diff --git a/windows/security/index.yml b/windows/security/index.yml
index 0649cf470a..bbcb1a3ec1 100644
--- a/windows/security/index.yml
+++ b/windows/security/index.yml
@@ -78,58 +78,20 @@ sections:
title: Information protection
-
-
-
-- title: Videos
-
+- title: Windows Defender Advanced Threat Protection
items:
-
- type: markdown
-
- text: ">[](https://www.youtube.com/watch?v=IvZySDNfNpo)"
-
- - type: markdown
-
- text: ">[](https://www.youtube.com/watch?v=JDGMNFwyUg8)"
-
-- title: Additional security features in Windows 10
-
- items:
-
- - type: paragraph
-
- text: 'These additional security features are also built in to Windows 10 Enterprise.'
-
- - type: list
-
- style: unordered
-
- items:
-
- - html: Windows Defender Firewall
- - html: Windows Defender Exploit Guard
- - html: Windows Defender Credential Guard
- - html: Windows Defender Application Control
- - html: Windows Defender Application Guard
- - html: Windows Defender SmartScreen
- - html: Windows Defender Security Center
-
-- title: Security Resources
-
- items:
-
- - type: list
-
- style: unordered
-
- items:
-
- - html: Windows Defender Security Intelligence
- - html: Microsoft Secure blog
- - html: Security Update blog
- - html: Microsoft Security Response Center (MSRC)
- - html: MSRC Blog
- - html: Ransomware FAQ
-
-
+ text: "
+ Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP suite.
+
+
Attack surface reduction | Next generation protection | Endpoint protection and response | Auto investigation and remediation | Security posture |
[Isolation](https://docs.microsoft.com/windows/security/hardware-protection/) [Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control) [Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard) [Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard) [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard) |
+ [Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus) [Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) [Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection) [Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis) |
+ [Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection) [Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection) [Threat intelligence and custom detections](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection) |
+ [Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines) [Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection) [Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline) [Artificial intelligence response playbooks](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection) |
+ [Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection) [Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection) |
+