Checked formatting

This commit is contained in:
Dolcita
2016-04-19 16:40:06 +10:00
parent dcc84173df
commit 8a20df1119

View File

@ -60,7 +60,7 @@ The **Machines reporting** tile shows a bar graph that represents the number of
## Investigate machines with active threats ## Investigate machines with active threats
The **Active malware** tile will only appear if your endpoints are using Windows Defender. The **Active malware** tile will only appear if your endpoints are using Windows Defender.
Active malware is defined as threats that were actively executing at the time of detection. Active malware is defined as threats that are actively executing at the time of detection.
Hover over each bar to see the number of active detections (as **Threats**) and the number of endpoints with at least one active detection (as **Machines**) over the past 30 days. Hover over each bar to see the number of active detections (as **Threats**) and the number of endpoints with at least one active detection (as **Machines**) over the past 30 days.
@ -72,7 +72,7 @@ The chart is sorted into five categories:
- **Ransomware** - threats that prevent user access to a machine or its files and demand payment to restore access. - **Ransomware** - threats that prevent user access to a machine or its files and demand payment to restore access.
- **Exploit** - threats that use software vulnerabilities to infect machines. - **Exploit** - threats that use software vulnerabilities to infect machines.
- **Threat** - all other threats that don't fit into the **Password stealer**, **Ransomware**, or **Exploit** categories. This includes trojans, worms, backdoors, and viruses. - **Threat** - all other threats that don't fit into the **Password stealer**, **Ransomware**, or **Exploit** categories. This includes trojans, worms, backdoors, and viruses.
- **Low severity** - threats with a low severity, including adware and potentially unwanted software such as browser modifiers. - **Low severity** - threats with low severity, including adware and potentially unwanted software such as browser modifiers.
Threats are considered "Active" if there is a very high probability that the malware was executing on your network, as opposed to statically located on-disk. Threats are considered "Active" if there is a very high probability that the malware was executing on your network, as opposed to statically located on-disk.
@ -84,4 +84,4 @@ Clicking on any one of these categories will navigate to the [Machines view](mac
- [View and organize the Windows Defender Advanced Threat Protection Alerts queue](alerts-queue-windows-advanced-threat-protection.md) - [View and organize the Windows Defender Advanced Threat Protection Alerts queue](alerts-queue-windows-advanced-threat-protection.md)
- [Investigate machines in the Windows Defender ATP Machines view](machines-view-windows-advanced-threat-protection.md) - [Investigate machines in the Windows Defender ATP Machines view](machines-view-windows-advanced-threat-protection.md)
- [Submit files to the Windows Defender ATP Deep analysis feature](deep-analysis-windows-advanced-threat-protection.md) - [Submit files to the Windows Defender ATP Deep analysis feature](deep-analysis-windows-advanced-threat-protection.md)
- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-advanced-threat-protection.md) - [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-advanced-threat-protection.md)