mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 14:23:38 +00:00
fix-suggestions
To fix suggestions
This commit is contained in:
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Manage endpoint detection and response capabilities
|
title: Manage endpoint detection and response capabilities
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
description:
|
description: Manage endpoint detection and response capabilities
|
||||||
keywords:
|
keywords:
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
|
@ -51,16 +51,15 @@ Defender for Endpoint uses the following combination of technology built into Wi
|
|||||||
tools, techniques, and procedures, and generate alerts when they
|
tools, techniques, and procedures, and generate alerts when they
|
||||||
are observed in collected sensor data.
|
are observed in collected sensor data.
|
||||||
|
|
||||||
|
|
||||||
<center><h2>Microsoft Defender for Endpoint</center></h2>
|
<center><h2>Microsoft Defender for Endpoint</center></h2>
|
||||||
<table>
|
<table>
|
||||||
<tr>
|
<tr>
|
||||||
<td><a href="#tvm"><center><img src="images/TVM_icon.png"> <br><b>Threat & Vulnerability Management</b></center></a></td>
|
<td><a href="#tvm"><center><img src="images/TVM_icon.png" alt-text="Threat & Vulnerability Management"> <br><b>Threat & Vulnerability Management</b></center></a></td>
|
||||||
<td><a href="#asr"><center><img src="images/asr-icon.png"><br><b>Attack surface reduction</b></center></a></td>
|
<td><a href="#asr"><center><img src="images/asr-icon.png" alt-text="Attack surface reduction"><br><b>Attack surface reduction</b></center></a></td>
|
||||||
<td><center><a href="#ngp"><img src="images/ngp-icon.png"><br> <b>Next-generation protection</b></a></center></td>
|
<td><center><a href="#ngp"><img src="images/ngp-icon.png" alt-text="Next-generation protection"><br> <b>Next-generation protection</b></a></center></td>
|
||||||
<td><center><a href="#edr"><img src="images/edr-icon.png"><br> <b>Endpoint detection and response</b></a></center></td>
|
<td><center><a href="#edr"><img src="images/edr-icon.png" alt-text="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
|
||||||
<td><center><a href="#ai"><img src="images/air-icon.png"><br> <b>Automated investigation and remediation</b></a></center></td>
|
<td><center><a href="#ai"><img src="images/air-icon.png" alt-text="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
|
||||||
<td><center><a href="#mte"><img src="images/mte-icon.png"><br> <b>Microsoft Threat Experts</b></a></center></td>
|
<td><center><a href="#mte"><img src="images/mte-icon.png" alt-text="Microsoft Threat Experts"><br> <b>Microsoft Threat Experts</b></a></center></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td colspan="7">
|
<td colspan="7">
|
||||||
|
Reference in New Issue
Block a user