@@ -15,7 +15,7 @@ metadata:
15
15
author : TerryLanfear
16
16
ms.author : terrylan
17
17
manager : rkarlin
18
- ms.date : 06/29 /2022
18
+ ms.date : 07/15 /2022
19
19
20
20
highlightedContent :
21
21
items :
@@ -25,7 +25,7 @@ highlightedContent:
25
25
- title : Build a Zero Trust Foundation
26
26
itemType : concept
27
27
url : ./fundamentals/zero-trust.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
28
- - title : Backup and restore plan to protect against ransomware
28
+ - title : Back up and restore plan to protect against ransomware
29
29
itemType : concept
30
30
url : ./fundamentals/backup-plan-to-protect-against-ransomware.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
31
31
- title : Protect your multicloud environment with unified security management and advanced threat protection
@@ -60,25 +60,25 @@ conceptualContent:
60
60
61
61
- title : Data security & governance, risk, and compliance
62
62
links :
63
- - url : /learn/modules/m365-compliance-information-governance/
63
+ - url : https://docs.microsoft.com /learn/modules/m365-compliance-information-governance/
64
64
itemType : overview
65
65
text : Introduction to information protection and governance in Microsoft 365
66
66
- url : ../governance/policy/overview.md
67
67
itemType : concept
68
68
text : Azure Policy service
69
- - url : /microsoft-365/compliance/information-protection-solution?view=o365-worldwide
69
+ - url : https://docs.microsoft.com /microsoft-365/compliance/information-protection-solution?view=o365-worldwide
70
70
itemType : concept
71
71
text : Deploy an information protection solution with Microsoft Purview
72
72
73
73
- title : Secure identities and access
74
74
links :
75
- - url : /security/zero-trust/deploy/identity
75
+ - url : https://docs.microsoft.com /security/zero-trust/deploy/identity
76
76
itemType : how-to-guide
77
77
text : Securing identity with Zero Trust
78
- - url : /security/compass/overview
78
+ - url : https://docs.microsoft.com /security/compass/overview
79
79
itemType : concept
80
80
text : Securing privleged access
81
- - url : /security/zero-trust/develop/identity
81
+ - url : https://docs.microsoft.com /security/zero-trust/develop/identity
82
82
itemType : concept
83
83
text : Building apps with a Zero Trust approach to identity
84
84
@@ -130,12 +130,12 @@ additionalContent:
130
130
items :
131
131
- title : Microsoft Learn
132
132
summary : If you're new to security, build your skills with Microsoft Learn
133
- url : / learn/browse/?products=azure&roles=security-engineer%2csecurity -operations-analyst
133
+ url : https://docs.microsoft.com/ learn/browse/?products=azure&roles=security-engineer%2Csecurity -operations-analyst
134
134
- title : Microsoft Cloud Adoption Framework for Azure
135
135
summary : Secure methodology designed to help cloud architects and business decision makers create and implement security strategies for the cloud
136
136
url : /azure/cloud-adoption-framework/secure/
137
137
- title : Azure security fundamentals
138
- summary : Learn how to secure your cloud solutions on Azure
138
+ summary : For every phase of your cloud journey, learn how to secure your cloud solutions on Azure
139
139
url : ./journey/index.yml
140
140
- title : Azure Security Benchmark
141
141
summary : Best practices and recommendations to secure your cloud deployments
@@ -152,80 +152,98 @@ additionalContent:
152
152
- title : Secure development
153
153
summary : Learn how to develop and deploy secure applications on Azure with our sample apps, best practices, and guidance
154
154
url : ./develop/index.yml
155
- - title : Microsoft 365 security guidance
156
- summary : Learn about security in Microsoft 365
157
- url : /microsoft-365/security/?view=o365-worldwide
155
+ # ## - title: Microsoft 365 security guidance
156
+ # ## summary: Learn about security in Microsoft 365
157
+ # ## url: /microsoft-365/security/?view=o365-worldwide
158
158
159
159
- title : Security services and capabilities
160
160
items :
161
- - title : Microsoft Sentinel
161
+ - title : Microsoft Sentinel
162
+ summary : See and stop threats before they cause harm
162
163
links :
163
164
- url : ../sentinel/overview.md
164
- text : See and stop threats before they cause harm
165
+ text : Overview
165
166
- url : ../sentinel/quickstart-onboard.md
166
167
text : Onboard Microsoft Sentinel
167
- - url : /learn/paths/security-ops-sentinel/
168
+ - url : https://docs.microsoft.com/en-us /learn/paths/security-ops-sentinel/
168
169
text : " Learn: Cloud-native security operations with Microsoft Sentinel"
169
170
170
- - title : Microsoft Defender for Cloud
171
+ - title : Microsoft Defender for Cloud
172
+ summary : Unify security management and advanced threat protection across hybrid cloud workloads
171
173
links :
172
174
- url : ../defender-for-cloud/defender-for-cloud-introduction.md
173
- text : Unified security management and advanced threat protection across hybrid cloud workloads
175
+ text : Overview
174
176
- url : ../defender-for-cloud/tutorial-protect-resources.md
175
177
text : Protect your resources
176
- - url : /learn/modules/microsoft-cloud-app-security/
178
+ - url : https://docs.microsoft.com /learn/modules/microsoft-cloud-app-security/
177
179
text : " Learn: Secure your cloud apps and services"
178
180
181
+ - title : Microsoft Defender for Identity
182
+ summary : Improve security of hybrid environments from cyber attacks and insider threats
183
+ links :
184
+ - url : https://docs.microsoft.com/defender-for-identity/what-is
185
+ text : Overview
186
+ - url : https://docs.microsoft.com/defender-for-identity/deploy-defender-identity
187
+ text : Deploy Microsoft Defender for Identity with Microsoft 365 Defender
188
+ - url : https://docs.microsoft.com/learn/modules/defender-identity-defend-attacks/
189
+ text : " Learn: Defend against attacks"
190
+
179
191
- title : Azure Key Vault
192
+ summary : Create and maintain keys that access and encrypt your cloud resources
180
193
links :
181
194
- url : ../key-vault/general/overview.md
182
- text : Create and maintain keys that access and encrypt your cloud resources
195
+ text : Overview
183
196
- url : ../key-vault/secrets/quick-create-cli.md
184
197
text : Set and retrieve a secret
185
- - url : /learn/modules/manage-secrets-with-azure-key-vault/
198
+ - url : https://docs.microsoft.com /learn/modules/manage-secrets-with-azure-key-vault/
186
199
text : " Learn: Manage secrets in your server apps"
187
200
201
+ - title : Microsoft Defender for Cloud Apps
202
+ summary : Cloud Access Security Broker (CASB) that operates on multiple clouds
203
+ links :
204
+ - url : https://docs.microsoft.com/defender-cloud-apps/what-is-defender-for-cloud-apps
205
+ text : Overview
206
+ - url : https://docs.microsoft.com/defender-cloud-apps/get-started
207
+ text : Get started
208
+ - url : https://docs.microsoft.com/defender-cloud-apps/tutorial-suspicious-activity
209
+ text : Detect and manage suspicious activity
210
+
188
211
- title : Microsoft Defender for IoT
212
+ summary : Threat detection for IoT/OT environments
189
213
links :
190
214
- url : ../defender-for-iot/overview.md
191
- text : Comprehensive threat detection for IoT/OT environments
215
+ text : Overview
192
216
- url : ../defender-for-iot/getting-started.md
193
217
text : Get started with Defender for IoT
194
- - url : /learn/paths/enhance-iot-solution-security-by-using-azure-defender/
218
+ - url : https://docs.microsoft.com /learn/paths/enhance-iot-solution-security-by-using-azure-defender/
195
219
text : " Learn: Enhance IoT solution security"
196
220
197
- - title : Azure Active Directory
198
- links :
199
- - url : ../active-directory/fundamentals/active-directory-whatis.md
200
- text : Multi-tenant, cloud-based identity and access management service
201
- - url : ../active-directory/fundamentals/security-operations-introduction.md
202
- text : Security operations guide
203
- - url : /learn/modules/secure-aad-users-with-mfa/
204
- text : " Learn: Secure Azure Active Directory users with Multi-Factor Authentication"
205
-
206
221
- title : Azure Information Protection
222
+ summary : Control and secure emails, documents, and sensitive data
207
223
links :
208
- - url : /azure/information-protection/what-is-information-protection
209
- text : Control and secure emails, documents, and sensitive data
210
- - url : /azure/information-protection/quickstart-deploy-client
224
+ - url : https://docs.microsoft.com /azure/information-protection/what-is-information-protection
225
+ text : Overview
226
+ - url : https://docs.microsoft.com /azure/information-protection/quickstart-deploy-client
211
227
text : Deploying the client
212
- - url : /azure/information-protection/tutorial-scan-networks-and-content
228
+ - url : https://docs.microsoft.com /azure/information-protection/tutorial-scan-networks-and-content
213
229
text : Discovering your sensitive content
214
230
215
- - title : Microsoft Defender for Cloud Apps
231
+ - title : Azure Active Directory
232
+ summary : Multi-tenant, cloud-based identity and access management service
216
233
links :
217
- - url : /defender-cloud-apps/what-is-defender-for-cloud-apps
218
- text : Cloud Access Security Broker (CASB) that operates on multiple clouds
219
- - url : /defender-cloud-apps/get-started
220
- text : Get started
221
- - url : /defender-cloud-apps/tutorial-suspicious-activity
222
- text : Detect and manage suspicious activity
234
+ - url : https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis
235
+ text : Overview
236
+ - url : https://docs.microsoft.com/azure/active-directory/fundamentals/security-operations-introduction
237
+ text : Security operations guide
238
+ - url : https://docs.microsoft.com/learn/modules/secure-aad-users-with-mfa/
239
+ text : " Learn: Secure Azure Active Directory users with Multi-Factor Authentication "
223
240
224
241
- title : Microsoft 365 Defender
242
+ summary : Security solutions that protect your enterprise across attack surfaces
225
243
links :
226
- - url : /microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide
227
- text : Protect your enterprise across attack surfaces
228
- - url : /microsoft-365/security/defender/get-started?view=o365-worldwide
244
+ - url : https://docs.microsoft.com /microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide
245
+ text : Overview
246
+ - url : https://docs.microsoft.com /microsoft-365/security/defender/get-started?view=o365-worldwide
229
247
text : Get started
230
- - url : /microsoft-365/security/defender/integrate-microsoft-365-defender-secops?view=o365-worldwide
248
+ - url : https://docs.microsoft.com /microsoft-365/security/defender/integrate-microsoft-365-defender-secops?view=o365-worldwide
231
249
text : Security operations guide
0 commit comments