You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-servers-introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ Microsoft Defender for Servers is one of the plans provided by Microsoft Defende
16
16
Defender for Servers provides two plans you can choose from:
17
17
18
18
-**Plan 1**
19
-
-**MDE Integration**: Plan 1 integrates with [Microsoft Defender for Endpoint Plan 2](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2) to provides a full endpoint detection and response (EDR) solution for machines running a [range of operating systems](/microsoft-365/security/defender-endpoint/minimum-requirements). Defender for Endpoint features include:
19
+
-**MDE Integration**: Plan 1 integrates with [Microsoft Defender for Endpoint Plan 2](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2) to provide a full endpoint detection and response (EDR) solution for machines running a [range of operating systems](/microsoft-365/security/defender-endpoint/minimum-requirements). Defender for Endpoint features include:
20
20
- [Reducing the attack surface](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction) for machines.
- Threat management, including [threat hunting](/microsoft-365/security/defender-endpoint/advanced-hunting-overview), [detection](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response), [analytics](/microsoft-365/security/defender-endpoint/threat-analytics), and [automated investigation and response](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response).
@@ -38,7 +38,7 @@ The following table summarizes what's included in each plan.
38
38
|**Integrated vulnerability assessment powered by Qualys**| Use the Qualys scanner for real-time identification of vulnerabilities in Azure and hybrid VMs. Everything's handled by Defender for Cloud. You don't need a Qualys license or even a Qualys account. [Learn more](deploy-vulnerability-assessment-vm.md). || :::image type="icon" source="./media/icons/yes-icon.png"::: |
39
39
|**Log Analytics 500 MB free data ingestion**| Defender for Cloud leverages Azure Monitor to collect data from Azure VMs and servers, using the Log Analytics agent. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
40
40
|**Threat detection**| Defender for Cloud detects threats at the OS level, network layer, and control plane. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
41
-
|**Adaptive application controls (AAC)**|[AACs](adaptive-application-controls.md) in Defender for Cloud define allow lists of known safe applications for machines. ||:::image type="icon" source="./media/icons/yes-icon.png"::: |
41
+
|**Adaptive application controls (AAC)**|[AACs](adaptive-application-controls.md) in Defender for Cloud define allowlists of known safe applications for machines. ||:::image type="icon" source="./media/icons/yes-icon.png"::: |
42
42
|**File integrity monitoring (FIM)**|[FIM](file-integrity-monitoring-overview.md) (change monitoring) examines files and registries for changes that might indicate an attack. A comparison method is used to determine whether suspicious modifications have been made to files. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
43
43
|**Just-in-time VM access for management ports**| Defender for Cloud provides [JIT access](just-in-time-access-overview.md), locking down machine ports to reduce the machine's attack surface.|| :::image type="icon" source="./media/icons/yes-icon.png"::: |
44
44
|**Adaptive network hardening**| Filtering traffic to and from resources with network security groups (NSG) improves your network security posture. You can further improve security by [hardening the NSG rules](adaptive-network-hardening.md) based on actual traffic patterns. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
0 commit comments