diff --git a/windows/security/index.yml b/windows/security/index.yml index bbcb1a3ec1..b928c6db2b 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -14,7 +14,7 @@ metadata: keywords: protect, company, data, Windows, device, app, management, Microsoft365, e5, e3 - ms.localizationpriority: high + ms.localizationpriority: medium author: brianlic-msft @@ -78,20 +78,199 @@ sections: title: Information protection -- title: Windows Defender Advanced Threat Protection +- title: Security features built in to Windows 10 + items: + + - type: paragraph + + text: 'Windows 10 enables critical security features to protect your device right from the start.' + + - type: list + + style: cards + + className: cardsM + + columns: 3 + + items: + + - href: \windows\security\hardware-protection\how-hardware-based-containers-help-protect-windows + + html:
Protect the boot process and maintain system integrity
+ + image: + + src: https://docs.microsoft.com/media/common/i_identity-protection.svg + + title: Windows Defender System Guard + + - href: \windows\security\threat-protection\windows-defender-antivirus\windows-defender-antivirus-in-windows-10 + + html:Protect against malware management using next-generation antivirus technologies
+ + image: + + src: https://docs.microsoft.com/media/common/i_threat-protection.svg + + title: Windows Defender Antivirus + + - href: \windows\security\information-protection\bitlocker\bitlocker-overview + + html:Prevent data theft from lost or stolen devices
+ + image: + + src: https://docs.microsoft.com/media/common/i_information-protection.svg + + title: BitLocker + +- title: Security features in Microsoft 365 E3 + + items: + + - type: paragraph + + text: 'Windows 10 Enterprise provides the foundation for Microsoft 365 E3 and a secure modern workplace.' + + - type: list + + style: cards + + className: cardsM + + columns: 3 + + items: + + - href: \windows\security\identity-protection\hello-for-business\hello-overview + + html:Give users a more personal and secure way to access their devices
+ + image: + + src: https://docs.microsoft.com/media/common/i_identity-protection.svg + + title: Windows Hello for Business + + - href: \windows\security\threat-protection\windows-defender-application-control\windows-defender-application-control + + html:Lock down applications that run on a device
+ + image: + + src: https://docs.microsoft.com/media/common/i_threat-protection.svg + + title: Windows Defender Application Control + + - href: \windows\security\information-protection\windows-information-protection\protect-enterprise-data-using-wip + + html:Prevent accidental data leaks from enterprise devices
+ + image: + + src: https://docs.microsoft.com/media/common/i_information-protection.svg + + title: Windows Information Protection + +- title: Security features in Microsoft 365 E5 + + items: + + - type: paragraph + + text: 'Get all of the protection from Microsoft 365 E3 security, plus these cloud-based security features to help you defend against even the most advanced threats.' + + - type: list + + style: cards + + className: cardsM + + columns: 3 + + items: + + - href: https://docs.microsoft.com/azure/active-directory/active-directory-identityprotection + + html:Identity Protection and Privileged Identity Management
+ + image: + + src: https://docs.microsoft.com/media/common/i_identity-protection.svg + + title: Azure Active Directory P2 + + - href: \windows\security\threat-protection\Windows-defender-atp\windows-defender-advanced-threat-protection + + html:Detect, investigate, and respond to advanced cyberattacks
+ + image: + + src: https://docs.microsoft.com/media/common/i_threat-protection.svg + + title: Windows Defender Advanced Threat Protection + + - href: https://www.microsoft.com/cloud-platform/azure-information-protection + + html:Protect documents and email automatically
+ + image: + + src: https://docs.microsoft.com/media/common/i_information-protection.svg + + title: Azure Information Protection P2 + +- title: Videos + + items: + - type: markdown - text: " - Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP suite. -Attack surface reduction | Next generation protection | Endpoint protection and response | Auto investigation and remediation | Security posture |
[Isolation](https://docs.microsoft.com/windows/security/hardware-protection/) [Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control) [Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard) [Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard) [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard) |
- [Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus) [Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) [Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection) [Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis) |
- [Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection) [Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection) [Threat intelligence and custom detections](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection) |
- [Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines) [Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection) [Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline) [Artificial intelligence response playbooks](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection) |
- [Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection) [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection) [Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection) |
-