
The configured SNMP credentials are correct.Įach assessment device can support up to 1,500 successful IP addresses scan.There is connectivity between the Defender for Endpoint assessment device and the configured target network devices.Save the newly configured network assessment job to start the periodic network scan.ĭuring the set-up process, you can perform a one time test scan to verify that: This device will perform the periodic authenticated scans.Īdd IP addresses of target network devices to be scanned (or the subnets where these devices are deployed).Īdd required SNMP credentials of the target network devices. *./networkscannerstable/*Ĭhoose an 'Assessment job' name and the 'Assessment device' on which the network scanner was installed.To allow the network scanner to be authenticated and work properly, it's essential that you add the following domains/URLs: Proxy client configuration: No extra configuration is required other than the Defender for Endpoint device proxy requirements.

You'll be required to provide the credentials when configuring a new assessment job. Obtain the SNMP credentials of the network devices (for example: Community String, noAuthNoPriv, authNoPriv, authPriv). Obtain the IP addresses of the network devices to be scanned (or the subnets where these devices are deployed). 'SNMP write' isn't needed for the proper functionality of this feature. Make sure SNMP read-only is enabled on all configured network devices to allow the Defender for Endpoint assessment device to query the configured network devices. SNMP traffic between the Defender for Endpoint assessment device and the targeted network devices must be allowed (for example, by the Firewall).ĭecide which network devices will be assessed for vulnerabilities (for example: a Cisco switch or a Palo Alto Networks firewall). Your first step is to select a device that will perform the authenticated network scans.ĭecide on a Defender for Endpoint onboarded device (client or server) that has a network connection to the management port for the network devices you plan on scanning. Therefore, you are encouraged to configure all your network devices, even if they're not specified in this list. More networking vendors and OS will be added over time, based on data gathered from customer usage. The following operating systems are currently supported: Once the network devices are discovered and classified, security administrators will be able to receive the latest security recommendations and review recently discovered vulnerabilities on network devices deployed across their organizations. Vulnerability management for network devices



Once discovered, Defender for Endpoint's threat and vulnerability management capabilities provide integrated workflows to secure discovered switches, routers, WLAN controllers, firewalls, and VPN gateways. Network discovery capabilities are available in the Device inventory section of the Microsoft 365 Defender portal and Microsoft 365 Defender consoles.Ī designated Microsoft Defender for Endpoint device will be used on each network segment to perform periodic authenticated scans of preconfigured network devices. This article provides an overview of the challenge that Network device discovery is designed to address, and detailed information about how get started using these new capabilities. The Network device discovery and vulnerability assessments Blog (published 04-13-2021) provides insights into the new Network device discovery capabilities in Defender for Endpoint.
