Microsoft Defender
Gather devices and add threat data to assets from Microsoft Defender
Details
Gain inventory visibility into the antivirus status and endpoint security configurations managed by Microsoft Defender for Endpoint within vScope. Notice that the Microsoft Defender integration is part of vScope's integration to Azure Resource Manager.
-
Microsoft Defender threat status inventory
View the current status of malware protection and definition updates across your managed endpoints within your central inventory.
-
Microsoft Defender policy compliance overview
Understand the enforcement status of your security policies configured in Microsoft Defender across your devices as inventoried in vScope.
-
Extended inventory with Defender Device inventory
Extend vScope's discovery by adding devices discovered using Microsoft Defender's built-in device discovery. If configured, the assets will automatically show up in vScope, allowing for discovery of eg. IoT-devices.
Asset Types
- Mobile Devices
- Applications (Software)
- Laptops
- Servers
Example of Bundled Content
- Microsoft Defender Overview
- Microsoft Defender - Configurations Overview
- Microsoft Defender: Antivirus is not enabled
- Microsoft Defender: No scan last 14 days
Get Visibility.
Recent blog posts
All posts
Introducing Network Port Mapping in vScope: Finally See What’s Connected – and Where
One of the most requested features is now here. With Network Port Mapping for SNMP, IT teams can instantly see how devices are connected across the network, no more remoting into switches, outdated documentation, or guesswork. This update helps you troubleshoot faster, improve documentation, and strengthen overall network security.
New in vScope: A More Personal Experience with Interest Profiles
We’re introducing Interest Profiles in vScope, a new way to make vScope more relevant and helpful for every user. Get a home screen and library experience tailored to your interests, responsibilities, and daily work.
Effective Configuration Management Requires Transparency Across All Systems
In modern IT environments, the gap between reported and actual configuration is bigger than most people realize. In this article, I explain why accurate inventory requires collecting data about each asset from multiple sources — not just one.