From 341cc38d504fc1748848c7513b48b5ba8e0dcfdf Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 10 May 2016 16:45:36 +1000 Subject: [PATCH] remove value prop image, expand APT word --- ...lerts-queue-windows-defender-advanced-threat-protection.md | 4 ++-- .../windows-defender-advanced-threat-protection.md | 4 +--- 2 files changed, 3 insertions(+), 5 deletions(-) diff --git a/windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md b/windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md index ed73779e04..b6f5c0c088 100644 --- a/windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md @@ -45,7 +45,7 @@ There are three mechanisms to pivot the queue against: 2. Filter alerts by their **Severity** by opening the drop-down menu in the **Filter by** field and selecting one or more of the check boxes: - - High (Red) - Threats often associated with APT. These alerts pose a high risk due to the severity of the damage they might inflict on endpoints. + - High (Red) - Threats often associated with advanced persistent threat (APT). These alerts pose a high risk due to the severity of the damage they might inflict on endpoints. - Medium (Orange) - Threats considered to be abnormal or suspicious in nature such as anomalous registry modifications and loading of executable files. - Low (Yellow) - Threats associated with prevalent malware and hack-tools that pose a lower risk to endpoints. @@ -67,4 +67,4 @@ There are three mechanisms to pivot the queue against: - [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) - [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) - [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) diff --git a/windows/keep-secure/windows-defender-advanced-threat-protection.md b/windows/keep-secure/windows-defender-advanced-threat-protection.md index e7ae541fd7..19fecb3e08 100644 --- a/windows/keep-secure/windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/windows-defender-advanced-threat-protection.md @@ -59,8 +59,6 @@ antimalware products. Windows Defender ATP leverages Microsoft technology and expertise to detect sophisticated cyber-attacks, providing: -![Image to show the protection service that Windows Defender ATP provides](images/value-prop.png) - - Behavior-based, cloud-powered, advanced attack detection Finds the attacks that made it past all other defenses (post breach detection),provides actionable, correlated alerts for known and unknown adversaries trying to hide their activities on endpoints. @@ -69,7 +67,7 @@ detect sophisticated cyber-attacks, providing: Easily investigate the scope of breach or suspected behaviors on any machine through a rich machine timeline. File, URLs, and network connection inventory across the network. Gain additional insight using deep collection and analysis (“detonation”) for any file or URLs. -- Built in threat intel knowledge base +- Built in unique threat intelligence knowledge base Unparalleled threat optics provides actor details and intent context for every threat intel-based detection – combining first and third-party intelligence sources.