diff --git a/website/assets/styles/pages/endpoint-ops.less b/website/assets/styles/pages/endpoint-ops.less index 52cdb203514c..a2459aa9ebe9 100644 --- a/website/assets/styles/pages/endpoint-ops.less +++ b/website/assets/styles/pages/endpoint-ops.less @@ -361,44 +361,52 @@ line-height: 24px; } } - [purpose='three-column-features'] { - margin-bottom: 160px; max-width: 1080px; - [purpose='feature-row'] { - &:not(:last-of-type) { - margin-bottom: 60px; - } - [purpose='feature-item'] { - margin-left: 40px; - margin-right: 40px; - max-width: 266px; - width: 33%; - p { - font-size: 14px; - font-weight: 400; - line-height: 21px; - } - } - } + margin-bottom: 160px; h2 { font-size: 32px; line-height: 48px; margin-bottom: 40px; } } + [purpose='responsive-feature-row'] { + margin-right: 0px; + margin-left: 0px; + [purpose='feature-item'] { + padding-right: 24px; + padding-left: 24px; + margin-bottom: 64px; + h5 { + font-size: 16px; + line-height: 1.2; + font-weight: 800; + } + a { + color: @core-fleet-black-75; + text-decoration: underline; + &:hover { + color: @core-fleet-black-75; + } + } + img { + height: 48px; + width: auto; + margin-bottom: 16px; + } + h5 { + font-weight: 800; + font-size: 16px; + line-height: 1.2; + margin-bottom: 16px; + } - [purpose='feature-item'] { - img { - height: 48px; - width: auto; - margin-bottom: 16px; - } - h5 { - font-weight: 800; - font-size: 16px; - line-height: 27px; - margin-bottom: 16px; + p { + font-size: 14px; + font-weight: 400; + line-height: 21px; + margin-bottom: 0px; + } } } @@ -541,6 +549,18 @@ [purpose='feature-text'] { width: 410px; } + [purpose='responsive-feature-row'] { + [purpose='feature-item'] { + padding-right: 24px; + padding-left: 24px; + margin-bottom: 64px; + p { + font-size: 14px; + font-weight: 400; + line-height: 21px; + } + } + } } @media (max-width: 767px) { @@ -701,18 +721,16 @@ margin-left: 10px; } } - [purpose='three-column-features'] { - [purpose='feature-row'] { - [purpose='feature-item'] { - - margin-left: 0; - margin-right: 0; - text-align: center; - max-width: 320px; - width: 100%; - &:not(:last-of-type) { - margin-bottom: 60px; - } + [purpose='responsive-feature-row'] { + [purpose='feature-item'] { + padding-right: 0px; + padding-left: 0px; + margin-bottom: 64px; + text-align: center; + p { + font-size: 14px; + font-weight: 400; + line-height: 21px; } } } diff --git a/website/views/pages/endpoint-ops.ejs b/website/views/pages/endpoint-ops.ejs index c9cfbb40fa41..18043c869fd8 100644 --- a/website/views/pages/endpoint-ops.ejs +++ b/website/views/pages/endpoint-ops.ejs @@ -138,43 +138,38 @@
Talk to online devices in real time with Fleet’s live query API. Implement custom workflows like conditional access based on device posture, Identity, and more.
Get visibility into all endpoints across any operating system*, including support for servers and containers in every cloud infrastructure.
Identify who logs in to any system, including login history and current sessions. Look up any computer by the email address of the person using it.
Keep all your endpoints* compliant with customizable baselines, or use common benchmarks like CIS.
Verify that your EDR tools are installed and working so you can identify and address configuration issues quickly.
Track progress towards deadlines for security posture remediation projects, and enforce due dates through automations.
@@ -202,23 +197,21 @@You can use Fleet’s API to customize every aspect of conditional access – even the stuff your CISO hasn’t thought of yet.
Gate access with common device trust policies from industry peers, or roll out your own device health checks using system data and events.
Show resolution steps or use custom HTML to show employees what they need to do to restore their access without waiting on a ticket. Then give it back automatically, as soon as the problems are fixed.
Give people a way to get back to work quickly and minimize downtime. Fleet’s live query API instantly re-checks the OS version and other device state so users don’t get locked out.
@@ -249,40 +242,38 @@Contain and recover from breaches using live data, remote commands, and automated workflows.
Ship logs and alerts when unusual behavior is detected. Run scripts on demand or when alerts trigger.
Specify files to monitor for changes or deletions, then log those events to your SIEM or data lake.
Discover security misconfigurations and vulnerabilities and prioritize risks that matter to your organization.
Continuously scan host filesystems for indicators of compromise (IOC). Import malware signatures from threat intelligence sources.
Collect exactly the data you need from your production infrastructure across every cloud and data center*.