You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,6 +60,7 @@ This section lists key Defender for Endpoint capabilities and provides links to
60
60
|[Endpoint detection and response](overview-endpoint-detection-response.md)|Detect, investigate, and respond to advanced threats. Includes [advanced hunting](/defender-xdr/advanced-hunting-overview) which provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections. |
61
61
|[Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices)|Assess the security state of your network, identify unprotected systems, and take actions to improve your organization's security. |
62
62
|[Next-generation protection](next-generation-protection.md)|Catch and block all types of emerging threats. |
63
+
|[Predictive shielding](/defender-xdr/shield-predict-threats) (Preview) |Proactively anticipates attacker progression during an active attack and applies targeted hardening — such as GPO restrictions, Safeboot enforcement, and user containment — to at-risk assets before attackers reach them. Extends [automatic attack disruption](/defender-xdr/automatic-attack-disruption). |
Copy file name to clipboardExpand all lines: defender-xdr/shield-predict-threats.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,18 @@ This article provides an overview of predictive shielding so that you can unders
29
29
30
30
Learn [how predictive shielding works](#how-predictive-shielding-works) or how to [manage predictive shielding in Microsoft Defender](shield-predict-threats-manage.md).
31
31
32
+
## Why predictive shielding matters
33
+
34
+
In a typical attack, defenders react after malicious activity is detected — but attackers move fast. By the time a compromised device is identified, lateral movement or data exfiltration might already be underway. Predictive shielding shifts the balance by acting during an attack, before the attacker reaches their next target.
35
+
36
+
**When predictive shielding becomes relevant:**
37
+
38
+
- An active attack is detected in your environment (for example, a compromised device or credential).
39
+
- Defender identifies other assets that are likely targets based on exposure data, attacker behavior patterns, and organizational topology.
40
+
- Instead of waiting for the attacker to reach those assets, predictive shielding proactively applies targeted restrictions — such as containing at-risk user accounts, hardening GPO settings, or enforcing Safeboot — to cut off the attack path.
41
+
42
+
This means security teams gain critical response time. Rather than racing to manually isolate every potentially affected asset, Defender autonomously narrows the attacker's options while analysts investigate.
43
+
32
44
## How predictive shielding expands on automatic attack disruption
33
45
34
46
The evolving threat landscape creates an imbalance: defenders must secure every asset, while attackers need only one opening. Traditional defenses are reactive, responding after malicious activity begins. This approach leaves defenders chasing attackers, who often act too quickly or subtly to detect in real time. While some attacker behaviors must be blocked outright, static prevention disrupts productivity and adds operational overhead.
@@ -103,5 +115,6 @@ Predictive shielding uses Defender for Endpoint-based actions. To use these acti
103
115
104
116
-[Manage predictive shielding in Microsoft Defender](shield-predict-threats-manage.md) - Learn how to manage predictive shielding actions and investigate their impact in your environment.
105
117
-[Automatic attack disruption in Microsoft Defender](automatic-attack-disruption.md) - Learn how automatic attack disruption works to identify and neutralize confirmed malicious activities.
118
+
-[Microsoft Defender for Endpoint capabilities](/defender-endpoint/microsoft-defender-endpoint#defender-for-endpoint-capabilities) - See how predictive shielding fits within the full Defender for Endpoint protection stack.
0 commit comments