Skip to content

Commit 8d8a327

Browse files
committed
Update microsoft-defender-endpoint.md
1 parent f256881 commit 8d8a327

File tree

1 file changed

+8
-11
lines changed

1 file changed

+8
-11
lines changed

defender-endpoint/microsoft-defender-endpoint.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,12 @@ ms.date: 09/25/2024
3131

3232
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
3333
34-
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
35-
36-
> [!NOTE]
37-
> Example endpoints may include laptops, phones, tablets, PCs, access points, routers, and firewalls.
34+
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. Example endpoints include laptops, phones, tablets, PCs, access points, routers, and firewalls.
3835

3936
> [!TIP]
4037
> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
4138
>
42-
> For more information on the features and capabilities included in each plan, including the new Defender Vulnerability Management add-on, see [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
39+
> For more information on the features and capabilities included in each plan, including the Defender Vulnerability Management add-on, see [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
4340
4441

4542
Watch the following video to learn more about Defender for Endpoint:
@@ -50,9 +47,9 @@ Defender for Endpoint uses the following combination of technology built into Wi
5047

5148
- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system and send this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint.
5249

53-
- **Cloud security analytics**: Leveraging big-data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
50+
- **Cloud security analytics**: Using big-data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
5451

55-
- **Threat intelligence**: Generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when they are observed in collected sensor data.
52+
- **Threat intelligence**: Generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when they're observed in collected sensor data.
5653

5754
<center><h2>Microsoft Defender for Endpoint</center></h2>
5855
<table>
@@ -110,7 +107,7 @@ To further reinforce the security perimeter of your network, Microsoft Defender
110107

111108
**[Endpoint detection and response](overview-endpoint-detection-response.md)**
112109

113-
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. [Advanced hunting](/defender-xdr/advanced-hunting-overview) provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections.
110+
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that might have made it past the first two security pillars. [Advanced hunting](/defender-xdr/advanced-hunting-overview) provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections.
114111

115112
<a name="ai"></a>
116113

@@ -128,12 +125,12 @@ Defender for Endpoint includes Microsoft Secure Score for Devices to help you dy
128125

129126
**[Microsoft Threat Experts](endpoint-attack-notifications.md)**
130127

131-
Microsoft Defender for Endpoint's new managed threat hunting service provides proactive hunting, prioritization, and additional context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
128+
Microsoft Defender for Endpoint's new managed threat hunting service provides proactive hunting, prioritization, and more context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
132129

133130
> [!IMPORTANT]
134131
> Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
135132
>
136-
> If you are not enrolled yet and would like to experience its benefits, go to **Settings** \> **General** \> **Advanced features** \> **Microsoft Threat Experts** to apply. Once accepted, you will get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on Demand subscription.
133+
> If you aren't enrolled yet and would like to experience its benefits, go to **Settings** \> **General** \> **Advanced features** \> **Microsoft Threat Experts** to apply. Once accepted, you'll get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on Demand subscription.
137134
138135
<a name="apis"></a>
139136

@@ -157,7 +154,7 @@ Defender for Endpoint directly integrates with various Microsoft solutions, incl
157154

158155
**[Microsoft Defender XDR](/defender-xdr/microsoft-365-defender)**
159156

160-
With Microsoft Defender XDR, Defender for Endpoint, and various Microsoft security solutions, form a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.
157+
With Microsoft Defender XDR, Defender for Endpoint, and various Microsoft security solutions, you have a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.
161158

162159
## Security, privacy, and compliance information
163160

0 commit comments

Comments
 (0)