Skip to content

Commit d35d09a

Browse files
authored
Update ransomware-detect-respond.md
1 parent 6f605a9 commit d35d09a

File tree

1 file changed

+1
-12
lines changed

1 file changed

+1
-12
lines changed

articles/security/fundamentals/ransomware-detect-respond.md

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Once a successful ransomware infection has been confirmed, the analyst should ve
4242

4343
In general, various server/endpoint antimalware, email antimalware and network protection solutions should be configured to automatically contain and mitigate known ransomware. There may be cases, however, where the specific ransomware variant has been able to bypass such protections and successfully infect target systems.
4444

45-
Microsoft provides extensive resources to help update your incident response processes on the [Top Azure Security Best Practices](/cloud-adoption-framework/secure/security-top-10#4-process-update-incident-response-processes-for-cloud).
45+
Microsoft provides extensive resources to help update your incident response processes on the [Top Azure Security Best Practices](/azure/cloud-adoption-framework/secure/security-top-10#4-process-update-incident-response-processes-for-cloud).
4646

4747
The following are recommended actions to contain or mitigate a declared incident involving ransomware where automated actions taken by antimalware systems have been unsuccessful:
4848

@@ -83,14 +83,3 @@ Other articles in this series:
8383
- [Ransomware protection in Azure](ransomware-protection.md)
8484
- [Prepare for a ransomware attack](ransomware-prepare.md)
8585
- [Azure features and resources that help you protect, detect, and respond](ransomware-features-resources.md)
86-
87-
88-
89-
90-
91-
92-
93-
94-
95-
96-

0 commit comments

Comments
 (0)