diff --git a/windows/keep-secure/images/threat-mitigations-pre-breach-post-breach-conceptual.png b/windows/keep-secure/images/threat-mitigations-pre-breach-post-breach-conceptual.png index 6b9c37489c..f23868fdde 100644 Binary files a/windows/keep-secure/images/threat-mitigations-pre-breach-post-breach-conceptual.png and b/windows/keep-secure/images/threat-mitigations-pre-breach-post-breach-conceptual.png differ diff --git a/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md b/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md index 2220558610..0b8d3f4996 100644 --- a/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md @@ -14,7 +14,7 @@ This topic provides an overview of software and firmware threats faced in the cu This topic focuses on pre-breach mitigations aimed at device protection and threat resistance. These protections work with other security defenses in Windows 10, as shown in the following illustration: -Types of defenses in Windows 10 +Types of defenses in Windows 10 **Figure 1.  Device protection and threat resistance as part of the Windows 10 security defenses**