Skip to content

Commit 1c5d346

Browse files
Merge pull request #227699 from pritamso/Broken-link-fixes-batamig
Broken link fixes
2 parents 5aecf00 + bcd96db commit 1c5d346

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

articles/defender-for-iot/organizations/how-to-set-up-high-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Sign back in to the primary appliance after redirection.
4141

4242
Before you perform the procedures in this article, verify that you've met the following prerequisites:
4343

44-
- Make sure that you have an [on-premises management console installed](/ot-deploy/install-software-on-premises-management-console.md) on both a primary appliance and a secondary appliance.
44+
- Make sure that you have an [on-premises management console installed](./ot-deploy/install-software-on-premises-management-console.md) on both a primary appliance and a secondary appliance.
4545

4646
- Both your primary and secondary on-premises management console appliances must be running identical hardware models and software versions.
4747
- You must be able to access to both the primary and secondary on-premises management consoles as a [privileged user](references-work-with-defender-for-iot-cli-commands.md), for running CLI commands. For more information, see [On-premises users and roles for OT monitoring](roles-on-premises.md).

articles/defender-for-iot/organizations/integrations/arcsight.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To configure your ArcSight server settings so that it can receive Defender for I
2222
1. Sign in to your ArcSight server.
2323
1. Configure your receiver type as a **CEF UDP Receiver**.
2424

25-
For more information, see the [ArcSight SmartConnectors Documentation](https://www.microfocus.com/documentation/arcsight/arcsight-smartconnectors/#gsc.tab=0).
25+
For more information, see the [ArcSight SmartConnectors Documentation](https://www.microfocus.com/documentation/arcsight/arcsight-smartconnectors-8.4/#gsc.tab=0).
2626

2727
## Create a Defender for IoT forwarding rule
2828

articles/defender-for-iot/organizations/iot-advanced-threat-monitoring.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The **Microsoft Defender for IoT** solution includes a more detailed set of out-
7777

7878
## Investigate Defender for IoT incidents
7979

80-
After you’ve [configured your Defender for IoT data to trigger new incidents in Microsoft Sentinel](#detect-threats-out-of-the-box-with-defender-for-iot-data), start investigating those incidents in Microsoft Sentinel [as you would other incidents](/sentinel/investigate-cases).
80+
After you’ve [configured your Defender for IoT data to trigger new incidents in Microsoft Sentinel](#detect-threats-out-of-the-box-with-defender-for-iot-data), start investigating those incidents in Microsoft Sentinel [as you would other incidents](../../sentinel/investigate-cases.md).
8181

8282
**To investigate Microsoft Defender for IoT incidents**:
8383

@@ -345,4 +345,4 @@ This playbook updates the incident severity according to the importance level of
345345
> [!div class="nextstepaction"]
346346
> [Use playbooks with automation rules](../../sentinel/tutorial-respond-threats-playbook.md)
347347
348-
For more information, see our blog: [Defending Critical Infrastructure with the Microsoft Sentinel: IT/OT Threat Monitoring Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/defending-critical-infrastructure-with-the-microsoft-sentinel-it/ba-p/3061184)
348+
For more information, see our blog: [Defending Critical Infrastructure with the Microsoft Sentinel: IT/OT Threat Monitoring Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/defending-critical-infrastructure-with-the-microsoft-sentinel-it/ba-p/3061184)

articles/security/fundamentals/recover-from-identity-compromise.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Check for updates in the following Microsoft security products, and implement an
8787
- [Microsoft 365 security solutions and services](/microsoft-365/security/)
8888
- [Windows 10 Enterprise Security](/windows/security/)
8989
- [Microsoft Defender for Cloud Apps ](/cloud-app-security/)
90-
- [Microsoft Defender for IoT](/defender-for-iot/organizations)
90+
- [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/)
9191

9292
Implementing new updates will help identify any prior campaigns and prevent future campaigns against your system. Keep in mind that lists of IOCs may not be exhaustive, and may expand as investigations continue.
9393

@@ -365,4 +365,4 @@ In addition to the recommended actions listed above, we recommend that you consi
365365

366366
> [!IMPORTANT]
367367
> If you believe you have been compromised and require assistance through an incident response, open a **Sev A** Microsoft support case.
368-
>
368+
>

0 commit comments

Comments
 (0)