From the course: Controlling Cybersecurity Risk with Defender Vulnerability Management

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Windows authenticated scan

Windows authenticated scan

- [Instructor] There may be some scenarios where you want to get vulnerability management information about Windows devices, but you can't get those devices into Defender vulnerability management. So for example, change control, third party software conflicts, et cetera, et cetera. In that type of scenario, we can use Windows Authenticated Scan. It can use the same scanning device as the network scanner, which you've learned about in a previous video, and operates by using a group managed service account that authenticates with Active Directory joined clients. Now there is a significant gotcha there, which is the dependency on those devices being joined to your on-premises Active Directory domain services. So this capability, if you're trying to move to cloud only and you're doing Microsoft Entra-joined Windows devices, this will not be compatible. It works by using WMI and in far as licensing goes, you will need that additional higher level of licensing either through the standalone…

Contents