mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 23:37:22 +00:00
add key capabilities
This commit is contained in:
parent
af037bdf6f
commit
b8da66ffad
@ -27,8 +27,12 @@ ms.topic: article
|
|||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Microsoft Defender for Endpoint has the capabilities to effectively protect your enterprise from cyber threats.
|
||||||
|
|
||||||
Learn how to deploy Microsoft Defender for Endpoint so that your enterprise can take advantage of preventative protection, post-breach detection, automated investigation, and response.
|
Learn how to deploy Microsoft Defender for Endpoint so that your enterprise can take advantage of preventative protection, post-breach detection, automated investigation, and response.
|
||||||
|
|
||||||
|
|
||||||
This solution provides guidance on the three phases of deployment. Each section corresponds to a separate article in this solution.
|
This solution provides guidance on the three phases of deployment. Each section corresponds to a separate article in this solution.
|
||||||
|
|
||||||

|

|
||||||
@ -36,8 +40,6 @@ This solution provides guidance on the three phases of deployment. Each section
|
|||||||
Regardless of the environment architecture and method of deployment you choose outlined in the [Plan deployment](deployment-strategy.md) guidance, this guide is going to support you in onboarding endpoints.
|
Regardless of the environment architecture and method of deployment you choose outlined in the [Plan deployment](deployment-strategy.md) guidance, this guide is going to support you in onboarding endpoints.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Prepare
|
## Prepare
|
||||||
Learn about what you need to consider when deploying Defender for Endpoint such as stakeholder approvals, environment considerations, access permissions, and adoption order of capabilities.
|
Learn about what you need to consider when deploying Defender for Endpoint such as stakeholder approvals, environment considerations, access permissions, and adoption order of capabilities.
|
||||||
|
|
||||||
@ -48,12 +50,21 @@ Get guidance on the initial steps you need to take so that you can access the po
|
|||||||
Learn how to make use of deployment rings, supported onboarding tools based on the type of endpoint, and configuring available capabilities.
|
Learn how to make use of deployment rings, supported onboarding tools based on the type of endpoint, and configuring available capabilities.
|
||||||
|
|
||||||
|
|
||||||
|
## Key capabilities
|
||||||
|
|
||||||
|
This solution provides the following key capabilities:
|
||||||
|
|
||||||
|
Capability | Description
|
||||||
|
:---|:---
|
||||||
|
Block sophisticated threats and malware | Defend against never-before-seen polymorphic and metamorphic malware and fileless and file-based threats with next-generation protection.
|
||||||
|
Quickly go from alert to remediation at scale with automation | Automatically investigate alerts and remediate complex threats in minutes. Apply best practices and intelligent decision-making algorithms to determine whether a threat is active and what action to take.
|
||||||
|
Discover vulnerabilities and misconfigurations in real time | Bring security and IT together with Microsoft Threat & Vulnerability Management to quickly discover, prioritize, and remediate vulnerabilities and misconfigurations.
|
||||||
|
Get expert-level threat monitoring and analysis | Empower your security operations centers with Microsoft Threat Experts. Get deep knowledge, advanced threat monitoring, analysis, and support to identify critical threats in your unique environment.
|
||||||
|
|
||||||
|
|
||||||
## Scope
|
## Scope
|
||||||
|
|
||||||
|
### In scope
|
||||||
### In Scope
|
|
||||||
|
|
||||||
The following guidance is in scope for this deployment guide:
|
|
||||||
|
|
||||||
- Use of Microsoft Endpoint Configuration Manager and Microsoft Endpoint Manager to onboard endpoints into the service and configure capabilities
|
- Use of Microsoft Endpoint Configuration Manager and Microsoft Endpoint Manager to onboard endpoints into the service and configure capabilities
|
||||||
|
|
||||||
@ -75,6 +86,13 @@ The following are out of scope of this deployment guide:
|
|||||||
|
|
||||||
- Penetration testing in production environment
|
- Penetration testing in production environment
|
||||||
|
|
||||||
|
## Key capabilities
|
||||||
|
This solution provides the following key capabilities:
|
||||||
|
|
||||||
|
-
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
- [Phase 1: Prepare](prepare-deployment.md)
|
- [Phase 1: Prepare](prepare-deployment.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user