Skip to content

Commit bea47b4

Browse files
authored
Merge pull request #188242 from v-rajagt/mbaldwin
Link fixed.
2 parents ed2ae02 + d35d09a commit bea47b4

File tree

2 files changed

+2
-13
lines changed

2 files changed

+2
-13
lines changed

articles/payment-hsm/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Azure Payment HSM Service is a "BareMetal" service delivered using [Thales paySh
1919

2020
Payment HSMs are provisioned and connected directly to users' virtual network, and HSMs are under users' sole administration control. HSMs can be easily provisioned as a pair of devices and configured for high availability. Users of the service utilize [Thales payShield Manager](https://cpl.thalesgroup.com/encryption/hardware-security-modules/payment-hsms/payshield-manager) for secure remote access to the HSMs as part of their Azure-based subscription. Multiple subscription options are available to satisfy a broad range of performance and multiple application requirements that can be upgraded quickly in line with end-user business growth. Azure payment HSM service offers highest performance level 2500 CPS.
2121

22-
Azure Payment HSM a highly specialized service. Therefore, we recommend that you fully understand the key concepts, including [pricing](https://azure.microsoft.com/services/azure-payment-hsm/) and [support](getting-started.md#support).
22+
Azure Payment HSM a highly specialized service. Therefore, we recommend that you fully understand the key concepts, including [pricing](https://azure.microsoft.com/services/payment-hsm/) and [support](getting-started.md#support).
2323

2424
## Why use Azure Payment HSM?
2525

articles/security/fundamentals/ransomware-detect-respond.md

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Once a successful ransomware infection has been confirmed, the analyst should ve
4242

4343
In general, various server/endpoint antimalware, email antimalware and network protection solutions should be configured to automatically contain and mitigate known ransomware. There may be cases, however, where the specific ransomware variant has been able to bypass such protections and successfully infect target systems.
4444

45-
Microsoft provides extensive resources to help update your incident response processes on the [Top Azure Security Best Practices](/cloud-adoption-framework/secure/security-top-10#4-process-update-incident-response-processes-for-cloud).
45+
Microsoft provides extensive resources to help update your incident response processes on the [Top Azure Security Best Practices](/azure/cloud-adoption-framework/secure/security-top-10#4-process-update-incident-response-processes-for-cloud).
4646

4747
The following are recommended actions to contain or mitigate a declared incident involving ransomware where automated actions taken by antimalware systems have been unsuccessful:
4848

@@ -83,14 +83,3 @@ Other articles in this series:
8383
- [Ransomware protection in Azure](ransomware-protection.md)
8484
- [Prepare for a ransomware attack](ransomware-prepare.md)
8585
- [Azure features and resources that help you protect, detect, and respond](ransomware-features-resources.md)
86-
87-
88-
89-
90-
91-
92-
93-
94-
95-
96-

0 commit comments

Comments
 (0)