Skip to content

Commit c1729e6

Browse files
committed
fix links 2
1 parent 22233c4 commit c1729e6

File tree

8 files changed

+17
-17
lines changed

8 files changed

+17
-17
lines changed

articles/defender-for-iot/organizations/iot-solution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Before you start, make sure you have the following requirements on your workspac
3434

3535
## Connect your data from Defender for IoT to Microsoft Sentinel
3636

37-
Start by enabling the [Defender for IoT data connector](../../sentinel/data-connectors/microsoft-defender-for-iot.md) to stream all your Defender for IoT events into Microsoft Sentinel.
37+
Start by enabling the [Defender for IoT data connector](../../sentinel/data-connectors-reference.md#microsoft-defender-for-iot) to stream all your Defender for IoT events into Microsoft Sentinel.
3838

3939
**To enable the Defender for IoT data connector**:
4040

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -521,7 +521,7 @@ Your organization might have already configured a diagnostic setting to integrat
521521

522522
:::image type="content" source="./media/elevate-access-global-admin/sentinel-entra-id-solution.png" alt-text="Screenshot of Content hub page with Microsoft Entra ID content selected." lightbox="./media/elevate-access-global-admin/sentinel-entra-id-solution.png":::
523523

524-
1. Use the [Microsoft Entra ID connector](../sentinel/data-connectors/microsoft-entra-id.md) to collect data from Microsoft Entra ID by following the steps at [Connect Microsoft Entra data to Microsoft Sentinel](../sentinel/connect-azure-active-directory.md).
524+
1. Use the [Microsoft Entra ID connector](../sentinel/data-connectors-reference.md#microsoft-entra-id) to collect data from Microsoft Entra ID by following the steps at [Connect Microsoft Entra data to Microsoft Sentinel](../sentinel/connect-azure-active-directory.md).
525525

526526
1. On the **Data connectors** page, add a check mark for **Audit Logs**.
527527

articles/security/fundamentals/feature-availability.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ Office 365 GCC is paired with Microsoft Entra ID in Azure. Office 365 GCC High a
226226
227227
| Connector | Azure | Azure Government |
228228
|--|--|--|
229-
| **[Office IRM](../../sentinel/data-connectors/microsoft-365-insider-risk-management.md)** | | |
229+
| **[Office IRM](../../sentinel/data-connectors-reference.md#microsoft-365-insider-risk-management)** | | |
230230
| - Office 365 GCC | Public Preview | - |
231231
| - Office 365 GCC High | - | Not Available |
232232
| - Office 365 DoD | - | Not Available |
@@ -238,39 +238,39 @@ Office 365 GCC is paired with Microsoft Entra ID in Azure. Office 365 GCC High a
238238
| - Office 365 GCC | Public Preview | - |
239239
| - Office 365 GCC High | - | Public Preview |
240240
| - Office 365 DoD | - | Public Preview |
241-
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors/microsoft-defender-for-cloud-apps.md)** | | |
241+
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors-reference.md#microsoft-defender-for-cloud-apps)** | | |
242242
| - Office 365 GCC | GA | - |
243243
| - Office 365 GCC High | - | GA |
244244
| - Office 365 DoD | - | GA |
245-
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors/microsoft-defender-for-cloud-apps.md)** <br>Shadow IT logs | | |
245+
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors-reference.md#microsoft-defender-for-cloud-apps)** <br>Shadow IT logs | | |
246246
| - Office 365 GCC | Public Preview | - |
247247
| - Office 365 GCC High | - | Public Preview |
248248
| - Office 365 DoD | - | Public Preview |
249-
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors/microsoft-defender-for-cloud-apps.md)** <br>Alerts | | |
249+
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors-reference.md#microsoft-defender-for-cloud-apps)** <br>Alerts | | |
250250
| - Office 365 GCC | Public Preview | - |
251251
| - Office 365 GCC High | - | Public Preview |
252252
| - Office 365 DoD | - | Public Preview |
253-
| **[Microsoft Defender for Endpoint](../../sentinel/data-connectors/microsoft-defender-for-endpoint.md)** | | |
253+
| **[Microsoft Defender for Endpoint](../../sentinel/data-connectors-reference.md#microsoft-defender-for-endpoint)** | | |
254254
| - Office 365 GCC | GA | - |
255255
| - Office 365 GCC High | - | GA |
256256
| - Office 365 DoD | - | GA |
257-
| **[Microsoft Defender for Identity](../../sentinel/data-connectors/microsoft-defender-for-identity.md)** | | |
257+
| **[Microsoft Defender for Identity](../../sentinel/data-connectors-reference.md#microsoft-defender-for-identity)** | | |
258258
| - Office 365 GCC | Public Preview | - |
259259
| - Office 365 GCC High | - | Not Available |
260260
| - Office 365 DoD | - | Not Available |
261-
| **[Microsoft Defender for Office 365](../../sentinel/data-connectors/microsoft-defender-for-office-365.md)** | | |
261+
| **[Microsoft Defender for Office 365](../../sentinel/data-connectors-reference.md#microsoft-defender-for-office-365)** | | |
262262
| - Office 365 GCC | Public Preview | - |
263263
| - Office 365 GCC High | - | Not Available |
264264
| - Office 365 DoD | - | Not Available |
265-
| - **[Microsoft Power BI](../../sentinel/data-connectors/microsoft-powerbi.md)** | | |
265+
| - **[Microsoft Power BI](../../sentinel/data-connectors-reference.md#microsoft-powerbi)** | | |
266266
| - Office 365 GCC | Public Preview | - |
267267
| - Office 365 GCC High | - | Not Available |
268268
| - Office 365 DoD | - | Not Available |
269-
| - **[Microsoft Project](../../sentinel/data-connectors/microsoft-project.md)** | | |
269+
| - **[Microsoft Project](../../sentinel/data-connectors-reference.md#microsoft-project)** | | |
270270
| - Office 365 GCC | Public Preview | - |
271271
| - Office 365 GCC High | - | Not Available |
272272
| - Office 365 DoD | - | Not Available |
273-
| **[Office 365](../../sentinel/data-connectors/office-365.md)** | | |
273+
| **[Office 365](../../sentinel/data-connectors-reference.md#office-365)** | | |
274274
| - Office 365 GCC | GA | - |
275275
| - Office 365 GCC High | - | GA |
276276
| - Office 365 DoD | - | GA |

articles/sentinel/ama-migrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Each organization will have different metrics of success and internal migration
3333

3434
1. In Microsoft Sentinel, install the **Windows Security Events** Microsoft Sentinel solution. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
3535

36-
1. To connect your Windows machines to the [Windows Security Event connector](data-connectors/windows-security-events-via-ama.md), start with the **Windows Security Events via AMA** data connector page in Microsoft Sentinel. For more information, see [Windows agent-based connections](connect-services-windows-based.md).
36+
1. To connect your Windows machines to the [Windows Security Event connector](data-connectors-reference.md#windows-security-events-via-ama), start with the **Windows Security Events via AMA** data connector page in Microsoft Sentinel. For more information, see [Windows agent-based connections](connect-services-windows-based.md).
3737

3838
1. Continue with the **Security Events via Legacy Agent** data connector page. On the **Instructions** tab, under **Configuration** > **Step 2** > **Select which events to stream**, select **None**. This configures your system so that you won't receive any security events through the MMA/OMS, but other data sources relying on this agent will continue to work. This step affects all machines reporting to your current Log Analytics workspace.
3939

articles/sentinel/cisco-ftd-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Microsoft Sentinel provides two connectors that collect logs from Cisco Firepowe
1515

1616
## Collect logs from a Cisco FTD ASA firewall device
1717

18-
To collect logs from FTD ASA firewall devices, use the [Cisco ASA/FTD via AMA (Preview) connector](../sentinel/data-connectors/cisco-asa-ftd-via-ama.md).
18+
To collect logs from FTD ASA firewall devices, use the [Cisco ASA/FTD via AMA (Preview) connector](../sentinel/data-connectors-reference.md#cisco-asa-ftd-via-ama).
1919

2020
## Collect logs from a Cisco FTD FXOS firewall device
2121

articles/sentinel/configure-connector-login-detection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,4 +37,4 @@ As the machine learning algorithm requires 30 days' worth of data to build a bas
3737
## Next steps
3838

3939
- [Windows security event sets that can be sent to Microsoft Sentinel](windows-security-event-id-reference.md)
40-
- [Windows Security Events via AMA connector for Microsoft Sentinel](data-connectors/windows-security-events-via-ama.md)
40+
- [Windows Security Events via AMA connector for Microsoft Sentinel](data-connectors-reference.md#windows-security-events-via-ama)

articles/sentinel/connect-azure-virtual-desktop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Azure Virtual Desktop data in Microsoft Sentinel includes the following types:
2525

2626
|Data |Description |
2727
|---------|---------|
28-
|**Windows event logs** | Windows event logs from the Azure Virtual Desktop environment are streamed into a Microsoft Sentinel-enabled Log Analytics workspace in the same manner as Windows event logs from other Windows machines, outside of the Azure Virtual Desktop environment. <br><br>Install the Azure Monitor Agent onto your Windows machine and configure the Windows event logs to be sent to the Log Analytics workspace.<br><br>For more information, see:<br>- [Install Azure Monitor Agent on Windows client devices using the client installer](/azure/azure-monitor/agents/azure-monitor-agent-windows-client)<br>- [Collect Windows events with Azure Monitor Agent](/azure/azure-monitor/agents/data-collection-windows-events)<br>- [Windows Security Events via AMA connector for Microsoft Sentinel](data-connectors/windows-security-events-via-ama.md) |
28+
|**Windows event logs** | Windows event logs from the Azure Virtual Desktop environment are streamed into a Microsoft Sentinel-enabled Log Analytics workspace in the same manner as Windows event logs from other Windows machines, outside of the Azure Virtual Desktop environment. <br><br>Install the Azure Monitor Agent onto your Windows machine and configure the Windows event logs to be sent to the Log Analytics workspace.<br><br>For more information, see:<br>- [Install Azure Monitor Agent on Windows client devices using the client installer](/azure/azure-monitor/agents/azure-monitor-agent-windows-client)<br>- [Collect Windows events with Azure Monitor Agent](/azure/azure-monitor/agents/data-collection-windows-events)<br>- [Windows Security Events via AMA connector for Microsoft Sentinel](data-connectors-reference.md#windows-security-events-via-ama) |
2929
|**Microsoft Defender for Endpoint alerts** | To configure Defender for Endpoint for Azure Virtual Desktop, use the same procedure as you would for any other Windows endpoint. <br><br>For more information, see: <br>- [Set up Microsoft Defender for Endpoint deployment](/windows/security/threat-protection/microsoft-defender-atp/production-deployment)<br>- [Connect data from Microsoft Defender XDR to Microsoft Sentinel](connect-microsoft-365-defender.md) |
3030
|**Azure Virtual Desktop diagnostics** | Azure Virtual Desktop diagnostics is a feature of the Azure Virtual Desktop PaaS service, which logs information whenever someone assigned Azure Virtual Desktop role uses the service. <br><br>Each log contains information about which Azure Virtual Desktop role was involved in the activity, any error messages that appear during the session, tenant information, and user information. <br><br>The diagnostics feature creates activity logs for both user and administrative actions. <br><br>For more information, see [Use Log Analytics for the diagnostics feature in Azure Virtual Desktop](../virtual-desktop/virtual-desktop-fall-2019/diagnostics-log-analytics-2019.md). |
3131

articles/sentinel/connect-services-windows-based.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ You'll see all your data collection rules, including those [created through the
8686
8787
## Create data collection rules using the API
8888
89-
You can also create data collection rules using the API, which can make life easier if you're creating many rules, such as if you're an MSSP. Here's an example (for the [Windows Security Events via AMA](./data-connectors/windows-security-events-via-ama.md) connector) that you can use as a template for creating a rule:
89+
You can also create data collection rules using the API, which can make life easier if you're creating many rules, such as if you're an MSSP. Here's an example (for the [Windows Security Events via AMA](./data-connectors-reference.md#windows-security-events-via-ama) connector) that you can use as a template for creating a rule:
9090
9191
**Request URL and header**
9292

0 commit comments

Comments
 (0)