Skip to content

Commit 7d3bcea

Browse files
author
craigcaseyMSFT
committed
fix broken links from CATS report
1 parent db072c4 commit 7d3bcea

File tree

10 files changed

+20
-20
lines changed

10 files changed

+20
-20
lines changed

articles/active-directory/devices/faq.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
## General FAQ
2121

22-
### Q: I registered the device recently. Why cant I see the device under my user info in the Azure portal? Or why is the device owner marked as N/A for hybrid Azure Active Directory (Azure AD) joined devices?
22+
### Q: I registered the device recently. Why can't I see the device under my user info in the Azure portal? Or why is the device owner marked as N/A for hybrid Azure Active Directory (Azure AD) joined devices?
2323

2424
**A:** Windows 10 devices that are hybrid Azure AD joined don't show up under **USER devices**.
2525
Use the **All devices** view in the Azure portal. You can also use a PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice?view=azureadps-1.0) cmdlet.
@@ -126,7 +126,7 @@ See below on how these actions can be rectified.
126126
**A:** It takes up to an hour for a revoke to be applied from the time the Azure AD device is marked as disabled.
127127

128128
>[!NOTE]
129-
>For enrolled devices, we recommend that you wipe the device to make sure users can't access the resources. For more information, see [What is device enrollment?](/intune/deploy-use/enroll-devices-in-microsoft-intune).
129+
>For enrolled devices, we recommend that you wipe the device to make sure users can't access the resources. For more information, see [What is device enrollment?](/mem/intune/user-help/use-managed-devices-to-get-work-done).
130130
131131
---
132132

@@ -188,7 +188,7 @@ Deleted or disabled users who didn't sign in previously can't access a device. T
188188

189189
---
190190

191-
### Q: Why do my users see *You cant get there from here*?
191+
### Q: Why do my users see *You can't get there from here*?
192192

193193
**A:** Did you configure certain Conditional Access rules to require a specific device state? If the device doesn't meet the criteria, users are blocked, and they see that message.
194194
Evaluate the Conditional Access policy rules. Make sure the device meets the criteria to avoid the message.
@@ -309,8 +309,8 @@ Enable the following registry to block your users from adding additional work ac
309309

310310
**A:** Take the following steps:
311311

312-
1. [Create a compliance policy](/intune/compliance-policy-create-mac-os)
313-
1. [Define a Conditional Access policy for macOS devices](../active-directory-conditional-access-azure-portal.md)
312+
1. [Create a compliance policy](/intune/compliance-policy-create-mac-os)
313+
1. [Define a Conditional Access policy for macOS devices](../active-directory-conditional-access-azure-portal.md)
314314

315315
**Remarks:**
316316

articles/aks/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ AKS agent nodes are billed as standard Azure virtual machines, so if you've purc
130130

131131
## Can I move/migrate my cluster between Azure tenants?
132132

133-
The `az aks update-credentials` command can be used to move an AKS cluster between Azure tenants. Follow the instructions in [Choose to update or create a service principal](https://docs.microsoft.com/azure/aks/update-credentials) and then [update aks cluster with new credentials](https://docs.microsoft.com/azure/aks/update-credentials#update-aks-cluster-with-new-credentials).
133+
The `az aks update-credentials` command can be used to move an AKS cluster between Azure tenants. Follow the instructions in [Choose to update or create a service principal](https://docs.microsoft.com/azure/aks/update-credentials) and then [update aks cluster with new credentials](https://docs.microsoft.com/azure/aks/update-credentials#update-aks-cluster-with-new-service-principal-credentials).
134134

135135
## Can I move/migrate my cluster between subscriptions?
136136

articles/aks/private-clusters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ As mentioned, VNet peering is one way to access your private cluster. To use VNe
100100
[az-feature-list]: /cli/azure/feature?view=azure-cli-latest#az-feature-list
101101
[az-extension-add]: /cli/azure/extension#az-extension-add
102102
[az-extension-update]: /cli/azure/extension#az-extension-update
103-
[private-link-service]: /private-link/private-link-service-overview
103+
[private-link-service]: /azure/private-link/private-link-service-overview
104104
[virtual-network-peering]: ../virtual-network/virtual-network-peering-overview.md
105105
[azure-bastion]: ../bastion/bastion-create-host-portal.md
106106
[express-route-or-vpn]: ../expressroute/expressroute-about-virtual-network-gateways.md

articles/automation/manage-runas-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To create or update a Run As account, you must have specific privileges and perm
5858

5959
|Task|Cmdlet |Minimum Permissions |Where you set the permissions|
6060
|---|---------|---------|---|
61-
|Create Azure AD Application|[New-AzADApplication](/https://docs.microsoft.com/powershell/module/az.resources/new-azadapplication?view=azps-3.5.0) | Application Developer role<sup>1</sup> |[Azure AD](../active-directory/develop/howto-create-service-principal-portal.md#required-permissions)</br>Home > Azure AD > App Registrations |
61+
|Create Azure AD Application|[New-AzADApplication](https://docs.microsoft.com/powershell/module/az.resources/new-azadapplication?view=azps-3.5.0) | Application Developer role<sup>1</sup> |[Azure AD](../active-directory/develop/howto-create-service-principal-portal.md#required-permissions)</br>Home > Azure AD > App Registrations |
6262
|Add a credential to the application.|[New-AzADAppCredential](https://docs.microsoft.com/powershell/module/az.resources/new-azadappcredential?view=azps-3.5.0) | Application Administrator or Global Administrator<sup>1</sup> |[Azure AD](../active-directory/develop/howto-create-service-principal-portal.md#required-permissions)</br>Home > Azure AD > App Registrations|
6363
|Create and get an Azure AD service principal|[New-AzADServicePrincipal](https://docs.microsoft.com/powershell/module/az.resources/new-azadserviceprincipal?view=azps-3.5.0)</br>[Get-AzADServicePrincipal](https://docs.microsoft.com/powershell/module/az.resources/get-azadserviceprincipal?view=azps-3.5.0) | Application Administrator or Global Administrator<sup>1</sup> |[Azure AD](../active-directory/develop/howto-create-service-principal-portal.md#required-permissions)</br>Home > Azure AD > App Registrations|
6464
|Assign or get the RBAC role for the specified principal|[New-AzRoleAssignment](https://docs.microsoft.com/powershell/module/az.resources/new-azroleassignment?view=azps-3.5.0)</br>[Get-AzRoleAssignment](https://docs.microsoft.com/powershell/module/Az.Resources/Get-AzRoleAssignment?view=azps-3.5.0) | User Access Administrator or Owner, or have the following permissions:</br></br><code>Microsoft.Authorization/Operations/read</br>Microsoft.Authorization/permissions/read</br>Microsoft.Authorization/roleDefinitions/read</br>Microsoft.Authorization/roleAssignments/write</br>Microsoft.Authorization/roleAssignments/read</br>Microsoft.Authorization/roleAssignments/delete</code></br></br> | [Subscription](../role-based-access-control/role-assignments-portal.md)</br>Home > Subscriptions > \<subscription name\> - Access Control (IAM)|

articles/automation/troubleshoot/runbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -637,7 +637,7 @@ To use self-signed certificates, see [Creating a new certificate](https://docs.m
637637

638638
### Access denied when using Azure sandbox for a runbook
639639

640-
The Azure sandbox prevents access to all out-of-process COM servers. For example, a sandboxed application or runbook can't call into Windows Management Instrumentation (WMI), or into the Windows Installer service (msiserver.exe). For details about the use of the sandbox, see [Runbook execution in Azure Automation](https://docs.microsoft.com/azure/automation/automation-runbook-execution.md).
640+
The Azure sandbox prevents access to all out-of-process COM servers. For example, a sandboxed application or runbook can't call into Windows Management Instrumentation (WMI), or into the Windows Installer service (msiserver.exe). For details about the use of the sandbox, see [Runbook execution in Azure Automation](https://docs.microsoft.com/azure/automation/automation-runbook-execution).
641641

642642
## Recommended Documents
643643

articles/azure-monitor/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Multiple updates as part of rewrite of diagnostics extension content.
2323
- [Install and configure Windows Azure diagnostics extension (WAD)](platform/diagnostics-extension-windows-install.md) - New article.
2424
- [Windows diagnostics extension schema](platform/diagnostics-extension-schema-windows.md) - Reorganized.
2525
- [Send data from Windows Azure diagnostics extension to Azure Event Hubs](platform/diagnostics-extension-stream-event-hubs.md) - Completely rewritten and updated.
26-
- [Store and view diagnostic data in Azure Storage](platform/diagnostics-extension-to-storage.md) - Completely rewritten and updated.
26+
- [Store and view diagnostic data in Azure Storage](/azure/cloud-services/diagnostics-extension-to-storage) - Completely rewritten and updated.
2727
- [Log Analytics virtual machine extension for Windows](../virtual-machines/extensions/oms-windows.md) - Better clarifies relationship with Log Analytics agent.
2828
- [Azure Monitor virtual machine extension for Linux](../virtual-machines/extensions/oms-linux.md) - Better clarifies relationship with Log Analytics agent.
2929

articles/container-registry/container-registry-customer-managed-keys.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -403,9 +403,9 @@ Revoking the key effectively blocks access to all registry data, since the regis
403403
[az-feature-register]: /cli/azure/feature#az-feature-register
404404
[az-group-deployment-create]: /cli/azure/group/deployment#az-group-deployment-create
405405
[az-keyvault-create]: /cli/azure/keyvault#az-keyvault-create
406-
[az-keyvault-key-create]: /cli/azure/keyvault/keyt#az-keyvault-key-create
407-
[az-keyvault-set-policy]: /cli/azure/keyvault/keyt#az-keyvault-set-policy
408-
[az-keyvault-delete-policy]: /cli/azure/keyvault/keyt#az-keyvault-delete-policy
406+
[az-keyvault-key-create]: /cli/azure/keyvault/key#az-keyvault-key-create
407+
[az-keyvault-set-policy]: /cli/azure/keyvault#az-keyvault-set-policy
408+
[az-keyvault-delete-policy]: /cli/azure/keyvault#az-keyvault-delete-policy
409409
[az-resource-show]: /cli/azure/resource#az-resource-show
410410
[az-acr-create]: /cli/azure/acr#az-acr-create
411411
[az-acr-show]: /cli/azure/acr#az-acr-show

articles/container-registry/container-registry-private-link.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -404,10 +404,10 @@ To clean up your resources in the portal, navigate to your resource group. Once
404404
[az-network-vnet-list]: /cli/azure/network/vnet/#az-network-vnet-list
405405
[az-network-private-endpoint-create]: /cli/azure/network/private-endpoint#az-network-private-endpoint-create
406406
[az-network-private-endpoint-show]: /cli/azure/network/private-endpoint#az-network-private-endpoint-show
407-
[az-network-private-dns-zone-create]: /cli/azure/network/private-dns-zone/create#az-network-private-dns-zone-create
408-
[az-network-private-dns-link-vnet-create]: /cli/azure/network/private-dns-link/vnet#az-network-private-dns-link-vnet-create
409-
[az-network-private-dns-record-set-a-create]: /cli/azure/network/private-dns-record/set/a#az-network-private-dns-record-set-a-create
410-
[az-network-private-dns-record-set-a-add-record]: /cli/azure/network/private-dns-record/set/a#az-network-private-dns-record-set-a-add-record
407+
[az-network-private-dns-zone-create]: /cli/azure/network/private-dns/zone#az-network-private-dns-zone-create
408+
[az-network-private-dns-link-vnet-create]: /cli/azure/network/private-dns/link/vnet#az-network-private-dns-link-vnet-create
409+
[az-network-private-dns-record-set-a-create]: /cli/azure/network/private-dns/record-set/a#az-network-private-dns-record-set-a-create
410+
[az-network-private-dns-record-set-a-add-record]: /cli/azure/network/private-dns/record-set/a#az-network-private-dns-record-set-a-add-record
411411
[az-resource-show]: /cli/azure/resource#az-resource-show
412412
[quickstart-portal]: container-registry-get-started-portal.md
413413
[quickstart-cli]: container-registry-get-started-azure-cli.md

articles/data-explorer/delete-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,5 +47,5 @@ You can delete all rows in a table or just a specific extent.
4747
4848
## Delete individual rows using purge
4949
50-
[Data purge](/azure/kusto/management/data-purge) can be used for deleting individuals rows. Deletion isn't immediate and requires significant system resources. As such, it's only advised for compliance scenarios.
50+
[Data purge](/azure/kusto/concepts/data-purge) can be used for deleting individuals rows. Deletion isn't immediate and requires significant system resources. As such, it's only advised for compliance scenarios.
5151

articles/firewall/sql-fqdn-filtering.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Application rules with SQL FQDNs is currently available in all regions via the A
3232
## Configure using Azure CLI
3333

3434
1. Deploy an [Azure Firewall using Azure CLI](deploy-cli.md).
35-
2. If you filter traffic to Azure SQL Database, SQL Data Warehouse, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](https://docs.microsoft.com/azure/sql-database/sql-database-connectivity-settingse#change-azure-sql-database-connection-policy).
35+
2. If you filter traffic to Azure SQL Database, SQL Data Warehouse, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](https://docs.microsoft.com/azure/sql-database/sql-database-connectivity-settings#change-connection-policy-via-azure-cli).
3636

3737
> [!NOTE]
3838
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
@@ -54,7 +54,7 @@ Application rules with SQL FQDNs is currently available in all regions via the A
5454

5555
## Configure using the Azure portal
5656
1. Deploy an [Azure Firewall using Azure CLI](deploy-cli.md).
57-
2. If you filter traffic to Azure SQL Database, SQL Data Warehouse, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](https://docs.microsoft.com/azure/sql-database/sql-database-connectivity-settingse#change-azure-sql-database-connection-policy).
57+
2. If you filter traffic to Azure SQL Database, SQL Data Warehouse, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](https://docs.microsoft.com/azure/sql-database/sql-database-connectivity-settings#change-connection-policy-via-azure-cli).
5858

5959
> [!NOTE]
6060
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).

0 commit comments

Comments
 (0)