Skip to content

Commit 440c65f

Browse files
committed
Table order
1 parent 22e18e0 commit 440c65f

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

defender-endpoint/microsoft-defender-endpoint.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,13 @@ This section lists key Defender for Endpoint capabilities and provides links to
5555

5656
| Capability | Description |
5757
|---|---|
58+
|[APIs](api/management-apis.md) |Automate Defender for Endpoint and integrate it into your existing workflows. |
5859
|[Attack surface reduction](overview-attack-surface-reduction.md) |Ensures endpoint settings are properly configured and secure, and that vulnerabilities are mitigated. Includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs. |
59-
|[Next-generation protection](next-generation-protection.md) |Catch and block all types of emerging threats. |
60-
|[Endpoint detection and response](overview-endpoint-detection-response.md) |Detect, investigate, and respond to advanced threats. Includes [advanced hunting](/defender-xdr/advanced-hunting-overview) which provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections. |
6160
|[Automated investigation and remediation](automated-investigations.md) |Automatic investigation and remediation capabilities. |
62-
|[Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices) |Assess the security state of your network, identify unprotected systems, and take actions to improve your organization's security. |
6361
|[Endpoint Attack Notifications](endpoint-attack-notifications.md) |Proactive hunting, prioritization, and insights that help identify and respond to threats. |
64-
|[APIs](api/management-apis.md) |Automate Defender for Endpoint and integrate it into your existing workflows. |
62+
|[Endpoint detection and response](overview-endpoint-detection-response.md) |Detect, investigate, and respond to advanced threats. Includes [advanced hunting](/defender-xdr/advanced-hunting-overview) which provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections. |
63+
|[Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices) |Assess the security state of your network, identify unprotected systems, and take actions to improve your organization's security. |
64+
|[Next-generation protection](next-generation-protection.md) |Catch and block all types of emerging threats. |
6565

6666
## Privacy and compliance
6767

0 commit comments

Comments
 (0)