Skip to content

Commit ba54bc9

Browse files
authored
Merge pull request #94120 from craigcaseyMSFT/vcraic1030
fix broken links from CATS report
2 parents bc268ef + a6e970b commit ba54bc9

10 files changed

+13
-13
lines changed

articles/iot-fundamentals/security-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: security-recommendations
1313

1414
# Security recommendations for Azure Internet of Things (IoT) deployment
1515

16-
This article contains security recommendations for IoT. Implementing these recommendations will help you fulfill your security obligations as described in our shared responsibility model. For more information on what Microsoft does to fulfill service provider responsibilities, read [Shared responsibilities for cloud computing](https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91/file/225237/1/Shared%20Responsibilities%20for%20Cloud%20Computing%20(2017-04-03).pdf).
16+
This article contains security recommendations for IoT. Implementing these recommendations will help you fulfill your security obligations as described in our shared responsibility model. For more information on what Microsoft does to fulfill service provider responsibilities, read [Shared responsibilities for cloud computing](https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91).
1717

1818
Some of the recommendations included in this article can be automatically monitored by Azure Security Center. Azure Security Center is the first line of defense in protecting your resources in Azure. It periodically analyzes the security state of your Azure resources to identify potential security vulnerabilities. It then provides you with recommendations on how to address them.
1919

articles/key-vault/security-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: security-recommendations
1414

1515
# Security recommendations for Azure Key Vault
1616

17-
This article contains security recommendations for Azure Key Vault. Implementing these recommendations will help you fulfill your security obligations as described in our shared responsibility model. For more information on what Microsoft does to fulfill service provider responsibilities, read [Shared responsibilities for cloud computing](https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91/file/225237/1/Shared%20Responsibilities%20for%20Cloud%20Computing%20(2017-04-03).pdf).
17+
This article contains security recommendations for Azure Key Vault. Implementing these recommendations will help you fulfill your security obligations as described in our shared responsibility model. For more information on what Microsoft does to fulfill service provider responsibilities, read [Shared responsibilities for cloud computing](https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91).
1818

1919
Some of the recommendations included in this article can be automatically monitored by Azure Security Center. Azure Security Center is the first line of defense in protecting your resources in Azure. It periodically analyzes the security state of your Azure resources to identify potential security vulnerabilities. It then provides you with recommendations on how to address them.
2020

articles/sql-database/sql-database-aad-authentication-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,7 @@ For more information, see [SQL Server Security Blog](https://blogs.msdn.microsof
463463

464464
### sqlcmd
465465

466-
The following statements, connect using version 13.1 of sqlcmd, which is available from the [Download Center](https://go.microsoft.com/fwlink/?LinkID=825643).
466+
The following statements, connect using version 13.1 of sqlcmd, which is available from the [Download Center](https://www.microsoft.com/download/details.aspx?id=53591).
467467

468468
> [!NOTE]
469469
> `sqlcmd` with the `-G` command does not work with system identities, and requires a user principal login.

articles/sql-database/sql-database-data-sync-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ The client agent doesn't work, even after you cancel its uninstallation.
109109
- **Resolution**. You can try these two solutions:
110110

111111
- Use services.msc to reenter the credentials for the client agent.
112-
- Uninstall this client agent and then install a new one. Download and install the latest client agent from [Download Center](https://go.microsoft.com/fwlink/?linkid=221479).
112+
- Uninstall this client agent and then install a new one. Download and install the latest client agent from [Download Center](https://www.microsoft.com/download/details.aspx?id=27693).
113113

114114
### <a name="agent-list"></a> My database isn't listed in the agent list
115115

articles/storage/common/storage-import-export-data-from-blobs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ The export is complete. At this time, you can delete the job or it automatically
122122

123123
This *optional* step helps you determines the number of drives required for the export job. Perform this step on a Windows system running a [Supported OS version](storage-import-export-requirements.md#supported-operating-systems).
124124

125-
1. [Download the WAImportExport version 1](https://aka.ms/waiev1) on the Windows system.
125+
1. [Download the WAImportExport version 1](https://www.microsoft.com/download/details.aspx?id=42659) on the Windows system.
126126
2. Unzip to the default folder `waimportexportv1`. For example, `C:\WaImportExportV1`.
127127
3. Open a PowerShell or command line window with administrative privileges. To change directory to the unzipped folder, run the following command:
128128

articles/storage/common/storage-import-export-data-to-blobs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You must:
2525
- Have adequate number of disks of [Supported types](storage-import-export-requirements.md#supported-disks).
2626
- Have a Windows system running a [Supported OS version](storage-import-export-requirements.md#supported-operating-systems).
2727
- Enable BitLocker on the Windows system. See [How to enable BitLocker](https://thesolving.com/storage/how-to-enable-bitlocker-on-windows-server-2012-r2/).
28-
- [Download the WAImportExport version 1](https://aka.ms/waiev1) on the Windows system. Unzip to the default folder `waimportexportv1`. For example, `C:\WaImportExportV1`.
28+
- [Download the WAImportExport version 1](https://www.microsoft.com/download/details.aspx?id=42659) on the Windows system. Unzip to the default folder `waimportexportv1`. For example, `C:\WaImportExportV1`.
2929
- Have a FedEx/DHL account. If you want to use a carrier other than FedEx/DHL, contact Azure Data Box Operations team at `[email protected]`.
3030
- The account must be valid, should have balance, and must have return shipping capabilities.
3131
- Generate a tracking number for the export job.

articles/virtual-machines/linux/create-upload-centos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ This article assumes that you have already installed a CentOS (or similar deriva
168168
sudo yum install microsoft-hyper-v
169169
```
170170

171-
Alternatively, you can follow the manual installation instructions on the [LIS download page](https://go.microsoft.com/fwlink/?linkid=403033) to install the RPM onto your VM.
171+
Alternatively, you can follow the manual installation instructions on the [LIS download page](https://www.microsoft.com/download/details.aspx?id=51612) to install the RPM onto your VM.
172172

173173
12. Install the Azure Linux Agent and dependencies. Start and enable waagent service:
174174

articles/virtual-network/virtual-network-tap-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ preview by sending an email to <[email protected]> with your subscript
4040
- [Awake Security](https://awakesecurity.com/technology-partners/microsoft-azure/)
4141
- [Cisco Stealthwatch Cloud](https://blogs.cisco.com/security/cisco-stealthwatch-cloud-and-microsoft-azure-reliable-cloud-infrastructure-meets-comprehensive-cloud-security)
4242
- [Darktrace](https://www.darktrace.com/en/azure/)
43-
- [ExtraHop Reveal(x)](https://www.extrahop.com/company/tech-partners/microsoft/)
43+
- [ExtraHop Reveal(x)](https://www.extrahop.com/partners/tech-partners/microsoft/)
4444
- [Fidelis Cybersecurity](https://www.fidelissecurity.com/technology-partners/microsoft-azure )
4545
- [Flowmon](https://www.flowmon.com/blog/azure-vtap)
4646
- [NetFort LANGuardian](https://www.netfort.com/languardian/solutions/visibility-in-azure-network-tap/)

includes/virtual-machines-common-premium-storage-performance.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -293,12 +293,12 @@ Some of the versions require the latest Linux Integration Services (LIS), v4.0,
293293
| SUSE | SLES 12 or newer| 3.12.36-38.1+ | suse-sles-12-priority-v20150213 <br> suse-sles-12-v20150213 |
294294
| SUSE | SLES 11 SP4 or newer| 3.0.101-0.63.1+ | &nbsp; |
295295
| CoreOS | 584.0.0+ or newer| 3.18.4+ | CoreOS 584.0.0 |
296-
| CentOS | 6.5, 6.6, 6.7, 7.0, or newer| &nbsp; | [LIS4 required](https://go.microsoft.com/fwlink/?LinkID=403033&clcid=0x409) <br> *See note in the next section* |
297-
| CentOS | 7.1+ or newer| 3.10.0-229.1.2.el7+ | [LIS4 recommended](https://go.microsoft.com/fwlink/?LinkID=403033&clcid=0x409) <br> *See note in the next section* |
296+
| CentOS | 6.5, 6.6, 6.7, 7.0, or newer| &nbsp; | [LIS4 required](https://www.microsoft.com/download/details.aspx?id=51612) <br> *See note in the next section* |
297+
| CentOS | 7.1+ or newer| 3.10.0-229.1.2.el7+ | [LIS4 recommended](https://www.microsoft.com/download/details.aspx?id=51612) <br> *See note in the next section* |
298298
| Red Hat Enterprise Linux (RHEL) | 6.8+, 7.2+, or newer | &nbsp; | &nbsp; |
299299
| Oracle | 6.0+, 7.2+, or newer | &nbsp; | UEK4 or RHCK |
300-
| Oracle | 7.0-7.1 or newer | &nbsp; | UEK4 or RHCK w/[LIS 4.1+](https://go.microsoft.com/fwlink/?LinkID=403033&clcid=0x409) |
301-
| Oracle | 6.4-6.7 or newer | &nbsp; | UEK4 or RHCK w/[LIS 4.1+](https://go.microsoft.com/fwlink/?LinkID=403033&clcid=0x409) |
300+
| Oracle | 7.0-7.1 or newer | &nbsp; | UEK4 or RHCK w/[LIS 4.1+](https://www.microsoft.com/download/details.aspx?id=51612) |
301+
| Oracle | 6.4-6.7 or newer | &nbsp; | UEK4 or RHCK w/[LIS 4.1+](https://www.microsoft.com/download/details.aspx?id=51612) |
302302

303303
### LIS drivers for OpenLogic CentOS
304304

includes/virtual-machines-security-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
ms.custom: include file
1111
---
1212

13-
This article contains security recommendations for Azure Virtual Machines. Follow these recommendations to help fulfill the security obligations described in our model for shared responsibility. The recommendations will also help you improve overall security for your web app solutions. For more information about what Microsoft does to fulfill service-provider responsibilities, see [Shared responsibilities for cloud computing](https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91/file/225237/1/Shared%20Responsibilities%20for%20Cloud%20Computing%20(2017-04-03).pdf).
13+
This article contains security recommendations for Azure Virtual Machines. Follow these recommendations to help fulfill the security obligations described in our model for shared responsibility. The recommendations will also help you improve overall security for your web app solutions. For more information about what Microsoft does to fulfill service-provider responsibilities, see [Shared responsibilities for cloud computing](https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91).
1414

1515
Some of this article's recommendations can be automatically addressed by Azure Security Center. Azure Security Center is the first line of defense for your resources in Azure. It periodically analyzes the security state of your Azure resources to identify potential security vulnerabilities. It then recommends how to address the vulnerabilities. For more information, see [Security recommendations in Azure Security Center](../articles/security-center/security-center-recommendations.md).
1616

0 commit comments

Comments
 (0)