Threat Protection

Learn more about how to help protect against threats in Windows 10 and Windows 10 Mobile.

Section Description
Windows Defender Security Center Learn about the easy-to-use app that brings together common Windows security features.
Windows Defender Advanced Threat Protection Provides info about Windows Defender Advanced Threat Protection (Windows Defender ATP), an out-of-the-box Windows enterprise security service that enables enterprise cybersecurity teams to detect and respond to advanced threats on their networks.
Windows Defender Antivirus in Windows 10 Provides info about Windows Defender, a built-in antimalware solution that helps provide security and antimalware management for desktops, portable computers, and servers. Includes a list of system requirements and new features.
Windows Defender Application Guard Provides info about Windows Defender Application Guard, the hardware-based virtualization solution that helps to isolate a device and operating system from an untrusted browser session.
Windows Defender Smart​Screen Learn more about Windows Defender SmartScreen.
Protect your enterprise data using Windows Information Protection (WIP) Provides info about how to create a Windows Information Protection policy that can help protect against potential corporate data leakage.
Mitigate threats by using Windows 10 security features Learn more about mitigating threats in Windows 10.
Override Process Mitigation Options to help enforce app-related security policies Use Group Policy to override individual Process Mitigation Options settings and help to enforce specific app-related security policies.
How hardware-based containers help protect Windows 10 Learn about how hardware-based containers can isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised.
Secure the Windows 10 boot process Learn about the Windows 10 security features that help to protect your PC from malware, including rootkits and other applications.
Use Windows Event Forwarding to help with intrusion detection Learn about an approach to collect events from devices in your organization. This article talks about events in both normal operations and when an intrusion is suspected.
Block untrusted fonts in an enterprise Provides info about how to help protect your company from attacks which may originate from untrusted or attacker controlled font files.