mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
add yaml
This commit is contained in:
parent
df7569d1e7
commit
a652a2d34b
@ -4,86 +4,6 @@ documentType: LandingData
|
||||
|
||||
title: Windows 10 Enterprise Security
|
||||
|
||||
metadata:
|
||||
|
||||
document_id:
|
||||
|
||||
title: Windows 10 Enterprise Security
|
||||
|
||||
description: Learn about enterprise-grade security features for Windows 10.
|
||||
|
||||
keywords: protect, company, data, Windows, device, app, management, Microsoft365, e5, e3
|
||||
|
||||
ms.localizationpriority: medium
|
||||
|
||||
author: brianlic-msft
|
||||
|
||||
ms.author: brianlic
|
||||
|
||||
manager: brianlic
|
||||
|
||||
ms.date: 02/06/2018
|
||||
|
||||
ms.topic: article
|
||||
|
||||
ms.devlang: na
|
||||
|
||||
sections:
|
||||
|
||||
- items:
|
||||
|
||||
- type: markdown
|
||||
|
||||
text: Secure corporate data and manage risk.
|
||||
|
||||
- items:
|
||||
|
||||
- type: list
|
||||
|
||||
style: cards
|
||||
|
||||
className: cardsM
|
||||
|
||||
columns: 3
|
||||
|
||||
items:
|
||||
|
||||
- href: \windows\security\identity-protection\
|
||||
|
||||
html: <p>Deploy secure enterprise-grade authentication and access control to protect accounts and data</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
|
||||
|
||||
title: Identity and access management
|
||||
|
||||
- href: \windows\security\threat-protection\
|
||||
|
||||
html: <p>Stop cyberthreats and quickly identify and respond to breaches</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
|
||||
|
||||
title: Threat protection
|
||||
|
||||
- href: \windows\security\information-protection\
|
||||
|
||||
html: <p>Identify and secure critical data to prevent data loss</p>
|
||||
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_information-protection.svg
|
||||
|
||||
title: Information protection
|
||||
|
||||
### YamlMime:YamlDocument
|
||||
|
||||
documentType: LandingData
|
||||
|
||||
title: Windows 10 Enterprise Security
|
||||
|
||||
metadata:
|
||||
|
||||
document_id:
|
||||
@ -114,65 +34,64 @@ sections:
|
||||
|
||||
- type: markdown
|
||||
|
||||
text: Secure corporate data and manage risk.
|
||||
text: Secure corporate data and manage risk.
|
||||
|
||||
- items:
|
||||
|
||||
- type: list
|
||||
|
||||
style: cards
|
||||
style: cards
|
||||
|
||||
className: cardsM
|
||||
className: cardsM
|
||||
|
||||
columns: 3
|
||||
columns: 3
|
||||
|
||||
items:
|
||||
items:
|
||||
|
||||
- href: \windows\security\identity-protection\
|
||||
- href: \windows\security\identity-protection\
|
||||
|
||||
html: <p>Deploy secure enterprise-grade authentication and access control to protect accounts and data</p>
|
||||
html: <p>Deploy secure enterprise-grade authentication and access control to protect accounts and data</p>
|
||||
|
||||
image:
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
|
||||
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
|
||||
|
||||
title: Identity and access management
|
||||
title: Identity and access management
|
||||
|
||||
- href: \windows\security\threat-protection\
|
||||
- href: \windows\security\threat-protection\
|
||||
|
||||
html: <p>Stop cyberthreats and quickly identify and respond to breaches</p>
|
||||
html: <p>Stop cyberthreats and quickly identify and respond to breaches</p>
|
||||
|
||||
image:
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
|
||||
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
|
||||
|
||||
title: Threat protection
|
||||
title: Threat protection
|
||||
|
||||
- href: \windows\security\information-protection\
|
||||
- href: \windows\security\information-protection\
|
||||
|
||||
html: <p>Identify and secure critical data to prevent data loss</p>
|
||||
html: <p>Identify and secure critical data to prevent data loss</p>
|
||||
|
||||
image:
|
||||
image:
|
||||
|
||||
src: https://docs.microsoft.com/media/common/i_information-protection.svg
|
||||
src: https://docs.microsoft.com/media/common/i_information-protection.svg
|
||||
|
||||
title: Information protection
|
||||
title: Information protection
|
||||
|
||||
- title: Windows Defender Advanced Threat Protection
|
||||
- title: Windows Defender Advanced Threat Protection
|
||||
items:
|
||||
- type: markdown
|
||||
text: "
|
||||
Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP platform.
|
||||
<br> <br>
|
||||
<table border='0'><tr><td><b>Attack surface reduction</b></td><td><b>Next generation protection</b></td><td><b>Endpoint protection and response</b></td><td><b>Auto investigation and remediation</b></td><td><b>Security posture</b></td></tr>
|
||||
<tr><td>[Hardware based solation](https://docs.microsoft.com/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows)<br><br>[Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)<br><br>[Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard)<br><br>[Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)</td>
|
||||
<td>[Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)<br><br>[Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus)<br><br>[Web protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview)</td>
|
||||
<td>[Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)<br><br>[Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)<br><br>[Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)<br><br>[Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)<br><br>[Threat intelligence and custom detections](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection)</td>
|
||||
<td>[Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines)<br><br>[Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)<br><br>[Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline)<br><br>[Artificial intelligence response playbooks](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)</td>
|
||||
<td>[Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection)<br><br>[Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection)<br><br></td>
|
||||
</tr>
|
||||
</table>
|
||||
"
|
||||
Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP suite.
|
||||
<br> <br>
|
||||
<table border='0'><tr><td><b>Attack surface reduction</b></td><td><b>Next generation protection</b></td><td><b>Endpoint protection and response</b></td><td><b>Auto investigation and remediation</b></td><td><b>Security posture</b></td></tr>
|
||||
<tr><td>[Hardware based isolation](https://docs.microsoft.com/windows/security/hardware-protection/)<br><br>[Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)<br><br>[Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard)<br><br>[Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)<br><br>[Device restrictions](https://docs.microsoft.com/en-us/intune/device-restrictions-configure)<br><br>[Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard)</td>
|
||||
<td>[Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)<br><br>[Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus)<br><br>[Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)<br><br>[Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)</td>
|
||||
<td>[Alerts queue](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection)<br><br>[Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline)<br><br>[Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)<br><br>[API and SIEM integration](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection)<br><br>[Deep analysis](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)<br><br>[Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)<br><br>[Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines)</td>
|
||||
<td>[Automated investigation and remediation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)<br><br>[Threat remediation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#how-threats-are-remediated)<br><br>[Manage automated investigations](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#manage-automated-investigations)<br><br>[Analyze automated investigation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#analyze-automated-investigations)</td>
|
||||
<td>[Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection)<br><br>[Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection)</td>
|
||||
</tr>
|
||||
</table>"
|
||||
|
||||
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user