mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-27 16:23:36 +00:00
Merge branch 'master' into aljupudi-5548201-htmltomdtableupdate-batch28-sweep
This commit is contained in:
@ -179,9 +179,6 @@ conceptualContent:
|
|||||||
- url: /windows/security/index
|
- url: /windows/security/index
|
||||||
itemType: overview
|
itemType: overview
|
||||||
text: Windows Enterprise Security
|
text: Windows Enterprise Security
|
||||||
- url: /windows/privacy/index
|
|
||||||
itemType: overview
|
|
||||||
text: Windows Privacy
|
|
||||||
- url: /windows/security/hardware
|
- url: /windows/security/hardware
|
||||||
itemType: overview
|
itemType: overview
|
||||||
text: Hardware security
|
text: Hardware security
|
||||||
@ -193,10 +190,13 @@ conceptualContent:
|
|||||||
text: Application security
|
text: Application security
|
||||||
- url: /windows/security/identity
|
- url: /windows/security/identity
|
||||||
itemType: overview
|
itemType: overview
|
||||||
text: User and identity security
|
text: Identity and privacy
|
||||||
- url: /windows/security/cloud
|
- url: /windows/security/cloud
|
||||||
itemType: overview
|
itemType: overview
|
||||||
text: Cloud services
|
text: Cloud services
|
||||||
|
- url: /windows/privacy/index
|
||||||
|
itemType: overview
|
||||||
|
text: Windows Privacy
|
||||||
|
|
||||||
# additionalContent section (optional)
|
# additionalContent section (optional)
|
||||||
# Card with summary style
|
# Card with summary style
|
||||||
|
@ -13,7 +13,7 @@ ms.prod: m365-security
|
|||||||
ms.technology: windows-sec
|
ms.technology: windows-sec
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows identity and user security
|
# Windows identity and privacy
|
||||||
|
|
||||||
Malicious actors launch millions of password attacks every day. Weak passwords, password spraying, and phishing are the entry point for many attacks. Knowing that the right user is accessing the right device and the right data is critical to keeping your business, family, and self, safe and secure. Windows Hello, Windows Hello for Business, and Credential Guard enable customers to move to passwordless multifactor authentication (MFA). MFA can reduce the risk of compromise in organizations.
|
Malicious actors launch millions of password attacks every day. Weak passwords, password spraying, and phishing are the entry point for many attacks. Knowing that the right user is accessing the right device and the right data is critical to keeping your business, family, and self, safe and secure. Windows Hello, Windows Hello for Business, and Credential Guard enable customers to move to passwordless multifactor authentication (MFA). MFA can reduce the risk of compromise in organizations.
|
||||||
|
|
||||||
|
@ -29,18 +29,18 @@ In Windows client, hardware and software work together to help protect you from
|
|||||||
|
|
||||||
See the following articles to learn more about the different areas of Windows threat protection:
|
See the following articles to learn more about the different areas of Windows threat protection:
|
||||||
|
|
||||||
- [Application Control](/windows-defender-application-control/windows-defender-application-control.md)
|
- [Application Control](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)
|
||||||
- [Attack Surface Reduction Rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction)
|
- [Attack Surface Reduction Rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction)
|
||||||
- [Controlled Folder Access](/microsoft-365/security/defender-endpoint/controlled-folders)
|
- [Controlled Folder Access](/microsoft-365/security/defender-endpoint/controlled-folders)
|
||||||
- [Exploit Protection](/microsoft-365/security/defender-endpoint/exploit-protection)
|
- [Exploit Protection](/microsoft-365/security/defender-endpoint/exploit-protection)
|
||||||
- [Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md)
|
- [Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview)
|
||||||
- [Microsoft Defender Device Guard](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
- [Microsoft Defender Device Guard](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
||||||
- [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md)
|
- [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview)
|
||||||
- [Network Protection](/microsoft-365/security/defender-endpoint/network-protection)
|
- [Network Protection](/microsoft-365/security/defender-endpoint/network-protection)
|
||||||
- [Virtualization-Based Protection of Code Integrity](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md)
|
- [Virtualization-Based Protection of Code Integrity](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity)
|
||||||
- [Web Protection](/microsoft-365/security/defender-endpoint/web-protection-overview)
|
- [Web Protection](/microsoft-365/security/defender-endpoint/web-protection-overview)
|
||||||
- [Windows Firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
- [Windows Firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
||||||
- [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md)
|
- [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview)
|
||||||
|
|
||||||
### Next-generation protection
|
### Next-generation protection
|
||||||
Next-generation protection is designed to identify and block new and emerging threats. Powered by the cloud and machine learning, Microsoft Defender Antivirus can help stop attacks in real-time.
|
Next-generation protection is designed to identify and block new and emerging threats. Powered by the cloud and machine learning, Microsoft Defender Antivirus can help stop attacks in real-time.
|
||||||
|
Reference in New Issue
Block a user