The main use cases for Microsoft Defender Vulnerability Management among my customers are endpoint protection, identity protection, and vulnerability assessment of software.
My customers mostly use this tool in the IT and ITES industries.
The most useful feature in Microsoft Defender Vulnerability Management is asset discovery.
Regarding Threat Intelligence in Microsoft Defender Vulnerability Management, people should subscribe separately as it is an add-on. I have not applied it to Threat Intelligence but we refer to it as vulnerability exploits; CV priority will be present.
The main advantage of Microsoft Defender Vulnerability Management is that it can locate and prevent most threats even when the endpoints are not connected to the corporate network, as long as the internet is available.
Microsoft Defender Vulnerability Management is capable of continuously monitoring and assessing vulnerabilities without requiring periodic scans.
Risk prioritization in Microsoft Defender Vulnerability Management will be very useful for large organizations and large deployments because they prioritize the risk, allowing me to apply the patches in a very structured and more important way. I can keep the less important patches on hold for a time period, but for most important, critical patches, the risk is prioritized, and I will be able to address that first.
The benefits my customers have gained from Microsoft Defender Vulnerability Management include a single point of visibility of entire risk exposure, complete assessment of risk assessment from the cloud, real-time assessment, and the ability to immediately remediate the risk by applying patches.