Skip to content

Commit 01fbf50

Browse files
committed
minor bug fix
1 parent 4af61c3 commit 01fbf50

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

learn-pr/wwl-sci/describe-threat-protection-with-microsoft-365-defender/includes/6-describe-defender-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ At a high level, the way Microsoft Defender for Identity works is as follows:
55

66
- Microsoft Defender for Identity uses software-based sensors installed on your on-premises identity infrastructure servers (domain controllers and servers running Active Directory Federated Services and Active Directory Certificate Services).
77

8-
- The Defender for Identity sensor accesses the event logs it requires directly from the servers. After the logs and network traffic are parsed by the sensor, Defender for Identity sends only the parsed information to the Defender for Identity cloud service. The Defender for Identity cloud service uses the data/signals obtained to deliver an identity threat detection and response (IDTR) solution. Microsoft Defender for Identity helps security professionals, managing a hybrid environment, the functionality to:
8+
- The Defender for Identity sensor accesses the event logs it acquires directly from the servers. After the logs and network traffic are parsed by the sensor, Defender for Identity sends only the parsed information to the Defender for Identity cloud service. The Defender for Identity cloud service uses the data/signals obtained to deliver an identity threat detection and response (IDTR) solution. Microsoft Defender for Identity helps security professionals, managing a hybrid environment, the functionality to:
99
- Prevent breaches, by proactively assessing your identity posture.
1010
- Detect threats, using real-time analytics and data intelligence.
1111
- Investigate suspicious activities, using clear, actionable incident information.

0 commit comments

Comments
 (0)