Blog Post

Microsoft Defender Vulnerability Management Blog
2 MIN READ

Become a Microsoft Defender Vulnerability Management Ninja

Ayelet_Artzi's avatar
Ayelet_Artzi
Icon for Microsoft rankMicrosoft
Feb 07, 2024

Do you want to become a ninja for Microsoft Defender Vulnerability Management? We can help you get there! We collected content with multiple modules. We will keep updating this training on a regular basis. 

 

In addition, we offer you a knowledge check based on the training material! Since there’s a lot of content, the goal of the knowledge checks is to help ensure understanding of the key concepts that were covered. Lastly, there’ll be a fun certificate issued at the end of the training: Disclaimer: This is not an official Microsoft certification and only acts as a way of recognizing your participation in this training content.

 

Module 1- Getting started

 

Module 2 – Portal Orientation

Module 3 -Prioritization

Module 4- Remediation

Module 5 - Posture and Compliance

Module 6 – Data access

 

Are you ready for the Knowledge check

Once you’ve finished the training and passed the knowledge check, please click here to request your certificate (you'll see it in your inbox within 3-5 business days.)

Updated Feb 07, 2024
Version 1.0
  • Buen Material, gracias por compartirlo en orden, la sufri un poco por temas de poco tiempo libre en el trabajo pero por fin lo pude acabar. Gracias!!

  • DerkVanDerWoude's avatar
    DerkVanDerWoude
    Copper Contributor

    Great product(s), one comment: why not (re)name to Defender Posture Management (aligned with Defender CSPM) so the product suites are consistent in naming.

  • ArjanAnthonisse's avatar
    ArjanAnthonisse
    Copper Contributor

    Thanks for all the work in collecting all the information and links and dividing it in logical modules.

  • ErikMoreau's avatar
    ErikMoreau
    Iron Contributor

    Another great collection of Defender knowledge Thanks for this!

  • t2tadeu's avatar
    t2tadeu
    Copper Contributor

    What a great challenge, with well-organized and super useful content, congratulations!!!

  • Thiago-Beier's avatar
    Thiago-Beier
    Brass Contributor

    Awesome material it took a a while to go over all of it KUDOS to the FAQ session helps a lot when it comes to known issues, licensing

    Something I'd like to see on Microsoft articles would be a note to where some actions should be done like "source tenant", "target tenant" when it comes to where actions are supposed to be done to. For example: step 1 - run this command (at the source tenant), copy hash and use it on step 3 (target tenant)