You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: Microsoft Defender for Endpoint
3
3
description: Microsoft Defender for Endpoint is an enterprise endpoint security platform that helps defend against advanced persistent threats.
4
4
ms.service: defender-endpoint
5
-
ms.author: ewalsh
6
-
author: emmwalshh
5
+
ms.author: deniseb
6
+
author: denisebmsft
7
7
ms.localizationpriority: high
8
8
manager: deniseb
9
9
audience: ITPro
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.custom: intro-overview
15
15
ms.topic: conceptual
16
16
search.appverid: met150
17
-
ms.date: 03/21/2025
17
+
ms.date: 09/25/2024
18
18
---
19
19
20
20
# Microsoft Defender for Endpoint
@@ -45,7 +45,7 @@ Watch the following video to learn more about Defender for Endpoint:
45
45
46
46
Defender for Endpoint uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
47
47
48
-
-**Endpoint behavioral sensors**: These sensors are embedded in Windows 10, collecting and processing behavioral signals from the operating system. The sensor data is then sent to your private, isolated cloud instance of Microsoft Defender for Endpoint.
48
+
-**Endpoint behavioral sensors**: Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system and send this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint.
49
49
50
50
-**Cloud security analytics**: Using big-data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
51
51
@@ -76,12 +76,12 @@ Defender for Endpoint uses the following combination of technology built into Wi
> - Learn about the latest enhancements in Defender for Endpoint: [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md)?
79
+
> - Learn about the latest enhancements in Defender for Endpoint: [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md).
80
80
> - Microsoft Defender for Endpoint demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).
81
81
82
82
83
83
> [!IMPORTANT]
84
-
> The capabilities on non-Windows platforms might be different from the ones for Windows. For more information on what capabilities are available for non-Windows platforms, see [Microsoft Defender for Endpoint for non-Windows platforms](non-windows.md).
84
+
> The capabilities on non-Windows platforms may be different from the ones for Windows. For more information on what capabilities are available for non-Windows platforms, see [Microsoft Defender for Endpoint for non-Windows platforms](non-windows.md).
85
85
86
86
<aname="tvm"></a>
87
87
@@ -95,7 +95,7 @@ For more information on the different vulnerability management capabilities avai
The attack surface reduction set of capabilities provides the frontline of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, the capabilities resist attacks and exploitation. This set of capabilities also includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs.
98
+
The attack surface reduction set of capabilities provides the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, the capabilities resist attacks and exploitation. This set of capabilities also includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs.
99
99
100
100
<aname="ngp"></a>
101
101
@@ -113,7 +113,7 @@ Endpoint detection and response capabilities are put in place to detect, investi
113
113
114
114
**[Automated investigation and remediation](automated-investigations.md)**
115
115
116
-
With being able to quickly, respond to advanced attacks. Microsoft Defender for Endpoint offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
116
+
In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender for Endpoint offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
117
117
118
118
<aname="ss"></a>
119
119
@@ -123,14 +123,14 @@ Defender for Endpoint includes Microsoft Secure Score for Devices to help you dy
Microsoft Defender for Endpoint's managed threat hunting service provides proactive hunting, prioritization, and more context and insights that further empower security operation centers (SOCs) to identify and respond to threats quickly and accurately.
128
+
Microsoft Defender for Endpoint's new managed threat hunting service provides proactive hunting, prioritization, and more context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
129
129
130
130
> [!IMPORTANT]
131
-
> Defenders for Endpoint customers need to apply for the Microsoft's managed threat hunting service to get proactive Endpoint Attack Notifications and to collaborate with experts on demand. Experts on Demand are an add-on service. Endpoint Attack Notifications are always included after you have been accepted into Microsoft Defender Experts managed threat hunting service.
131
+
> Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
132
132
>
133
-
> If you aren't enrolled yet and would like to experience its benefits, go to **Settings**\>**Endpoints**\>**Advanced features**\>**Endpoint Attack Notifications** to apply. Once accepted, you get the benefits of Endpoint Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Expert on Demand subscription.
133
+
> If you aren't enrolled yet and would like to experience its benefits, go to **Settings**\>**General**\>**Advanced features**\>**Microsoft Threat Experts** to apply. Once accepted, you'll get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on Demand subscription.
0 commit comments