Skip to content

Commit c15a9f8

Browse files
committed
Removed all the (newly) broken links
1 parent a34387e commit c15a9f8

8 files changed

+13
-25
lines changed

articles/security-center/TOC.yml

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,8 @@
155155
href: security-center-sql-service-recommendations.md
156156
- name: Protect identity and access
157157
href: security-center-identity-access.md
158+
- name: Manage investigation user data
159+
href: security-center-investigation-user-data.md
158160
- name: Apply cloud defenses
159161
items:
160162
- name: Manage just-in-time access
@@ -165,11 +167,6 @@
165167
href: security-center-file-integrity-monitoring.md
166168
- name: Adaptive network hardening
167169
href: security-center-adaptive-network-hardening.md
168-
169-
- name: Archive
170-
items:
171-
- name: Manage investigation user data
172-
href: security-center-investigation-user-data.md
173170

174171
- name: Reference
175172
items:

articles/security-center/azure-container-registry-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,4 +45,4 @@ To learn more about Security Center's container security features, see:
4545

4646
* [Integration with Azure Kubernetes Service](azure-kubernetes-service-integration.md)
4747

48-
* [Virtual Machine protection](security-center-virtual-machine-protection.md) - Describes Security Center's recommendations
48+
* [Virtual Machine protection](security-center-virtual-machine-protection.md) - Describes Security Center's recommendations

articles/security-center/security-center-features-retirement-july2019.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ All the features of the **Identity & Access** dashboard in Log Analytics can be
9393

9494
## Security events map<a name="menu_securityeventsmap"></a>
9595

96-
Security Center provides you with a [security alerts map](https://docs.microsoft.com/azure/security-center/security-center-threat-intel) to help identify security threats. The **Go to security events map** button in that map opens a dashboard that allows you to view raw security events on the selected workspace.
96+
Security Center provides you with a security alerts map to help identify security threats. The **Go to security events map** button in that map opens a dashboard that allows you to view raw security events on the selected workspace.
9797

9898
We removed the **Go to security events map** button and the per-workspace dashboard.
9999

@@ -132,7 +132,7 @@ For more information on custom alerts retirement, see [Custom Alert Rules in Azu
132132

133133
## Security alerts investigation<a name="menu_investigate"></a>
134134

135-
[The Investigation feature](https://docs.microsoft.com/azure/security-center/security-center-investigation) in Security Center helps you triage a potential security incident. The feature allows you to understand the scope of an incident and track down its root cause. We removed this feature from Security Center because it's been replaced with an improved experience in [Azure Sentinel](https://azure.microsoft.com/services/azure-sentinel/).
135+
The Investigation feature in Security Center helps you triage a potential security incident. The feature allows you to understand the scope of an incident and track down its root cause. We removed this feature from Security Center because it's been replaced with an improved experience in [Azure Sentinel](https://azure.microsoft.com/services/azure-sentinel/).
136136

137137
![Security incident][14]
138138

articles/security-center/security-center-investigation-user-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This article provides information on how to manage the user data found in Azure
2222
[!INCLUDE [gdpr-intro-sentence.md](../../includes/gdpr-intro-sentence.md)]
2323

2424
## Searching for and identifying personal data
25-
In the Azure portal, you can use Security Center's [investigation feature](../security-center/security-center-investigation.md) to search for personal data. The investigation feature is available under **Security Alerts**.
25+
In the Azure portal, you can use Security Center's investigation feature to search for personal data. The investigation feature is available under **Security Alerts**.
2626

2727
The investigation feature shows all entities, user information, and data under the **Entities** tab.
2828

articles/security-center/security-center-planning-and-operations-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ Once you address all recommendations, the **Prevention** section should be green
177177

178178
The **Detection** section is more reactive, these are alerts regarding issues that are either taking place now, or occurred in the past and were detected by Security Center controls and 3rd party systems. The Security Alerts tile will show bar graphs that represent the number of alerts that were found in each day, and their distribution among the different severity categories (low, medium, high). For more information about Security Alerts, read [Managing and responding to security alerts in Azure Security Center](security-center-managing-and-responding-alerts.md).
179179

180-
Plan to visit the [threat intelligence](https://docs.microsoft.com/azure/security-center/security-center-threat-intel) option as part of your daily security operations. There you can identify security threats against the environment, such as identify if a particular computer is part of a botnet.
180+
Plan to visit the threat intelligence option as part of your daily security operations. There you can identify security threats against the environment, such as identify if a particular computer is part of a botnet.
181181

182182
### Monitoring for new or changed resources
183183
Most Azure environments are dynamic, with resources regularly being created, spun up or down, reconfigured, and changed. Security Center helps ensure that you have visibility into the security state of these new resources.
@@ -231,7 +231,7 @@ The following example shows a suspicious RDP activity taking place:
231231

232232
This page shows the details regarding the time that the attack took place, the source hostname, the target VM and also gives recommendation steps. In some circumstances, the source information of the attack may be empty. Read [Missing Source Information in Azure Security Center Alerts](https://blogs.msdn.microsoft.com/azuresecurity/2016/03/25/missing-source-information-in-azure-security-center-alerts/) for more information about this type of behavior.
233233

234-
From this page, you can also start an [investigation](https://docs.microsoft.com/azure/security-center/security-center-investigation) to better understand the timeline of the attack, how the attack took place, which systems were potentially compromised, which credentials were used, and see a graphical representation of the entire attack chain.
234+
From this page, you can also start an investigation to better understand the timeline of the attack, how the attack took place, which systems were potentially compromised, which credentials were used, and see a graphical representation of the entire attack chain.
235235

236236
Once you identify the compromised system, you can run a [Workflow Automation](workflow-automation.md) that was previously created. These are a collection of procedures that can be executed from Security Center once triggered by an alert.
237237

articles/security-center/security-center-privacy.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,4 @@ A Security Center user can choose to opt out by deleting their [security contact
9393
[Alert data](security-center-managing-and-responding-alerts.md) is considered security data and is retained for a period of two years.
9494

9595
## Auditing and reporting
96-
Audit logs of security contact, just-in-time, and alert updates are maintained in [Azure Activity Logs](../azure-monitor/platform/platform-logs-overview.md).
97-
98-
## Next steps
99-
For more information about managing user data, see [Manage user data found in an Azure Security Center investigation](security-center-investigation-user-data.md).
96+
Audit logs of security contact, just-in-time, and alert updates are maintained in [Azure Activity Logs](../azure-monitor/platform/platform-logs-overview.md).

articles/security-center/security-center-troubleshooting-guide.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,6 @@ In this document, you learned how to configure security policies in Azure Securi
144144
* [Alerts Validation in Azure Security Center](security-center-alert-validation.md)
145145
* [Email Notifications in Azure Security Center](security-center-provide-security-contact-details.md)
146146
* [Handling Security Incidents in Azure Security Center](security-center-incident.md)
147-
* [Investigate Incidents and Alerts in Azure Security Center](security-center-investigation.md)
148147
* [Azure Security Center detection capabilities](security-center-detection-capabilities.md)
149148
* [Monitoring partner solutions with Azure Security Center](security-center-partner-solutions.md) — Learn how to monitor the health status of your partner solutions.
150149
* [Azure Security Center FAQ](faq-general.md) — Find frequently asked questions about using the service

articles/security-center/tutorial-security-incident.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ Security Center continuously analyzes your hybrid cloud workloads using advanced
2424
> * Investigate further to determine the root cause and scope of a security incident
2525
> * Search security data to aid in investigation
2626
27-
If you dont have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
27+
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
2828

2929
## Prerequisites
30-
To step through the features covered in this tutorial, you must be on Security Centers Standard pricing tier. You can try Security Center Standard at no cost. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/). The quickstart [Onboard your Azure subscription to Security Center Standard](security-center-get-started.md) walks you through how to upgrade to Standard.
30+
To step through the features covered in this tutorial, you must be on Security Center's Standard pricing tier. You can try Security Center Standard at no cost. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/). The quickstart [Onboard your Azure subscription to Security Center Standard](security-center-get-started.md) walks you through how to upgrade to Standard.
3131

3232
## Scenario
3333
Contoso recently migrated some of their on-premises resources to Azure, including some virtual machine-based line-of-business workloads and SQL databases. Currently, Contoso's Core Computer Security Incident Response Team (CSIRT) has a problem investigating security issues because of security intelligence not being integrated with their current incident response tools. This lack of integration introduces a problem during the Detect stage (too many false positives), as well as during the Assess and Diagnose stages. As part of this migration, they decided to opt in for Security Center to help them address this problem.
@@ -82,7 +82,7 @@ Security Center provides a unified view of all security alerts. Security alerts
8282

8383
![Investigation](./media/tutorial-security-incident/tutorial-security-incident-fig5.png)
8484

85-
The investigation map is a graphical representation of the entities that are connected to this security alert or incident. By clicking on an entity in the map, the information about that entity will show new entities, and the map expands. The entity that is selected in the map has its properties highlighted in the pane on the right side of the page. The information available on each tab will vary according to the selected entity. During the investigation process, review all relevant information to better understand the attackers movement.
85+
The investigation map is a graphical representation of the entities that are connected to this security alert or incident. By clicking on an entity in the map, the information about that entity will show new entities, and the map expands. The entity that is selected in the map has its properties highlighted in the pane on the right side of the page. The information available on each tab will vary according to the selected entity. During the investigation process, review all relevant information to better understand the attacker's movement.
8686

8787
2. If you need more evidence, or must further investigate entities that were found during the investigation, proceed to the next step.
8888

@@ -118,9 +118,4 @@ In this tutorial, you learned about Security Center features to be used when res
118118
> [!div class="checklist"]
119119
> * Security incident which is an aggregation of related alerts for a resource
120120
> * Investigation map which is a graphical representation of the entities connected to a security alert or incident
121-
> * Search capabilities to find more evidence of compromised systems
122-
123-
To learn more about Security Center's investigation feature see:
124-
125-
> [!div class="nextstepaction"]
126-
> [Investigate incidents and alerts](security-center-investigation.md)
121+
> * Search capabilities to find more evidence of compromised systems

0 commit comments

Comments
 (0)