diff --git a/windows/security/index.yml b/windows/security/index.yml index 6271993fa9..d45910a86d 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -34,49 +34,49 @@ sections: - type: markdown - text: Secure corporate data and manage risk. + text: Secure corporate data and manage risk. - items: - type: list - style: cards + style: cards - className: cardsM + className: cardsM - columns: 3 + columns: 3 - items: + items: - - href: \windows\security\identity-protection\ + - href: \windows\security\identity-protection\ - html:

Deploy secure enterprise-grade authentication and access control to protect accounts and data

+ html:

Deploy secure enterprise-grade authentication and access control to protect accounts and data

- image: + image: - src: https://docs.microsoft.com/media/common/i_identity-protection.svg + src: https://docs.microsoft.com/media/common/i_identity-protection.svg - title: Identity and access management + title: Identity and access management - - href: \windows\security\threat-protection\ + - href: \windows\security\threat-protection\ - html:

Stop cyberthreats and quickly identify and respond to breaches

+ html:

Stop cyberthreats and quickly identify and respond to breaches

- image: + image: - src: https://docs.microsoft.com/media/common/i_threat-protection.svg + src: https://docs.microsoft.com/media/common/i_threat-protection.svg - title: Threat protection + title: Threat protection - - href: \windows\security\information-protection\ + - href: \windows\security\information-protection\ - html:

Identify and secure critical data to prevent data loss

+ html:

Identify and secure critical data to prevent data loss

- image: + image: - src: https://docs.microsoft.com/media/common/i_information-protection.svg + src: https://docs.microsoft.com/media/common/i_information-protection.svg - title: Information protection + title: Information protection ### YamlMime:YamlDocument @@ -114,65 +114,66 @@ sections: - type: markdown - text: Secure corporate data and manage risk. + text: Secure corporate data and manage risk. - items: - type: list - style: cards + style: cards - className: cardsM + className: cardsM - columns: 3 + columns: 3 - items: + items: - - href: \windows\security\identity-protection\ + - href: \windows\security\identity-protection\ - html:

Deploy secure enterprise-grade authentication and access control to protect accounts and data

+ html:

Deploy secure enterprise-grade authentication and access control to protect accounts and data

- image: + image: - src: https://docs.microsoft.com/media/common/i_identity-protection.svg + src: https://docs.microsoft.com/media/common/i_identity-protection.svg - title: Identity and access management + title: Identity and access management - - href: \windows\security\threat-protection\ + - href: \windows\security\threat-protection\ - html:

Stop cyberthreats and quickly identify and respond to breaches

+ html:

Stop cyberthreats and quickly identify and respond to breaches

- image: + image: - src: https://docs.microsoft.com/media/common/i_threat-protection.svg + src: https://docs.microsoft.com/media/common/i_threat-protection.svg - title: Threat protection + title: Threat protection - - href: \windows\security\information-protection\ + - href: \windows\security\information-protection\ - html:

Identify and secure critical data to prevent data loss

+ html:

Identify and secure critical data to prevent data loss

- image: + image: - src: https://docs.microsoft.com/media/common/i_information-protection.svg + src: https://docs.microsoft.com/media/common/i_information-protection.svg - title: Information protection + title: Information protection - title: Windows Defender Advanced Threat Protection items: - type: markdown - text: " - Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP platform. -
 
- - - - - - - -
Attack surface reductionNext generation protectionEndpoint protection and responseAuto investigation and remediationSecurity posture
[Isolation](https://docs.microsoft.com/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows)

[Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)

[Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard)

[Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)
[Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)

[Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus)

[Web protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview)
[Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)

[Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)

[Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)

[Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)

[Threat intelligence and custom detections](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection)
[Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines)

[Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)

[Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline)

[Artificial intelligence response playbooks](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)
[Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

[Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

[Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

[Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

[Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection)

[Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection)

- " + text: " + Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP platform. +
 
+ +

[Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard)

[Device restrictions](https://docs.microsoft.com/intune/device-restrictions-configure)

+ + + [Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)

[Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)

[Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)



[Threat intelligence and custom detections](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection) + + + +
Attack surface reductionNext generation protectionEndpoint protection and responseAuto investigation and remediationSecurity posture
[Hardware based isolation](https://docs.microsoft.com/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows)

[Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)

[Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard)

[Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)
[Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)

[Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus)

[Threat intelligence](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)
br>[Sandbox service>](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)

[Alerts queue](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection)

[Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline)

[Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)

[API and SIEM integration](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection)

[Deep analysis](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)

[Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)

[Forensic collection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines)

[Automated investigation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)

[Threat remediation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#how-threats-are-remediated)

[Manage automated investigations](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#manage-automated-investigations)

[Investigation analysis](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#analyze-automated-investigations)

[Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

[Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

[Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

[Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

[Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection)

[Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection)

+ " - title: Videos @@ -181,49 +182,49 @@ sections: - type: markdown - text: ">[![VIDEO](images/next-generation-windows-security-vision.png)](https://www.youtube.com/watch?v=IvZySDNfNpo)" + text: ">[![VIDEO](images/next-generation-windows-security-vision.png)](https://www.youtube.com/watch?v=IvZySDNfNpo)" - type: markdown - text: ">[![VIDEO](images/fall-creators-update-next-gen-security.png)](https://www.youtube.com/watch?v=JDGMNFwyUg8)" - + text: ">[![VIDEO](images/fall-creators-update-next-gen-security.png)](https://www.youtube.com/watch?v=JDGMNFwyUg8)" + - title: Additional security features in Windows 10 items: - type: paragraph - text: 'These additional security features are also built in to Windows 10 Enterprise.' + text: 'These additional security features are also built in to Windows 10 Enterprise.' - type: list - style: unordered + style: unordered - items: + items: - - html: Windows Defender Firewall - - html: Windows Defender Exploit Guard - - html: Windows Defender Credential Guard - - html: Windows Defender Application Control - - html: Windows Defender Application Guard - - html: Windows Defender SmartScreen - - html: Windows Defender Security Center - + - html: Windows Defender Firewall + - html: Windows Defender Exploit Guard + - html: Windows Defender Credential Guard + - html: Windows Defender Application Control + - html: Windows Defender Application Guard + - html: Windows Defender SmartScreen + - html: Windows Defender Security Center + - title: Security Resources items: - type: list - style: unordered + style: unordered - items: + items: - - html: Windows Defender Security Intelligence - - html: Microsoft Secure blog - - html: Security Update blog - - html: Microsoft Security Response Center (MSRC) - - html: MSRC Blog - - html: Ransomware FAQ - + - html: Windows Defender Security Intelligence + - html: Microsoft Secure blog + - html: Security Update blog + - html: Microsoft Security Response Center (MSRC) + - html: MSRC Blog + - html: Ransomware FAQ + diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index e3e604c855..81e2604e27 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -22,8 +22,8 @@ The attack surface reduction set of capabilities provide the first line of defen **Next generation protection**
To further reinforce the security perimeter of your network, Windows Defender ATP uses next generation protection designed to catch all types of emerging threats. -**Endpoint detection and response**
-Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. +**Endpoint protection and response**
+Endpoint protection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. **Auto investigation and remediation**
In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. @@ -31,8 +31,6 @@ In conjunction with being able to quickly respond to advanced attacks, Windows D **Security posture**
Windows Defender ATP also provides a security posture capability to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security state of your network. -**Management and APIs**
-Windows Defender ATP provides integrated configuration management in the cloud. The service also supports third-party mobile device management (MDM) tools, cross-platform support, and APIs that allow customers to create custom threat intelligence and automate workflows.