From 96e16c56b6962faf528bc4025599c79d77e6dfb5 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 5 Apr 2019 00:04:25 +0000 Subject: [PATCH] Updated next-gen-threat-and-vuln-mgt.md --- .../windows-defender-atp/next-gen-threat-and-vuln-mgt.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md index 35afd62e1b..159ede8711 100644 --- a/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -23,9 +23,7 @@ ms.topic: conceptual [!include[Prerelease�information](prerelease.md)] -Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program an dreducing organizational risk. - -Threat & Vulnerability Management serves as an infrustructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. It provides the following solutions to frequently-cited gaps across security operations, security administration, and IT administration workflows and communication. +Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program an dreducing organizational risk. Threat & Vulnerability Management serves as an infrustructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. It provides the following solutions to frequently-cited gaps across security operations, security administration, and IT administration workflows and communication. - Continuous threat and vulnerability exposure discovery with runtime information - Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities - Linked vulnerability and security configuration assessment data in the context of exposure discovery