diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 35ec08266d..59d7c625ad 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -46,7 +46,6 @@ ### [Next-generation protection]() #### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) -#### [Behavioral blocking and containment](windows-defender-antivirus/next-gen-behavior-blocking.md) #### [Shadow protection](windows-defender-antivirus/shadow-protection.md) #### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoft-antivirus.md) #### [Better together: Windows Defender Antivirus and Office 365](windows-defender-antivirus/office-365-windows-defender-antivirus.md) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 285e14d1c5..37fbb5cc46 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -74,7 +74,7 @@ The attack surface reduction set of capabilities provide the first line of defen **[Next generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)**
To further reinforce the security perimeter of your network, Microsoft Defender ATP uses next generation protection designed to catch all types of emerging threats. -- [Behavioral-based blocking](/windows/security/threat-protection/windows-defender-antivirus/next-gen-behavior-blocking.md) +- [Behavior monitoring](/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) - [Cloud-based protection](/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) - [Machine learning](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md) - [URL Protection](/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md) diff --git a/windows/security/threat-protection/windows-defender-antivirus/next-gen-behavior-blocking.md b/windows/security/threat-protection/windows-defender-antivirus/next-gen-behavior-blocking.md deleted file mode 100644 index e4ca0864be..0000000000 --- a/windows/security/threat-protection/windows-defender-antivirus/next-gen-behavior-blocking.md +++ /dev/null @@ -1,50 +0,0 @@ ---- -title: Behavioral blocking in next-generation protection -description: Learn about behavioral blocking in next-generation protection -keywords: Windows Defender Antivirus, behavioral monitoring, behavioral blocking, behavior -search.product: eADQiWindows 10XVcnh -ms.pagetype: security -author: denisebmsft -ms.author: deniseb -manager: dansimp -ms.reviewer: shwetaj -audience: ITPro -ms.topic: article -ms.prod: w10 -localization_priority: Normal -ms.custom: next-gen -ms.collection: ---- - -# Behavioral blocking in next-generation protection - -**Applies to:** - -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -## What is behavioral blocking? - -Behavioral blocking and containment capabilities in Microsoft Defender ATP use machine learning to identify threats through behavioral patterns. When threats are detected, they are monitored, processed, classified by machine learning, and blocked, almost instantly. Windows Defender Antivirus on your machine works together with Microsoft Defender ATP to offer this protection. - -Behavioral blocking is a post-execution protection, as shown in the following diagram: - -![diagram of pre and post execution protection](images/pre-execution-and-post-execution-detection-engines.png) - -> [!TIP] -> See the blog post, [In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks](https://www.microsoft.com/security/blog/2019/10/08/in-hot-pursuit-of-elusive-threats-ai-driven-behavior-based-blocking-stops-attacks-in-their-tracks). - -## Components of behavioral blocking - -Behavioral blocking consists of the following components: - -- Behavior-based machine learning -- Rapid-protection feedback loop -- [Shadow protection](shadow-protection.md) -- Client-side behavioral blocking -- Containment during automated investigation and remediation - -## Next steps - -- [Deploy Microsoft Defender ATP baselines](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline) - -- [Turn on shadow protection](shadow-protection.md) \ No newline at end of file