diff --git a/windows/security/wdatp/index.md b/windows/security/wdatp/index.md index 17fa61426a..11401ceb09 100644 --- a/windows/security/wdatp/index.md +++ b/windows/security/wdatp/index.md @@ -22,13 +22,13 @@ Windows Defender ATP offers a comprehensive approach in securing enterprise netw The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. -To further reinforce the security perimeter of your network, Windows Defender ATP uses next generation protection capabilities designed to catch all types of emerging threats. +To further reinforce the security perimeter of your network, Windows Defender ATP uses next generation protection designed to catch all types of emerging threats. -The endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have penetrated the first line of defense. +Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security security pillars. In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. -The security posture capability brings all these views together in one place so that you can easily keep track and further improve your organization's security posture. +Windows Defender ATP also provides a security posture capability to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security state of your network. The following table can help you better understand how capabilities align within the Windows Defender ATP offering: @@ -38,6 +38,6 @@ The following table can help you better understand how capabilities align within :---|:---|:---|:---|:--- [Windows Defender SmartScreen](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview) OTHER PRODUCTS??
OR
Hardware based isolation

Application control

Exploit protection

Network protection

Controlled folder access | [Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
OR
Web protection

Machine learning

Script and memory attack protection

Antivirus

Runtime emulator

Threat intelligence

URL/IP reputation

Sandbox service | Deep operating system recording sensor

Machine learning, behavioral and anomaly detection

Response containment

Realtime and historical threat hunting

Threat intelligence and custom detections | Forensic collection

Response orchestration

Historical endpoint data

Artificial intelligence reponse playbooks | Asset inventory
Operating system baseline compliance

Recommended improvement actions

Secure score

Threat analytics

Reporting and trends -These capabilities cut across multiple products that make up the Windows Defender ATP platform. For more information on how to leverage all the Windows Defender ATP capabilities, see [Threat protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/index). +These capabilities are available across multiple products that make up the Windows Defender ATP platform. For more information on how to leverage all the Windows Defender ATP capabilities, see [Threat protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/index).