Overview
ManageEngine's Vulnerability Manager Plus is a comprehensive threat and vulnerability management solution to protect your distributed workforce at any scale. Its powerful array of security capabilities allow you to:
-
Pinpoint imminent and impactful vulnerabilities with risk-based vulnerability assessment.
-
Automate patching to Windows, Mac, Linux, and over 350 third-party applications.
-
Mitigate zero-day vulnerabilities by hardening your systems and servers.
-
Identify configuration drifts and misconfigurations and bring them under compliance.
-
View recommendations on how to harden your web servers so that they're free from multiple attack variants.
-
Identify and remove end-of-life, remote desktop sharing, and peer-to-peer software in your network.
-
Audit ports in use and see if any of them are activated by malicious services.
Highlights
- With an integrated web console, Vulnerability Manager Plus allows you to streamline, track, and regulate the entire cycle of vulnerabilities from detection, vulnerability assessment to patching from a central location
- It is endowed with extensive security features that extend beyond the scope of traditional vulnerability management such as security configuration management, web server hardening, automated patch management, active port and high risk software audit, etc.
- Vulnerability Manager Plus offers dedicated views to quickly identify public disclosures and zero days and also provides workarounds or compensation controls to mitigate the flaw before fixes arrive
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Cost/hour |
---|---|
m4.xlarge Recommended | $0.209 |
t3.micro AWS Free Tier | $0.209 |
d2.xlarge | $0.209 |
t3.nano | $0.209 |
c4.xlarge | $0.209 |
c3.xlarge | $0.209 |
t3.2xlarge | $0.209 |
i3.xlarge | $0.209 |
t3.medium | $0.209 |
r3.4xlarge | $0.209 |
Vendor refund policy
Please email us at : vulnerabilitymanagerplus-support@manageengine.comÂ
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
Vulnerability Manager Plus service is installed in this instance. Once the instance is up and running, take remote connection to your instance and start Vulnerability Manager Plus server by double clicking the Vulnerability Manager Plus shortcut from the desktop. You can now access Vulnerability Manager Plus application by accessing the URL: http://<public_dns>:8020/configurations.do from Internet Explorer Browser. For more information visit https://www.manageengine.com/vulnerability-management/help/installing-vulnerability-manager-plus-on-aws.htmlÂ
Resources
Support
Vendor support
We provide 24X5 support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
![ID.me, FedRAMP Moderate- [Private Offer Only]](https://d7umqicpi7263.cloudfront.net/img/product/edf2a4c4-a7eb-4960-966b-1c90cc1f0bbf.png)


Customer reviews
ManageEngine is revolutionizing vulnerability scanning and management
Automated patching in the form of highly-customizable test & approve-after-x-days cycles keep systems current and automated reports show continuous state of compliance. Out of the box, various locations and custom groups allow MSP-level partitions for customized security levels.
Support is excellent and responsive.
I've worked around this issue by taking images of systems I'm hardening, and by pre-hardening my deployment templates rather than building fully-functional systems and then hardening. I also have dev/test systems I deploy hardening principles to first in order to minimize any production impact.