Skip to content

Commit d15a23d

Browse files
authored
Merge pull request #114921 from craigcaseyMSFT/vcraic0511
fix broken links from OPS report
2 parents 70f6cc1 + 33bd35b commit d15a23d

20 files changed

+23
-23
lines changed

articles/media-services/previous/media-services-rest-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -813,7 +813,7 @@ The returned **Path** property contains the SAS URL.
813813
Once you have the AccessPolicy and Locator set, you can download files using the Azure Storage REST APIs.
814814

815815
> [!NOTE]
816-
> You must add the file name for the file you want to download to the Locator **Path** value received in the previous section. For example, https://storagetestaccount001.blob.core.windows.net/asset-e7b02da4-5a69-40e7-a8db-e8f4f697aac0/BigBuckBunny.mp4? . . .
816+
> You must add the file name for the file you want to download to the Locator **Path** value received in the previous section. For example, `https://storagetestaccount001.blob.core.windows.net/asset-e7b02da4-5a69-40e7-a8db-e8f4f697aac0/BigBuckBunny.mp4`? . . .
817817
818818
For more information on working with Azure storage blobs, see [Blob Service REST API](https://docs.microsoft.com/rest/api/storageservices/Blob-Service-REST-API).
819819

articles/networking/networking-partners-msp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Use the links in this section for more information about managed cloud networkin
2727
| **MSP** | **Cloud Network Transformation Services** | **Managed ExpressRoute** | **Managed Virtual WAN** |
2828
| ---| ---| ---| ---|
2929
|[ANS Group UK](https://www.ans.co.uk/)|[Azure Managed Svc + ANS Glass 10wk implementation](https://azuremarketplace.microsoft.com/en-us/marketplace/consulting-services/ans_group.glassms)|||||
30-
|[Aryaka Networks](https://www.aryaka.com/azure-msp-vwan-managed-service-provider-launch-partner-aryaka/)||[Aryaka Azure Connect](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/aryaka.cloudconnect_azure_19?tab=Overview)|[Aryaka Azure Virtual WAN](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/aryaka.aryaka_azure_virtual_wan?tab=Overview) | | |
30+
|[Aryaka Networks](https://www.aryaka.com/azure-msp-vwan-managed-service-provider-launch-partner-aryaka/)||[Aryaka Azure Connect](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/aryaka.cloudconnect_azure_19?tab=Overview)|[Aryaka Azure Virtual WAN](https://azuremarketplace.microsoft.com/marketplace/apps/aryaka.cloudconnect_azure_19?tab=Overview) | | |
3131
|[BT](https://www.globalservices.bt.com/en/solutions/products/cloud-connect-azure)|[Network Transformation Consulting: 1-Hr Assessment](https://azuremarketplace.microsoft.com/en-us/marketplace/consulting-services/bt-americas-inc.network-transformation-consulting);[BT Cloud Connect Azure](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/bt-americas-inc.bt-cca-lh-001?tab=Overview)|[BT Cloud Connect Azure ExpressRoute](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/bt-americas-inc.bt-cca-lh-003?tab=Overview)|[BT Cloud Connect Azure VWAN](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/bt-americas-inc.bt-cca-lh-002?tab=Overview)|||
3232
|[Coevolve](https://www.coevolve.com/services/azure-networking-services/)|||[Managed VMware SD-WAN Virtual Edge](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/coevolveptylimited1581027739259.managed-vmware-sdwan-edge?tab=Overview)|||
3333
|[Colt](https://www.colt.net/why-colt/strategic-alliances/microsoft-partnership/msp/)|[Network optimisation on Azure: 2-hr Assessment](https://azuremarketplace.microsoft.com/en-us/marketplace/consulting-services/colttechnologyservices.azure_networking)|||||

articles/search/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,7 @@
463463
- name: Financial files demo
464464
href: https://wolterskluwereap.azurewebsites.net/
465465
- name: JFK files demo
466-
href: https://aka.ms/jfkfiles
466+
href: https://www.microsoft.com/en-us/ai/ai-lab-jfk-files
467467
- name: Training
468468
items:
469469
- name: Introduction (Microsoft Learn)

articles/security/develop/secure-develop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ generated passwords are random and that they have high entropy.
143143

144144
### Validate file uploads
145145

146-
If your application allows [file uploads](https://www.owasp.org/index.php/Unrestricted_File_Upload), consider precautions that you can take for this risky activity. The first step in many attacks is to get some malicious code into a system that is under attack. Using a file upload helps the attacker accomplish this. OWASP offers solutions for validating a file to ensure that the file you're uploading is safe.
146+
If your application allows [file uploads](https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload), consider precautions that you can take for this risky activity. The first step in many attacks is to get some malicious code into a system that is under attack. Using a file upload helps the attacker accomplish this. OWASP offers solutions for validating a file to ensure that the file you're uploading is safe.
147147

148148
Antimalware protection helps identify and remove viruses, spyware, and
149149
other malicious software. You can install [Microsoft Antimalware](../fundamentals/antimalware.md)

articles/security/develop/threat-modeling-tool-exception-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,7 @@ Check the links in the references section for additional details about exception
220220
| **SDL Phase** | Build |
221221
| **Applicable Technologies** | Generic |
222222
| **Attributes** | N/A |
223-
| **References** | [Fail securely](https://www.owasp.org/index.php/Fail_securely) |
223+
| **References** | [Fail securely](https://owasp.org/www-community/Fail_securely) |
224224
| **Steps** | Application should fail safely. Any method that returns a Boolean value, based on which certain decision is made, should have exception block carefully created. There are lot of logical errors due to which security issues creep in, when the exception block is written carelessly.|
225225

226226
### Example

articles/security/develop/threat-modeling-tool-input-validation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ Note that in MSXML6, ProhibitDTD is set to true (disabling DTD processing) by de
210210
| **SDL Phase** | Build |
211211
| **Applicable Technologies** | Generic |
212212
| **Attributes** | N/A |
213-
| **References** | [Unrestricted File Upload](https://www.owasp.org/index.php/Unrestricted_File_Upload), [File Signature Table](https://www.garykessler.net/library/file_sigs.html) |
213+
| **References** | [Unrestricted File Upload](https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload), [File Signature Table](https://www.garykessler.net/library/file_sigs.html) |
214214
| **Steps** | <p>Uploaded files represent a significant risk to applications.</p><p>The first step in many attacks is to get some code to the system to be attacked. Then the attack only needs to find a way to get the code executed. Using a file upload helps the attacker accomplish the first step. The consequences of unrestricted file upload can vary, including complete system takeover, an overloaded file system or database, forwarding attacks to back-end systems, and simple defacement.</p><p>It depends on what the application does with the uploaded file and especially where it is stored. Server side validation of file uploads is missing. Following security controls should be implemented for File Upload functionality:</p><ul><li>File Extension check (only a valid set of allowed file type should be accepted)</li><li>Maximum file size limit</li><li>File should not be uploaded to webroot; the location should be a directory on non-system drive</li><li>Naming convention should be followed, such that the uploaded file name have some randomness, so as to prevent file overwrites</li><li>Files should be scanned for anti-virus before writing to the disk</li><li>Ensure that the file name and any other metadata (e.g., file path) are validated for malicious characters</li><li>File format signature should be checked, to prevent a user from uploading a masqueraded file (e.g., uploading an exe file by changing extension to txt)</li></ul>|
215215

216216
### Example

articles/security/fundamentals/threat-detection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ SQL Database threat detectors use one of the following detection methodologies:
265265

266266
### Application Gateway Web Application Firewall
267267

268-
[Web Application Firewall (WAF)](../../app-service/environment/app-service-app-service-environment-web-application-firewall.md) is a feature of [Azure Application Gateway](../../application-gateway/application-gateway-web-application-firewall-overview.md) that provides protection to web applications that use an application gateway for standard [application delivery control](https://kemptechnologies.com/in/application-delivery-controllers) functions. Web Application Firewall does this by protecting them against most of the [Open Web Application Security Project (OWASP) top 10 common web vulnerabilities](https://www.owasp.org/index.php/Top_10_2010-Main).
268+
[Web Application Firewall (WAF)](../../app-service/environment/app-service-app-service-environment-web-application-firewall.md) is a feature of [Azure Application Gateway](../../application-gateway/application-gateway-web-application-firewall-overview.md) that provides protection to web applications that use an application gateway for standard [application delivery control](https://kemptechnologies.com/in/application-delivery-controllers) functions. Web Application Firewall does this by protecting them against most of the [Open Web Application Security Project (OWASP) top 10 common web vulnerabilities](https://owasp.org/www-project-top-ten/).
269269

270270
![Application Gateway Web Application Firewall diagram](./media/threat-detection/azure-threat-detection-fig13.png)
271271

articles/spring-cloud/disaster-recovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Follow [Custom Domain Document](spring-cloud-tutorial-custom-domain.md) to set u
4646
3. Create a traffic manager and two endpoints: [Create a Traffic Manager profile using the Azure portal](https://docs.microsoft.com/azure/traffic-manager/quickstart-create-traffic-manager-profile).
4747

4848
Here is the traffic manager profile:
49-
* Traffic Manager DNS Name: http://asc-bcdr.trafficmanager.net
49+
* Traffic Manager DNS Name: `http://asc-bcdr.trafficmanager.net`
5050
* Endpoint Profiles:
5151

5252
| Profile | Type | Target | Priority | Custom Header Settings |

articles/storage/blobs/storage-monitor-troubleshoot-storage-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ In this scenario, you use [Microsoft Message Analyzer](https://technet.microsoft
8282

8383
### Download Microsoft Message Analyzer
8484

85-
Download [Microsoft Message Analyzer](https://www.microsoft.com/download/details.aspx?id=44226) and install the application.
85+
Download [Microsoft Message Analyzer](https://docs.microsoft.com/message-analyzer/installing-and-upgrading-message-analyzer) and install the application.
8686

8787
Launch the application and choose **File** > **Open** > **From Other File Sources**.
8888

articles/storage/common/storage-migration-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -318,7 +318,7 @@ Read-access geo-redundant storage is required to access redundant storage. Howev
318318
319319
- **AzCopy**: Append **-secondary** to the storage account name in the URL to access the secondary endpoint. For example:
320320
321-
https://storageaccountname-secondary.blob.core.windows.net/vhds/BlobName.vhd
321+
`https://storageaccountname-secondary.blob.core.windows.net/vhds/BlobName.vhd`
322322
323323
- **SAS token**: Use an SAS token to access data from the endpoint. For more information, see [Using shared access signatures](storage-sas-overview.md).
324324

0 commit comments

Comments
 (0)