diff --git a/windows/security/index.yml b/windows/security/index.yml index 6271993fa9..d45910a86d 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -34,49 +34,49 @@ sections: - type: markdown - text: Secure corporate data and manage risk. + text: Secure corporate data and manage risk. - items: - type: list - style: cards + style: cards - className: cardsM + className: cardsM - columns: 3 + columns: 3 - items: + items: - - href: \windows\security\identity-protection\ + - href: \windows\security\identity-protection\ - html:
Deploy secure enterprise-grade authentication and access control to protect accounts and data
+ html:Deploy secure enterprise-grade authentication and access control to protect accounts and data
- image: + image: - src: https://docs.microsoft.com/media/common/i_identity-protection.svg + src: https://docs.microsoft.com/media/common/i_identity-protection.svg - title: Identity and access management + title: Identity and access management - - href: \windows\security\threat-protection\ + - href: \windows\security\threat-protection\ - html:Stop cyberthreats and quickly identify and respond to breaches
+ html:Stop cyberthreats and quickly identify and respond to breaches
- image: + image: - src: https://docs.microsoft.com/media/common/i_threat-protection.svg + src: https://docs.microsoft.com/media/common/i_threat-protection.svg - title: Threat protection + title: Threat protection - - href: \windows\security\information-protection\ + - href: \windows\security\information-protection\ - html:Identify and secure critical data to prevent data loss
+ html:Identify and secure critical data to prevent data loss
- image: + image: - src: https://docs.microsoft.com/media/common/i_information-protection.svg + src: https://docs.microsoft.com/media/common/i_information-protection.svg - title: Information protection + title: Information protection ### YamlMime:YamlDocument @@ -114,65 +114,66 @@ sections: - type: markdown - text: Secure corporate data and manage risk. + text: Secure corporate data and manage risk. - items: - type: list - style: cards + style: cards - className: cardsM + className: cardsM - columns: 3 + columns: 3 - items: + items: - - href: \windows\security\identity-protection\ + - href: \windows\security\identity-protection\ - html:Deploy secure enterprise-grade authentication and access control to protect accounts and data
+ html:Deploy secure enterprise-grade authentication and access control to protect accounts and data
- image: + image: - src: https://docs.microsoft.com/media/common/i_identity-protection.svg + src: https://docs.microsoft.com/media/common/i_identity-protection.svg - title: Identity and access management + title: Identity and access management - - href: \windows\security\threat-protection\ + - href: \windows\security\threat-protection\ - html:Stop cyberthreats and quickly identify and respond to breaches
+ html:Stop cyberthreats and quickly identify and respond to breaches
- image: + image: - src: https://docs.microsoft.com/media/common/i_threat-protection.svg + src: https://docs.microsoft.com/media/common/i_threat-protection.svg - title: Threat protection + title: Threat protection - - href: \windows\security\information-protection\ + - href: \windows\security\information-protection\ - html:Identify and secure critical data to prevent data loss
+ html:Identify and secure critical data to prevent data loss
- image: + image: - src: https://docs.microsoft.com/media/common/i_information-protection.svg + src: https://docs.microsoft.com/media/common/i_information-protection.svg - title: Information protection + title: Information protection - title: Windows Defender Advanced Threat Protection items: - type: markdown - text: " - Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP platform. -Attack surface reduction | Next generation protection | Endpoint protection and response | Auto investigation and remediation | Security posture |
[Isolation](https://docs.microsoft.com/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows) [Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control) [Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard) [Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard) |
- [Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) [Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus) [Web protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview) |
- [Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection) [Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection) [Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis) [Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection) [Threat intelligence and custom detections](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection) |
- [Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines) [Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection) [Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline) [Artificial intelligence response playbooks](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection) |
- [Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection) [Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection) |
-
Attack surface reduction | Next generation protection | Endpoint protection and response | Auto investigation and remediation | Security posture |
[Hardware based isolation](https://docs.microsoft.com/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows) [Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control) [Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard) [Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard) | [Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) [Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus) [Threat intelligence](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection) br>[Sandbox service>](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis) |
+ [Alerts queue](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection) [Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline) [Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection) [API and SIEM integration](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection) [Deep analysis](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis) [Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection) [Forensic collection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines) |
+ [Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)[Automated investigation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection) [Threat remediation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#how-threats-are-remediated) [Manage automated investigations](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#manage-automated-investigations) [Investigation analysis](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#analyze-automated-investigations) |
+ [Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection) [Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection) |
+