Skip to content

Commit 4ec28cf

Browse files
author
Michael Bender
committed
updates to URLs
1 parent 6eaf53f commit 4ec28cf

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/private-link/network-security-perimeter-collect-resource-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You can enable resource logging for network security perimeter by using the Azur
5656
5757
## Activity log
5858

59-
Azure generates the activity log by default. The logs are preserved for 90 days in the Azure event logs store. Learn more about these logs by reading the[View events and activity log](../azure-monitor/essentials/activity-log.md) article.
59+
Azure generates the activity log by default. The logs are preserved for 90 days in the Azure event logs store. Learn more about these logs with [Use the Azure Monitor activity log and activity log insights](/azure/azure-monitor/essentials/activity-log-insights).
6060

6161
## Next steps
6262

articles/private-link/network-security-perimeter-diagnostic-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You can enable diagnostic logging for a network security perimeter by using the
5656
5757
## Activity log
5858

59-
Azure generates the activity log by default. The logs are preserved for 90 days in the Azure event logs store. Learn more about these logs by reading the[View events and activity log](../azure-monitor/essentials/activity-log.md) article.
59+
Azure generates the activity log by default. The logs are preserved for 90 days in the Azure event logs store. Learn more about these logs with [Use the Azure Monitor activity log and activity log insights](/azure/azure-monitor/essentials/activity-log-insights).
6060

6161
## Next steps
6262

0 commit comments

Comments
 (0)