You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,12 +24,12 @@ Microsoft Defender for Endpoint is an enterprise endpoint security platform desi
24
24
Defender for Endpoint is part of [Microsoft Defender XDR](/defender-xdr/) and can be [integrated](threat-protection-integration.md) with other Microsoft solutions, including:
25
25
26
26
*[Microsoft Defender for Cloud](/azure/defender-for-cloud/)
27
-
*[Microsoft Sentinel](/azure/sentinel/)
28
-
*[Intune](/intune/intune-service/)
29
27
*[Microsoft Defender for Cloud Apps](/defender-cloud-apps/)
30
28
*[Microsoft Defender for Identity](/defender-for-identity/)
31
29
*[Microsoft Defender for Office](/defender-office-365/)
@@ -56,9 +56,9 @@ This section lists key Defender for Endpoint capabilities and provides links to
56
56
| Capability | Description |
57
57
|---|---|
58
58
|[Attack surface reduction](overview-attack-surface-reduction.md)|Ensures endpoint settings are properly configured and secure, and that vulnerabilities are mitigated. Includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs. |
59
-
|[Next-generation protection](next-generation-protection.md)|Designed to emerging threats to enforce the security perimeter of your network. |
59
+
|[Next-generation protection](next-generation-protection.md)|Catch and block all types of emerging threats. |
60
60
|[Endpoint detection and response](overview-endpoint-detection-response.md)|Detect, investigate, and respond to advanced threats. Includes [advanced hunting](/defender-xdr/advanced-hunting-overview) which provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections. |
61
-
|[Automated investigation and remediation](automated-investigations.md)|Automatic investigation and remediation capabilities |
61
+
|[Automated investigation and remediation](automated-investigations.md)|Automatic investigation and remediation capabilities.|
62
62
|[Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices)|Assess the security state of your network, identify unprotected systems, and take actions to improve your organization's security. |
63
63
|[Endpoint Attack Notifications](endpoint-attack-notifications.md)|Proactive hunting, prioritization, and insights that help identify and respond to threats. |
64
64
|[APIs](api/management-apis.md)|Automate Defender for Endpoint and integrate it into your existing workflows. |
0 commit comments