From fd7c6486d7c35df1e39c244678967dcec26461e5 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Thu, 4 Apr 2019 23:56:15 +0000 Subject: [PATCH] Updated next-gen-threat-and-vuln-mgt.md --- .../windows-defender-atp/next-gen-threat-and-vuln-mgt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md index 3018ea4c05..35afd62e1b 100644 --- a/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -25,7 +25,7 @@ ms.topic: conceptual Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program an dreducing organizational risk. -Threat and Vulnerability Management serves as an infrustructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. It provides the following solutions to frequently-cited gaps across security operations, security administration, and IT administration workflows and communication. +Threat & Vulnerability Management serves as an infrustructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. It provides the following solutions to frequently-cited gaps across security operations, security administration, and IT administration workflows and communication. - Continuous threat and vulnerability exposure discovery with runtime information - Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities - Linked vulnerability and security configuration assessment data in the context of exposure discovery