Microsoft Defender now detects Android and iOS vulnerabilities

Microsoft says threat and vulnerability management support for Android and iOS has reached general availability in Microsoft Defender for Endpoint, the company’s enterprise endpoint security platform.

“Threat and vulnerability management in Microsoft Defender for Endpoint continuously monitors and identifies impacted devices, assesses associated risks in the environment, and provides intelligent prioritization and integrated workflows to seamlessly remediate vulnerabilities.”

More information on Microsoft’s mobile threat defense key capabilities and Microsoft Defender for Endpoint onboarding guidance for iOS and Android can be found here.

One month later, in July 2020, the endpoint security solution was updated with a Microsoft Secure Score for Devices feature to evaluate the collective security configuration state of devices on enterprise networks.

Starting with October 2020, the Microsoft enterprise endpoint security platform also provides admins with reports that help them keep track of vulnerable Windows and macOS devices, including vulnerability severity levels, exploit availability, vulnerability age, and vulnerable devices by operating system.

In April 2021, Redmond announced that Microsoft Defender for Endpoint also comes with Windows 10 on Arm support.

Share this article on social media:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.
This field is for validation purposes and should be left unchanged.

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

Tell us About your Needs
Get an Answer the Same Business Day

Got an urgent request? Call us at 1-877-805-7475 or Book a meeting.

What happens next:

  • We reach out to learn about your objectives
  • We work together to define your project’s scope
  • You get an all-inclusive, no engagement proposal
This field is for validation purposes and should be left unchanged.


Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g:,, etc.)



Everything You Need to Know

Gain confidence in your future cybersecurity assessments by learning to effectively plan, scope and execute projects.
This site is registered on as a development site. Switch to a production site key to remove this banner.