Merge branch 'master' into aljupudi-5548201-htmltomdtableupdate-batch28-sweep

This commit is contained in:
Mandi Ohlinger
2021-12-09 16:52:08 -05:00
committed by GitHub
3 changed files with 10 additions and 10 deletions

View File

@ -179,9 +179,6 @@ conceptualContent:
- url: /windows/security/index
itemType: overview
text: Windows Enterprise Security
- url: /windows/privacy/index
itemType: overview
text: Windows Privacy
- url: /windows/security/hardware
itemType: overview
text: Hardware security
@ -193,10 +190,13 @@ conceptualContent:
text: Application security
- url: /windows/security/identity
itemType: overview
text: User and identity security
text: Identity and privacy
- url: /windows/security/cloud
itemType: overview
text: Cloud services
- url: /windows/privacy/index
itemType: overview
text: Windows Privacy
# additionalContent section (optional)
# Card with summary style

View File

@ -13,7 +13,7 @@ ms.prod: m365-security
ms.technology: windows-sec
---
# Windows identity and user security
# Windows identity and privacy
Malicious actors launch millions of password attacks every day. Weak passwords, password spraying, and phishing are the entry point for many attacks. Knowing that the right user is accessing the right device and the right data is critical to keeping your business, family, and self, safe and secure. Windows Hello, Windows Hello for Business, and Credential Guard enable customers to move to passwordless multifactor authentication (MFA). MFA can reduce the risk of compromise in organizations.

View File

@ -29,18 +29,18 @@ In Windows client, hardware and software work together to help protect you from
See the following articles to learn more about the different areas of Windows threat protection:
- [Application Control](/windows-defender-application-control/windows-defender-application-control.md)
- [Application Control](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)
- [Attack Surface Reduction Rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction)
- [Controlled Folder Access](/microsoft-365/security/defender-endpoint/controlled-folders)
- [Exploit Protection](/microsoft-365/security/defender-endpoint/exploit-protection)
- [Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md)
- [Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview)
- [Microsoft Defender Device Guard](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
- [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md)
- [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview)
- [Network Protection](/microsoft-365/security/defender-endpoint/network-protection)
- [Virtualization-Based Protection of Code Integrity](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md)
- [Virtualization-Based Protection of Code Integrity](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity)
- [Web Protection](/microsoft-365/security/defender-endpoint/web-protection-overview)
- [Windows Firewall](windows-firewall/windows-firewall-with-advanced-security.md)
- [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md)
- [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview)
### Next-generation protection
Next-generation protection is designed to identify and block new and emerging threats. Powered by the cloud and machine learning, Microsoft Defender Antivirus can help stop attacks in real-time.