This commit is contained in:
Joey Caparas 2018-07-11 14:26:10 -07:00
parent 7a312e04f8
commit d770d38be0

View File

@ -14,7 +14,7 @@ metadata:
keywords: protect, company, data, Windows, device, app, management, Microsoft365, e5, e3
ms.localizationpriority: high
ms.localizationpriority: medium
author: brianlic-msft
@ -78,20 +78,199 @@ sections:
title: Information protection
- title: Windows Defender Advanced Threat Protection
- title: Security features built in to Windows 10
items:
- type: paragraph
text: 'Windows 10 enables critical security features to protect your device right from the start.'
- type: list
style: cards
className: cardsM
columns: 3
items:
- href: \windows\security\hardware-protection\how-hardware-based-containers-help-protect-windows
html: <p>Protect the boot process and maintain system integrity</p>
image:
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
title: Windows Defender System Guard
- href: \windows\security\threat-protection\windows-defender-antivirus\windows-defender-antivirus-in-windows-10
html: <p>Protect against malware management using next-generation antivirus technologies</p>
image:
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
title: Windows Defender Antivirus
- href: \windows\security\information-protection\bitlocker\bitlocker-overview
html: <p>Prevent data theft from lost or stolen devices</p>
image:
src: https://docs.microsoft.com/media/common/i_information-protection.svg
title: BitLocker
- title: Security features in Microsoft 365 E3
items:
- type: paragraph
text: 'Windows 10 Enterprise provides the foundation for Microsoft 365 E3 and a secure modern workplace.'
- type: list
style: cards
className: cardsM
columns: 3
items:
- href: \windows\security\identity-protection\hello-for-business\hello-overview
html: <p>Give users a more personal and secure way to access their devices</p>
image:
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
title: Windows Hello for Business
- href: \windows\security\threat-protection\windows-defender-application-control\windows-defender-application-control
html: <p>Lock down applications that run on a device</p>
image:
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
title: Windows Defender Application Control
- href: \windows\security\information-protection\windows-information-protection\protect-enterprise-data-using-wip
html: <p>Prevent accidental data leaks from enterprise devices</p>
image:
src: https://docs.microsoft.com/media/common/i_information-protection.svg
title: Windows Information Protection
- title: Security features in Microsoft 365 E5
items:
- type: paragraph
text: 'Get all of the protection from Microsoft 365 E3 security, plus these cloud-based security features to help you defend against even the most advanced threats.'
- type: list
style: cards
className: cardsM
columns: 3
items:
- href: https://docs.microsoft.com/azure/active-directory/active-directory-identityprotection
html: <p>Identity Protection and Privileged Identity Management</p>
image:
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
title: Azure Active Directory P2
- href: \windows\security\threat-protection\Windows-defender-atp\windows-defender-advanced-threat-protection
html: <p>Detect, investigate, and respond to advanced cyberattacks</p>
image:
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
title: Windows Defender Advanced Threat Protection
- href: https://www.microsoft.com/cloud-platform/azure-information-protection
html: <p>Protect documents and email automatically</p>
image:
src: https://docs.microsoft.com/media/common/i_information-protection.svg
title: Azure Information Protection P2
- title: Videos
items:
- type: markdown
text: "
Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP suite.
<br>&nbsp;<br>
<table border='0'><tr><td><b>Attack surface reduction</b></td><td><b>Next generation protection</b></td><td><b>Endpoint protection and response</b></td><td><b>Auto investigation and remediation</b></td><td><b>Security posture</b></td></tr>
<tr><td>[Isolation](https://docs.microsoft.com/windows/security/hardware-protection/)<br><br>[Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)<br><br>[Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard)<br><br>[Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)<br><br>[Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard)</td>
<td>[Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus)<br><br>[Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)<br><br>[Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)<br><br>[Sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)</td>
<td>[Response containment](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)<br><br>[Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)<br><br>[Threat intelligence and custom detections](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection)</td>
<td>[Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines)<br><br>[Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)<br><br>[Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline)<br><br>[Artificial intelligence response playbooks](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)</td>
<td>[Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)<br><br>[Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection)<br><br>[Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection)<br><br></td>
</tr>
</table>
"
text: ">[![VIDEO](images/next-generation-windows-security-vision.png)](https://www.youtube.com/watch?v=IvZySDNfNpo)"
- type: markdown
text: ">[![VIDEO](images/fall-creators-update-next-gen-security.png)](https://www.youtube.com/watch?v=JDGMNFwyUg8)"
- title: Additional security features in Windows 10
items:
- type: paragraph
text: 'These additional security features are also built in to Windows 10 Enterprise.'
- type: list
style: unordered
items:
- html: <a href="/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security">Windows Defender Firewall</a>
- html: <a href="/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard">Windows Defender Exploit Guard</a>
- html: <a href="/windows/security/identity-protection/credential-guard/credential-guard">Windows Defender Credential Guard</a>
- html: <a href="/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control">Windows Defender Application Control</a>
- html: <a href="/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview">Windows Defender Application Guard</a>
- html: <a href="/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview">Windows Defender SmartScreen</a>
- html: <a href="/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center">Windows Defender Security Center</a>
- title: Security Resources
items:
- type: list
style: unordered
items:
- html: <a href="https://www.microsoft.com/wdsi">Windows Defender Security Intelligence</a>
- html: <a href="https://cloudblogs.microsoft.com/microsoftsecure/">Microsoft Secure blog</a>
- html: <a href="https://portal.msrc.microsoft.com/">Security Update blog</a>
- html: <a href="https://technet.microsoft.com/security/dn440717.aspx(d=robot)">Microsoft Security Response Center (MSRC)</a>
- html: <a href="https://blogs.technet.microsoft.com/msrc/">MSRC Blog</a>
- html: <a href="https://www.microsoft.com/wdsi/threats/ransomware">Ransomware FAQ</a>