Endpoint blocken


Jeffry Appel hat einen lesenswerten Blog-Artikel darüber geschrieben, wie man "verwundbare/unerwünschte" Anwendungen mit Defender for Endpoint and Vulnerability Management blocken kann: Block "vulnerable/unwanted" applications with Defender for Endpoint and Vulnerability Management (jeffreyappel.nl)


NEW BLOG: Block “vulnerable/unwanted” applications with Defender for Endpoint and Vulnerability Management.

Blocking vulnerable applications is important. With the use of Defender Vulnerability Management (MDVM), more insights are available based on exploited CVEs/ public exploits and other threat information.

When using Defender for Endpoint Vulnerability Management add-on, there is a feature for blocking vulnerable applications. Example; Block Google Chrome versions related to CVE-2023-1217/ CVE-2023-1216

Microsoft Defender for Servers Plan 2 includes access to the premium vulnerability management capabilities. The Vulnerability Management add-on is part of the Defender for Servers Plan 2 plan, no additional licensing/ cost is needed when servers are part of Defender for Servers Plan 2.

Link: https://jeffreyappel.nl/block-vulnerable-unwanted-applications-with-defender-for-endpoint-and-vulnerability-management/


Archive: https://web.archive.org/web/20230405181922/https://jeffreyappel.nl/block-vulnerable-unwanted-applications-with-defender-for-endpoint-and-vulnerability-management/



Telefon2trans.png

Sie haben Fragen?

Manchmal ist ein direktes Gespräch einfach unschlagbar. Zögern Sie bitte nicht über unseren Telefonkalender ein kostenloses Erstgespräch zu vereinbaren!

IMG_1091.png
bottom of page