Skip to content

Commit 0b1e4ff

Browse files
committed
Final touches
1 parent 8787e08 commit 0b1e4ff

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

defender-endpoint/microsoft-defender-endpoint.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,12 @@ Microsoft Defender for Endpoint is an enterprise endpoint security platform desi
2424
Defender for Endpoint is part of [Microsoft Defender XDR](/defender-xdr/) and can be [integrated](threat-protection-integration.md) with other Microsoft solutions, including:
2525

2626
* [Microsoft Defender for Cloud](/azure/defender-for-cloud/)
27-
* [Microsoft Sentinel](/azure/sentinel/)
28-
* [Intune](/intune/intune-service/)
2927
* [Microsoft Defender for Cloud Apps](/defender-cloud-apps/)
3028
* [Microsoft Defender for Identity](/defender-for-identity/)
3129
* [Microsoft Defender for Office](/defender-office-365/)
3230
* [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
31+
* [Microsoft Sentinel](/azure/sentinel/)
32+
* [Intune](/intune/intune-service/)
3333

3434
## Operating systems
3535

@@ -56,9 +56,9 @@ This section lists key Defender for Endpoint capabilities and provides links to
5656
| Capability | Description |
5757
|---|---|
5858
|[Attack surface reduction](overview-attack-surface-reduction.md) |Ensures endpoint settings are properly configured and secure, and that vulnerabilities are mitigated. Includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs. |
59-
|[Next-generation protection](next-generation-protection.md) |Designed to emerging threats to enforce the security perimeter of your network. |
59+
|[Next-generation protection](next-generation-protection.md) |Catch and block all types of emerging threats. |
6060
|[Endpoint detection and response](overview-endpoint-detection-response.md) |Detect, investigate, and respond to advanced threats. Includes [advanced hunting](/defender-xdr/advanced-hunting-overview) which provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections. |
61-
|[Automated investigation and remediation](automated-investigations.md) |Automatic investigation and remediation capabilities |
61+
|[Automated investigation and remediation](automated-investigations.md) |Automatic investigation and remediation capabilities. |
6262
|[Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices) |Assess the security state of your network, identify unprotected systems, and take actions to improve your organization's security. |
6363
|[Endpoint Attack Notifications](endpoint-attack-notifications.md) |Proactive hunting, prioritization, and insights that help identify and respond to threats. |
6464
|[APIs](api/management-apis.md) |Automate Defender for Endpoint and integrate it into your existing workflows. |

0 commit comments

Comments
 (0)