Onboard to Microsoft Defender Vulnerability Management

Applies to:

To onboard devices to Defender Vulnerability Management you follow the same steps as you would for onboarding devices to Microsoft Defender for Endpoint.

Use this article for guidance on how to onboard devices to Defender Vulnerability Management.

Tip

Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to sign up for a free trial.

Onboard devices using any of the supported management tools

To onboard device to Defender Vulnerability Management you'll need to go the onboarding section of the Microsoft Defender portal. Depending on the operating system, you'll be guided on the appropriate steps and the management and deployment tool options available.

This video provides a quick overview of the onboarding process and the different tools and methods.

To start onboarding your devices to Defender Vulnerability Management:

  1. Go to the Onboarding section in the Microsoft Defender portal.
  2. Choose the operating system for the devices you wish to onboard.
  3. Select the Deployment method you plan to use.
  4. Follow the instructions to onboard your devices.

For more information and steps on how to onboard your devices using the different deployment tools, see Select deployment method.

Offboard devices

To offboard device from Defender Vulnerability Management you'll need to go the offboarding section of the Microsoft Defender portal.

For more information on how to offboard your devices, see offboard devices.

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.