From 027d61e825287bd07875842e3d1509b4babd47d8 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Tue, 26 Feb 2019 06:44:10 +0000 Subject: [PATCH] Updated terminology per marketing feedback --- .../windows-defender-atp/microsoft-threat-experts.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md index 7517221460..d6f3ff7902 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md @@ -17,13 +17,13 @@ ms.localizationpriority: medium [!include[Prerelease�information](prerelease.md)] -Microsoft Threat Experts is a managed hunting service that provides Security Operation Centers with expert level oversight and analysis to help them ensure that critical threats in their unique environments don’t get missed. +Microsoft Threat Experts is a managed hunting service that provides Security Operation Centers with expert level monitoring and analysis to help them ensure that critical threats in their unique environments don’t get missed. This new capability provides expert-driven insights and data through targeted attack notification and access to experts on demand. ## Targeted attack notification Microsoft Threat Experts provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyber espionage. The managed hunting service includes: -- Constant cybersecurity oversight and vigilance, reducing dwell time and risk to the business +- Constant cybersecurity monitoring and vigilance, reducing dwell time and risk to the business - Hunter-trained artificial intelligence to discover and prioritize both known and unknown attacks - Identifying the most important risks, helping SOC maximize time and energy - Full context of incident, including method of entry, scope of incident, which SOC can quickly act on. Related attacker motivation and attribution may be provided via Threat Analytics.