Skip to content

Commit e10adfc

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/defender-docs-pr (branch live)
2 parents 7a569ac + e07e8d2 commit e10adfc

2 files changed

Lines changed: 14 additions & 0 deletions

File tree

defender-endpoint/microsoft-defender-endpoint.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,7 @@ This section lists key Defender for Endpoint capabilities and provides links to
6060
|[Endpoint detection and response](overview-endpoint-detection-response.md) |Detect, investigate, and respond to advanced threats. Includes [advanced hunting](/defender-xdr/advanced-hunting-overview) which provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections. |
6161
|[Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices) |Assess the security state of your network, identify unprotected systems, and take actions to improve your organization's security. |
6262
|[Next-generation protection](next-generation-protection.md) |Catch and block all types of emerging threats. |
63+
|[Predictive shielding](/defender-xdr/shield-predict-threats) (Preview) |Proactively anticipates attacker progression during an active attack and applies targeted hardening — such as GPO restrictions, Safeboot enforcement, and user containment — to at-risk assets before attackers reach them. Extends [automatic attack disruption](/defender-xdr/automatic-attack-disruption). |
6364

6465
## Privacy and compliance
6566

defender-xdr/shield-predict-threats.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,18 @@ This article provides an overview of predictive shielding so that you can unders
2929

3030
Learn [how predictive shielding works](#how-predictive-shielding-works) or how to [manage predictive shielding in Microsoft Defender](shield-predict-threats-manage.md).
3131

32+
## Why predictive shielding matters
33+
34+
In a typical attack, defenders react after malicious activity is detected — but attackers move fast. By the time a compromised device is identified, lateral movement or data exfiltration might already be underway. Predictive shielding shifts the balance by acting during an attack, before the attacker reaches their next target.
35+
36+
**When predictive shielding becomes relevant:**
37+
38+
- An active attack is detected in your environment (for example, a compromised device or credential).
39+
- Defender identifies other assets that are likely targets based on exposure data, attacker behavior patterns, and organizational topology.
40+
- Instead of waiting for the attacker to reach those assets, predictive shielding proactively applies targeted restrictions — such as containing at-risk user accounts, hardening GPO settings, or enforcing Safeboot — to cut off the attack path.
41+
42+
This means security teams gain critical response time. Rather than racing to manually isolate every potentially affected asset, Defender autonomously narrows the attacker's options while analysts investigate.
43+
3244
## How predictive shielding expands on automatic attack disruption
3345

3446
The evolving threat landscape creates an imbalance: defenders must secure every asset, while attackers need only one opening. Traditional defenses are reactive, responding after malicious activity begins. This approach leaves defenders chasing attackers, who often act too quickly or subtly to detect in real time. While some attacker behaviors must be blocked outright, static prevention disrupts productivity and adds operational overhead.
@@ -103,5 +115,6 @@ Predictive shielding uses Defender for Endpoint-based actions. To use these acti
103115

104116
- [Manage predictive shielding in Microsoft Defender](shield-predict-threats-manage.md) - Learn how to manage predictive shielding actions and investigate their impact in your environment.
105117
- [Automatic attack disruption in Microsoft Defender](automatic-attack-disruption.md) - Learn how automatic attack disruption works to identify and neutralize confirmed malicious activities.
118+
- [Microsoft Defender for Endpoint capabilities](/defender-endpoint/microsoft-defender-endpoint#defender-for-endpoint-capabilities) - See how predictive shielding fits within the full Defender for Endpoint protection stack.
106119

107120
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)