mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
AH-WTP-SEO
This commit is contained in:
parent
ed751617df
commit
0ba0054e65
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Threat Protection (Windows 10)
|
title: Threat Protection (Windows 10)
|
||||||
description: Learn how Microsoft Defender ATP helps protect against threats.
|
description: Learn how Microsoft Defender ATP helps protect against threats.
|
||||||
keywords: threat protection, Microsoft Defender Advanced Threat Protection, attack surface reduction, next generation protection, endpoint detection and response, automated investigation and response, microsoft threat experts, secure score, advanced hunting
|
keywords: threat protection, Microsoft Defender Advanced Threat Protection, attack surface reduction, next generation protection, endpoint detection and response, automated investigation and response, microsoft threat experts, secure score, advanced hunting, cyber threat hunting
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -64,7 +64,7 @@ The attack surface reduction set of capabilities provide the first line of defen
|
|||||||
- [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
- [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
||||||
- [Device control](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
- [Device control](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
||||||
- [Exploit protection](microsoft-defender-atp/exploit-protection.md)
|
- [Exploit protection](microsoft-defender-atp/exploit-protection.md)
|
||||||
- [Network protection](microsoft-defender-atp/network-protection.md)
|
- [Network protection](microsoft-defender-atp/network-protection.md), [Web protection](microsoft-defender-atp/web-protection-overview.md)
|
||||||
- [Controlled folder access](microsoft-defender-atp/controlled-folders.md)
|
- [Controlled folder access](microsoft-defender-atp/controlled-folders.md)
|
||||||
- [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
- [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
||||||
- [Attack surface reduction rules](microsoft-defender-atp/attack-surface-reduction.md)
|
- [Attack surface reduction rules](microsoft-defender-atp/attack-surface-reduction.md)
|
||||||
@ -83,7 +83,7 @@ To further reinforce the security perimeter of your network, Microsoft Defender
|
|||||||
<a name="edr"></a>
|
<a name="edr"></a>
|
||||||
|
|
||||||
**[Endpoint detection and response](microsoft-defender-atp/overview-endpoint-detection-response.md)**<br>
|
**[Endpoint detection and response](microsoft-defender-atp/overview-endpoint-detection-response.md)**<br>
|
||||||
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars.
|
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to intrusion attempts and active breaches. With Advanced hunting, you have a query-based threat-hunting tool that lets your proactively find breaches and create custom detections.
|
||||||
|
|
||||||
- [Alerts](microsoft-defender-atp/alerts-queue.md)
|
- [Alerts](microsoft-defender-atp/alerts-queue.md)
|
||||||
- [Historical endpoint data](microsoft-defender-atp/investigate-machines.md#timeline)
|
- [Historical endpoint data](microsoft-defender-atp/investigate-machines.md#timeline)
|
||||||
@ -91,9 +91,8 @@ Endpoint detection and response capabilities are put in place to detect, investi
|
|||||||
- [Forensic collection](microsoft-defender-atp/respond-machine-alerts.md#collect-investigation-package-from-machines)
|
- [Forensic collection](microsoft-defender-atp/respond-machine-alerts.md#collect-investigation-package-from-machines)
|
||||||
- [Threat intelligence](microsoft-defender-atp/threat-indicator-concepts.md)
|
- [Threat intelligence](microsoft-defender-atp/threat-indicator-concepts.md)
|
||||||
- [Advanced detonation and analysis service](microsoft-defender-atp/respond-file-alerts.md#deep-analysis)
|
- [Advanced detonation and analysis service](microsoft-defender-atp/respond-file-alerts.md#deep-analysis)
|
||||||
- [Advanced hunting](microsoft-defender-atp/overview-hunting.md)
|
- [Advanced hunting](microsoft-defender-atp/advanced-hunting-overview.md)
|
||||||
- [Custom detection](microsoft-defender-atp/overview-custom-detections.md)
|
- [Custom detections](microsoft-defender-atp/overview-custom-detections.md)
|
||||||
- [Realtime and historical hunting](microsoft-defender-atp/advanced-hunting.md)
|
|
||||||
|
|
||||||
<a name="ai"></a>
|
<a name="ai"></a>
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Defender Advanced Threat Protection
|
title: Microsoft Defender Advanced Threat Protection
|
||||||
description: Microsoft Defender Advanced Threat Protection is an enterprise security platform that helps secops to prevent, detect, investigate, and respond to possible cybersecurity threats related to advanced persistent threats.
|
description: Microsoft Defender Advanced Threat Protection is an enterprise security platform that helps secops to prevent, detect, investigate, and respond to possible cybersecurity threats related to advanced persistent threats.
|
||||||
keywords: introduction to Microsoft Defender Advanced Threat Protection, introduction to Microsoft Defender ATP, cybersecurity, advanced persistent threat, enterprise security, machine behavioral sensor, cloud security, analytics, threat intelligence, attack surface reduction, next generation protection, automated investigation and remediation, microsoft threat experts, secure score, advanced hunting, microsoft threat protection
|
keywords: introduction to Microsoft Defender Advanced Threat Protection, introduction to Microsoft Defender ATP, cybersecurity, advanced persistent threat, enterprise security, machine behavioral sensor, cloud security, analytics, threat intelligence, attack surface reduction, next generation protection, automated investigation and remediation, microsoft threat experts, secure score, advanced hunting, microsoft threat protection, cyber threat hunting
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -78,7 +78,7 @@ This built-in capability uses a game-changing risk-based approach to the discove
|
|||||||
<a name="asr"></a>
|
<a name="asr"></a>
|
||||||
|
|
||||||
**[Attack surface reduction](overview-attack-surface-reduction.md)**<br>
|
**[Attack surface reduction](overview-attack-surface-reduction.md)**<br>
|
||||||
The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitation.
|
The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitation. This set of capabilities also includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs.
|
||||||
|
|
||||||
<a name="ngp"></a>
|
<a name="ngp"></a>
|
||||||
|
|
||||||
@ -88,8 +88,7 @@ To further reinforce the security perimeter of your network, Microsoft Defender
|
|||||||
<a name="edr"></a>
|
<a name="edr"></a>
|
||||||
|
|
||||||
**[Endpoint detection and response](overview-endpoint-detection-response.md)**<br>
|
**[Endpoint detection and response](overview-endpoint-detection-response.md)**<br>
|
||||||
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars.
|
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. [Advanced hunting](advanced-hunting-overview.md) provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections.
|
||||||
You can also do advanced hunting to create custom threat intelligence and use a powerful search and query tool to hunt for possible threats in your organization.
|
|
||||||
|
|
||||||
<a name="ai"></a>
|
<a name="ai"></a>
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Overview of Microsoft Defender ATP
|
title: Overview of Microsoft Defender ATP
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
description: Understand the concepts behind the capabilities in Microsoft Defender ATP so you take full advantage of the complete threat protection platform
|
description: Understand the concepts behind the capabilities in Microsoft Defender ATP so you take full advantage of the complete threat protection platform
|
||||||
keywords: atp, microsoft defender atp, defender, mdatp, threat protection, platform, threat, vulnerability, asr, attack, surface, reduction, next-gen, protection, edr, endpoint, detection, response, automated, air
|
keywords: atp, microsoft defender atp, defender, mdatp, threat protection, platform, threat, vulnerability, asr, attack, surface, reduction, next-gen, protection, edr, endpoint, detection, response, automated, air, cyber threat hunting, advanced hunting
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -34,13 +34,13 @@ Understand the concepts behind the capabilities in Microsoft Defender ATP so you
|
|||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) | Reduce organizational vulnerability exposure and increase threat resilience while seamlessly connecting workflows across security stakeholders—security administrators, security operations, and IT administrators in remediating threats.
|
[Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) | Reduce organizational vulnerability exposure and increase threat resilience while seamlessly connecting workflows across security stakeholders—security administrators, security operations, and IT administrators in remediating threats.
|
||||||
[Attack surface reduction](overview-attack-surface-reduction.md) | Leverage the attack surface reduction capabilities to protect the perimeter of your organization.
|
[Attack surface reduction](overview-attack-surface-reduction.md) | Leverage exploit protection, attack surface reduction rules, and other capabilities to protect the perimeter of your organization. This set of capabilities also includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs.
|
||||||
[Next generation protection](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) | Learn about the antivirus capabilities in Microsoft Defender ATP so you can protect desktops, portable computers, and servers.
|
[Next generation protection](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) | Learn about the antivirus capabilities in Microsoft Defender ATP so you can protect desktops, portable computers, and servers.
|
||||||
[Endpoint detection and response](overview-endpoint-detection-response.md) | Understand how Microsoft Defender ATP continuously monitors your organization for possible attacks against systems, networks, or users in your organization and the features you can use to mitigate and remediate threats.
|
[Endpoint detection and response](overview-endpoint-detection-response.md) | Understand how Microsoft Defender ATP continuously monitors your organization for possible attacks against systems, networks, or users in your organization and the features you can use to mitigate and remediate threats.
|
||||||
[Automated investigation and remediation](automated-investigations.md) | In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
|
[Automated investigation and remediation](automated-investigations.md) | In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
|
||||||
[Secure score](overview-secure-score.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place.
|
[Secure score](overview-secure-score.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place.
|
||||||
[Microsoft Threat Experts](microsoft-threat-experts.md) | Managed cybersecurity threat hunting service. Learn how you can get expert-driven insights and data through targeted attack notification and access to experts on demand.
|
[Microsoft Threat Experts](microsoft-threat-experts.md) | Managed cybersecurity threat hunting service. Learn how you can get expert-driven insights and data through targeted attack notification and access to experts on demand.
|
||||||
[Advanced hunting](advanced-hunting-overview.md) | Use a powerful search and query language to create custom queries and detection rules.
|
[Advanced hunting](advanced-hunting-overview.md) | Use a powerful query-based threat-hunting tool to proactively find breach activity and create custom detection rules.
|
||||||
[Management and APIs](management-apis.md) | Microsoft Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows.
|
[Management and APIs](management-apis.md) | Microsoft Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows.
|
||||||
[Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack.
|
[Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack.
|
||||||
[Portal overview](portal-overview.md) |Learn to navigate your way around Microsoft Defender Security Center.
|
[Portal overview](portal-overview.md) |Learn to navigate your way around Microsoft Defender Security Center.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user