mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
update yaml
This commit is contained in:
@ -30,6 +30,86 @@ metadata:
|
||||
|
||||
sections:
|
||||
|
||||
- items:
|
||||
|
||||
- type: markdown
|
||||
|
||||
text: Secure corporate data and manage risk.
|
||||
|
||||
- items:
|
||||
|
||||
- type: list
|
||||
|
||||
style: cards
|
||||
|
||||
className: cardsM
|
||||
|
||||
columns: 3
|
||||
|
||||
items:
|
||||
|
||||
- href: \windows\security\identity-protection\
|
||||
|
||||
html: <p>Deploy secure enterprise-grade authentication and access control to protect accounts and data</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
|
||||
|
||||
title: Identity and access management
|
||||
|
||||
- href: \windows\security\threat-protection\
|
||||
|
||||
html: <p>Stop cyberthreats and quickly identify and respond to breaches</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
|
||||
|
||||
title: Threat protection
|
||||
|
||||
- href: \windows\security\information-protection\
|
||||
|
||||
html: <p>Identify and secure critical data to prevent data loss</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_information-protection.svg
|
||||
|
||||
title: Information protection
|
||||
|
||||
### YamlMime:YamlDocument
|
||||
|
||||
documentType: LandingData
|
||||
|
||||
title: Windows 10 Enterprise Security
|
||||
|
||||
metadata:
|
||||
|
||||
document_id:
|
||||
|
||||
title: Windows 10 Enterprise Security
|
||||
|
||||
description: Learn about enterprise-grade security features for Windows 10.
|
||||
|
||||
keywords: protect, company, data, Windows, device, app, management, Microsoft365, e5, e3
|
||||
|
||||
ms.localizationpriority: high
|
||||
|
||||
author: brianlic-msft
|
||||
|
||||
ms.author: brianlic
|
||||
|
||||
manager: brianlic
|
||||
|
||||
ms.date: 02/06/2018
|
||||
|
||||
ms.topic: article
|
||||
|
||||
ms.devlang: na
|
||||
|
||||
sections:
|
||||
|
||||
- items:
|
||||
|
||||
- type: markdown
|
||||
@ -79,89 +159,21 @@ sections:
|
||||
title: Information protection
|
||||
|
||||
- title: Windows Defender Advanced Threat Protection
|
||||
|
||||
items:
|
||||
- type: markdown
|
||||
text: "
|
||||
Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP suite.
|
||||
<br> <br>
|
||||
<table border='0'><tr><td><b>Attack surface reduction</b></td><td><b>Next generation protection</b></td><td><b>Endpoint protection and response</b></td><td><b>Auto investigation and remediation</b></td><td><b>Security posture</b></td></tr>
|
||||
<tr><td>[Hardware based isolation](https://docs.microsoft.com/windows/security/hardware-protection/)<br><br>[Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)<br><br>[Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard)<br><br>[Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)<br><br>[Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard)</td>
|
||||
<td>[Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus)<br><br>[Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)<br><br>[Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)<br><br>[Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)</td>
|
||||
<td>[Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)<br><br>[Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)<br><br>[Threat intelligence and custom detections](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection)</td>
|
||||
<td>[Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines)<br><br>[Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)<br><br>[Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline)<br><br>[Artificial intelligence response playbooks](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)</td>
|
||||
<td>[Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection)<br><br>[Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection)<br><br></td>
|
||||
</tr>
|
||||
</table>
|
||||
"
|
||||
|
||||
- type: paragraph
|
||||
|
||||
text: 'Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP platform'
|
||||
|
||||
- type: list
|
||||
|
||||
style: cards
|
||||
|
||||
className: cardsM
|
||||
|
||||
columns: 3
|
||||
|
||||
items:
|
||||
|
||||
- title: Attack surface reduction
|
||||
|
||||
html: <p><a class="barLink" href="/windows/privacy/manage-windows-endpoints">Manage Windows 10 connection endpoints</a></p>
|
||||
|
||||
<p><a class="barLink" href="/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services">Manage connections from Windows to Microsoft services</a></p>
|
||||
|
||||
|
||||
- href: \windows\security\threat-protection\windows-defender-antivirus\windows-defender-antivirus-in-windows-10
|
||||
|
||||
html: <p>Protect against malware management using next-generation antivirus technologies</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
|
||||
|
||||
title: Attack surface reduction
|
||||
|
||||
- href: \windows\security\threat-protection\windows-defender-smartscreen\windows-defender-smartscreen-overview
|
||||
|
||||
html: <p>Protect users from potentially malicious sites</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
|
||||
|
||||
title: Next generation protection
|
||||
|
||||
- href: \windows\security\threat-protection\windows-defender-exploit-guard\windows-defender-exploit-guard
|
||||
|
||||
html: <p>Manage and reduce the attack surface of apps using host intrusion prevention capabilities</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_information-protection.svg
|
||||
|
||||
title: Endpoint detection & response
|
||||
|
||||
- href: \windows\security\threat-protection\windows-defender-application-control\windows-defender-application-control
|
||||
|
||||
html: <p>Lock down applications that run on a device</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
|
||||
|
||||
title: Auto investigation & remediation
|
||||
|
||||
- href: \windows\security\threat-protection\windows-defender-application-guard\wd-app-guard-overview
|
||||
|
||||
html: <p>Protect users from untrusted web sites and resources</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
|
||||
|
||||
title: Security posture
|
||||
|
||||
- href: \windows\security\identity-protection\windows-firewall\windows-firewall-with-advanced-security
|
||||
|
||||
html: <p>Block unauthorized network traffic flowing into or out of a device</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_information-protection.svg
|
||||
|
||||
title: Advanced hunting
|
||||
|
||||
- title: Videos
|
||||
|
||||
|
BIN
windows/security/threat-protection/images/wdatp-pillars2.png
Normal file
BIN
windows/security/threat-protection/images/wdatp-pillars2.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 140 KiB |
@ -10,13 +10,28 @@ ms.date: 02/05/2018
|
||||
---
|
||||
|
||||
# Threat Protection
|
||||
Windows Defender Advanced Threat Protection (Windows Defender ATP) is a unified endpoint security platform that uses built-in security technologies working together and powered by the cloud.
|
||||
Windows Defender Advanced Threat Protection (Windows Defender ATP)is a unified platform for preventative protection, post-breach detection, automated investigation and response, employing intelligent protection to protect endpoints from cyber threats.
|
||||
|
||||
The products in the threat protection stack make up the capabilities in Windows Defender ATP.
|
||||

|
||||
|
||||

|
||||
**Attack surface reduction**<br>
|
||||
The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations.
|
||||
|
||||
**Next generation protection**<br>
|
||||
To further reinforce the security perimeter of your network, Windows Defender ATP uses next generation protection designed to catch all types of emerging threats.
|
||||
|
||||
**Endpoint detection and response**<br>
|
||||
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars.
|
||||
|
||||
**Auto investigation and remediation**<br>
|
||||
In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
|
||||
|
||||
**Security posture**<br>
|
||||
Windows Defender ATP also provides a security posture capability to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security state of your network.
|
||||
|
||||
**Management and APIs**<br>
|
||||
Windows Defender ATP provides integrated configuration management in the cloud. The service also supports third-party mobile device management (MDM) tools, cross-platform support, and APIs that allow customers to create custom threat intelligence and automate workflows.
|
||||
|
||||
You can configure these products individually in a way that best suites your organization. When you're done with setting them up, your security operations team will have the convenience of seeing everything in once place through the Windows Defender ATP portal.
|
||||
|
||||
|
||||
Learn more about how to help protect against threats in Windows 10 and Windows 10 Mobile.
|
||||
|
Reference in New Issue
Block a user