mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
remove value prop image, expand APT word
This commit is contained in:
parent
303ab9f3ad
commit
341cc38d50
@ -45,7 +45,7 @@ There are three mechanisms to pivot the queue against:
|
||||
|
||||
2. Filter alerts by their **Severity** by opening the drop-down menu in the **Filter by** field and selecting one or more of the check boxes:
|
||||
|
||||
- High (Red) - Threats often associated with APT. These alerts pose a high risk due to the severity of the damage they might inflict on endpoints.
|
||||
- High (Red) - Threats often associated with advanced persistent threat (APT). These alerts pose a high risk due to the severity of the damage they might inflict on endpoints.
|
||||
- Medium (Orange) - Threats considered to be abnormal or suspicious in nature such as anomalous registry modifications and loading of executable files.
|
||||
- Low (Yellow) - Threats associated with prevalent malware and hack-tools that pose a lower risk to endpoints.
|
||||
|
||||
@ -67,4 +67,4 @@ There are three mechanisms to pivot the queue against:
|
||||
- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
||||
- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
||||
- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
||||
- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
||||
- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
||||
|
@ -59,8 +59,6 @@ antimalware products.
|
||||
Windows Defender ATP leverages Microsoft technology and expertise to
|
||||
detect sophisticated cyber-attacks, providing:
|
||||
|
||||

|
||||
|
||||
- Behavior-based, cloud-powered, advanced attack detection
|
||||
|
||||
Finds the attacks that made it past all other defenses (post breach detection),provides actionable, correlated alerts for known and unknown adversaries trying to hide their activities on endpoints.
|
||||
@ -69,7 +67,7 @@ detect sophisticated cyber-attacks, providing:
|
||||
|
||||
Easily investigate the scope of breach or suspected behaviors on any machine through a rich machine timeline. File, URLs, and network connection inventory across the network. Gain additional insight using deep collection and analysis (“detonation”) for any file or URLs.
|
||||
|
||||
- Built in threat intel knowledge base
|
||||
- Built in unique threat intelligence knowledge base
|
||||
|
||||
Unparalleled threat optics provides actor details and intent context for every threat intel-based detection – combining first and third-party intelligence sources.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user