Skip to content

Commit d3ca816

Browse files
authored
Link fixed.
1 parent 0e728fa commit d3ca816

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/virtual-desktop/sandbox.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ To publish Windows Sandbox to your host pool using PowerShell:
6464

6565
1. Connect to Azure using one of the following methods:
6666

67-
- Open a PowerShell prompt on your local device. Run the `Connect-AzAccount` cmdlet to sign in to your Azure account. For more information, see [Sign in with Azure PowerShell](https://github.com/powershell/azure/authenticate-azureps).
67+
- Open a PowerShell prompt on your local device. Run the `Connect-AzAccount` cmdlet to sign in to your Azure account. For more information, see [Sign in with Azure PowerShell](/powershell/azure/authenticate-azureps).
6868
- Sign in to [the Azure portal](https://portal.azure.com/) and open [Azure Cloud Shell](https://github.com/MicrosoftDocs/azure-docs-pr/pull/cloud-shell/overview.md) with PowerShell as the shell type.
6969

7070
2. Run the following cmdlet to get a list of all the Azure tenants your account has access to:
@@ -110,4 +110,4 @@ That's it! Leave the rest of the options default. You should now have Windows Sa
110110

111111
## Next steps
112112

113-
Learn more about sandboxes and how to use them to test Windows environments at [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview).
113+
Learn more about sandboxes and how to use them to test Windows environments at [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview).

0 commit comments

Comments
 (0)