Microsoft Threat Protection

Applies to:

Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace.

For more information on Microsoft Threat Protection, see Announcing Microsoft Threat Protection.

Microsoft's multiple layers of threat protection across data, applications, devices, and identities can help protect your organization from advanced cyber threats.

Each layer in the threat protection stack plays a critical role in protecting customers. The deep integration between these layers results in better protected customers.

Azure Advanced Threat Protection (Azure ATP)

Suspicious activities are processes running under a user context. The integration between Windows Defender ATP and Azure ATP provides the flexibility of conducting cyber security investigation across activities and identities.

Azure Security Center

Windows Defender ATP provides a comprehensive server protection solution, including endpoint detection and response (EDR) capabilities on Windows Servers.

Azure Information Protection

Keep sensitive data secure while enabling productivity in the workplace through data data discovery and data protection.

Conditional access

Windows Defender ATP's dynamic machine risk score is integrated into the conditional access evaluation, ensuring that only secure devices have access to resources.

Microsoft Cloud App Security

Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines.

Office 365 Advanced Threat Protection (Office 365 ATP)

Office 365 ATP helps protect your organization from malware in email messages or files through ATP Safe Links, ATP Safe Attachments, advanced Anti-Phishing, and spoof intelligence capabilities. The integration between Office 365 ATP and Windows Defender ATP enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked.

Skype for Business

The Skype for Business integration provides s a way for analysts to communicate with a potentially compromised user or device owner through ao simple button from the portal.