mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 12:23:37 +00:00
Update menu items
This commit is contained in:
@ -63,37 +63,37 @@ The following table provides information on the icons used all throughout the po
|
||||
|
||||
Icon | Description
|
||||
:---|:---
|
||||
| ATP logo
|
||||
| Alert – Indication of an activity correlated with advanced attacks.
|
||||
| Detection – Indication of a malware threat detection.
|
||||
| Active threat – Threats actively executing at the time of detection.
|
||||
| Remediated – Threat removed from the machine.
|
||||
| Not remediated – Threat not removed from the machine.
|
||||
| Indicates events that triggered an alert in the **Alert process tree**.
|
||||
| Machine icon
|
||||
| Windows Defender AV events
|
||||
| Application Guard events
|
||||
| Device Guard events
|
||||
| Exploit Guard events
|
||||
| Smart Screen events
|
||||
| Firewall events
|
||||
| Response action
|
||||
| Process events
|
||||
| Network events
|
||||
| File events
|
||||
| Registry events
|
||||
| Load DLL events
|
||||
| Other events
|
||||
| Access token modification
|
||||
| File creation
|
||||
| Signer
|
||||
| File path
|
||||
| Command line
|
||||
| Unsigned file
|
||||
| Process tree
|
||||
| Memory allocation
|
||||
| Process injection
|
||||
| Powershell command run
|
||||
| ATP logo
|
||||
| Alert – Indication of an activity correlated with advanced attacks.
|
||||
| Detection – Indication of a malware threat detection.
|
||||
| Active threat – Threats actively executing at the time of detection.
|
||||
| Remediated – Threat removed from the machine.
|
||||
| Not remediated – Threat not removed from the machine.
|
||||
| Indicates events that triggered an alert in the **Alert process tree**.
|
||||
| Machine icon
|
||||
| Windows Defender AV events
|
||||
| Application Guard events
|
||||
| Device Guard events
|
||||
| Exploit Guard events
|
||||
| Smart Screen events
|
||||
| Firewall events
|
||||
| Response action
|
||||
| Process events
|
||||
| Network events
|
||||
| File events
|
||||
| Registry events
|
||||
| Load DLL events
|
||||
| Other events
|
||||
| Access token modification
|
||||
| File creation
|
||||
| Signer
|
||||
| File path
|
||||
| Command line
|
||||
| Unsigned file
|
||||
| Process tree
|
||||
| Memory allocation
|
||||
| Process injection
|
||||
| Powershell command run
|
||||
|
||||
## Related topic
|
||||
[Use the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md)
|
Reference in New Issue
Block a user