Skip to content

Commit ed435f3

Browse files
authored
Merge pull request #179837 from memildin/asc-melvyn-folder-rename
More redirects for folder move
2 parents 344e141 + 7f9a7bb commit ed435f3

8 files changed

+108
-13
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 100 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/security-center/release-notes.md",
5+
"redirect_url": "/azure/defender-for-cloud/release-notes",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/security-center/release-notes-archive.md",
10+
"redirect_url": "/azure/defender-for-cloud/release-notes-archive",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/security-center/azure-defender.md",
515
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-introduction",
@@ -35,6 +45,11 @@
3545
"redirect_url": "/azure/defender-for-cloud/just-in-time-access-overview",
3646
"redirect_document_id": false
3747
},
48+
{
49+
"source_path_from_root": "/articles/security-center/apply-security-baseline.md",
50+
"redirect_url": "/azure/defender-for-cloud/apply-security-baseline",
51+
"redirect_document_id": false
52+
},
3853
{
3954
"source_path_from_root": "/articles/security-center/security-center-adaptive-application.md",
4055
"redirect_url": "/azure/defender-for-cloud/adaptive-application-controls",
@@ -105,11 +120,21 @@
105120
"redirect_url": "/azure/defender-for-cloud/threat-intelligence-reports",
106121
"redirect_document_id": false
107122
},
123+
{
124+
"source_path_from_root": "/articles/security-center/threat-intelligence-reports.md",
125+
"redirect_url": "/azure/defender-for-cloud/threat-intelligence-reports",
126+
"redirect_document_id": false
127+
},
108128
{
109129
"source_path_from_root": "/articles/security-center/security-center-data-security.md",
110130
"redirect_url": "/azure/defender-for-cloud/data-security",
111131
"redirect_document_id": false
112132
},
133+
{
134+
"source_path_from_root": "/articles/security-center/data-security.md",
135+
"redirect_url": "/azure/defender-for-cloud/data-security",
136+
"redirect_document_id": false
137+
},
113138
{
114139
"source_path_from_root": "/articles/security-center/security-center-remediate-recommendations.md",
115140
"redirect_url": "/azure/defender-for-cloud/implement-security-recommendations",
@@ -120,11 +145,21 @@
120145
"redirect_url": "/azure/defender-for-cloud/permissions",
121146
"redirect_document_id": false
122147
},
148+
{
149+
"source_path_from_root": "/articles/security-center/tenant-wide-permissions-management.md",
150+
"redirect_url": "/azure/defender-for-cloud/tenant-wide-permissions-management",
151+
"redirect_document_id": false
152+
},
123153
{
124154
"source_path_from_root": "/articles/security-center/security-center-cross-tenant-management.md",
125155
"redirect_url": "/azure/defender-for-cloud/cross-tenant-management",
126156
"redirect_document_id": false
127157
},
158+
{
159+
"source_path_from_root": "/articles/security-center/cross-tenant-management.md",
160+
"redirect_url": "/azure/defender-for-cloud/cross-tenant-management",
161+
"redirect_document_id": false
162+
},
128163
{
129164
"source_path_from_root": "/articles/security-center/security-center-management-groups.md",
130165
"redirect_url": "/azure/defender-for-cloud/management-groups-roles",
@@ -140,6 +175,11 @@
140175
"redirect_url": "/azure/defender-for-cloud/troubleshooting-guide",
141176
"redirect_document_id": false
142177
},
178+
{
179+
"source_path_from_root": "/articles/security-center/troubleshooting-guide.md",
180+
"redirect_url": "/azure/defender-for-cloud/troubleshooting-guide",
181+
"redirect_document_id": false
182+
},
143183
{
144184
"source_path_from_root": "/articles/security-center/security-center-endpoint-protection.md",
145185
"redirect_url": "/azure/defender-for-cloud/endpoint-protection-recommendations-technical",
@@ -195,6 +235,11 @@
195235
"redirect_url": "/azure/defender-for-cloud/enable-data-collection",
196236
"redirect_document_id": false
197237
},
238+
{
239+
"source_path_from_root": "/articles/security-center/features-paas.md",
240+
"redirect_url": "/azure/defender-for-cloud/features-paas",
241+
"redirect_document_id": false
242+
},
198243
{
199244
"source_path_from_root": "/articles/security-center/security-center-alerts-overview.md",
200245
"redirect_url": "/azure/defender-for-cloud/alerts-overview",
@@ -205,6 +250,21 @@
205250
"redirect_url": "/azure/defender-for-cloud/alert-validation",
206251
"redirect_document_id": false
207252
},
253+
{
254+
"source_path_from_root": "/articles/security-center/alert-validation.md",
255+
"redirect_url": "/azure/defender-for-cloud/alert-validation",
256+
"redirect_document_id": false
257+
},
258+
{
259+
"source_path_from_root": "/articles/security-center/incidents.md",
260+
"redirect_url": "/azure/defender-for-cloud/incidents",
261+
"redirect_document_id": false
262+
},
263+
{
264+
"source_path_from_root": "/articles/security-center/implement-security-recommendations.md",
265+
"redirect_url": "/azure/defender-for-cloud/implement-security-recommendations",
266+
"redirect_document_id": false
267+
},
208268
{
209269
"source_path_from_root": "/articles/security-center/security-center-provide-security-contact-details.md",
210270
"redirect_url": "/azure/defender-for-cloud/configure-email-notifications",
@@ -235,6 +295,11 @@
235295
"redirect_url": "/azure/defender-for-cloud/alerts-overview",
236296
"redirect_document_id": true
237297
},
298+
{
299+
"source_path_from_root": "/articles/security-center/alerts-schemas.md",
300+
"redirect_url": "/azure/defender-for-cloud/alerts-schemas",
301+
"redirect_document_id": true
302+
},
238303
{
239304
"source_path_from_root": "/articles/security-center/alerts-reference.md",
240305
"redirect_url": "/azure/defender-for-cloud/alerts-reference",
@@ -410,11 +475,6 @@
410475
"redirect_url": "/azure/defender-for-cloud/harden-docker-hosts",
411476
"redirect_document_id": true
412477
},
413-
{
414-
"source_path_from_root": "/articles/security-center/implement-security-recommendations.md",
415-
"redirect_url": "/azure/defender-for-cloud/implement-security-recommendations",
416-
"redirect_document_id": true
417-
},
418478
{
419479
"source_path_from_root": "/articles/security-center/index.yml",
420480
"redirect_url": "/azure/defender-for-cloud/index",
@@ -485,6 +545,16 @@
485545
"redirect_url": "/azure/defender-for-cloud/quickstart-onboard-aws",
486546
"redirect_document_id": true
487547
},
548+
{
549+
"source_path_from_root": "/articles/security-center/auto-deploy-vulnerability-assessment.md",
550+
"redirect_url": "/azure/defender-for-cloud/auto-deploy-vulnerability-assessment",
551+
"redirect_document_id": true
552+
},
553+
{
554+
"source_path_from_root": "/articles/security-center/security-policy-concept.md",
555+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
556+
"redirect_document_id": true
557+
},
488558
{
489559
"source_path_from_root": "/articles/security-center/quickstart-onboard-gcp.md",
490560
"redirect_url": "/azure/defender-for-cloud/quickstart-onboard-gcp",
@@ -515,6 +585,11 @@
515585
"redirect_url": "/azure/defender-for-cloud/secure-score-security-controls",
516586
"redirect_document_id": true
517587
},
588+
{
589+
"source_path_from_root": "/articles/security-center/secure-score-access-and-track.md",
590+
"redirect_url": "/azure/defender-for-cloud/secure-score-access-and-track",
591+
"redirect_document_id": true
592+
},
518593
{
519594
"source_path_from_root": "/articles/security-center/security-center-planning-and-operations-guide.md",
520595
"redirect_url": "/azure/defender-for-cloud/security-center-planning-and-operations-guide",
@@ -530,11 +605,31 @@
530605
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds",
531606
"redirect_document_id": true
532607
},
608+
{
609+
"source_path_from_root": "/articles/security-center/tutorial-protect-resources.md",
610+
"redirect_url": "/azure/defender-for-cloud/tutorial-protect-resources",
611+
"redirect_document_id": true
612+
},
613+
{
614+
"source_path_from_root": "/articles/security-center/tutorial-security-incident.md",
615+
"redirect_url": "/azure/defender-for-cloud/tutorial-security-incident",
616+
"redirect_document_id": true
617+
},
533618
{
534619
"source_path_from_root": "/articles/security-center/tutorial-security-policy.md",
535620
"redirect_url": "/azure/defender-for-cloud/tutorial-security-policy",
536621
"redirect_document_id": true
537622
},
623+
{
624+
"source_path_from_root": "/articles/security-center/update-regulatory-compliance-packages.md",
625+
"redirect_url": "/azure/defender-for-cloud/update-regulatory-compliance-packages",
626+
"redirect_document_id": true
627+
},
628+
{
629+
"source_path_from_root": "/articles/security-center/windows-admin-center-integration.md",
630+
"redirect_url": "/azure/defender-for-cloud/windows-admin-center-integration",
631+
"redirect_document_id": true
632+
},
538633
{
539634
"source_path_from_root": "/articles/security-center/workflow-automation.md",
540635
"redirect_url": "/azure/defender-for-cloud/workflow-automation",

articles/active-directory/roles/security-planning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ If your Azure Active Directory is connected to on-premises Active Directory, the
299299

300300
#### Establish integrated monitoring
301301

302-
The [Microsoft Defender for Cloud](../../security-center/security-center-introduction.md):
302+
The [Microsoft Defender for Cloud](../../defender-for-cloud/defender-for-cloud-introduction.md):
303303

304304
* Provides integrated security monitoring and policy management across your Azure subscriptions
305305
* Helps detect threats that may otherwise go unnoticed

articles/advisor/advisor-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ You can access Advisor recommendations as *Owner*, *Contributor*, or *Reader* of
5252

5353
Advisor provides recommendations for Application Gateway, App Services, availability sets, Azure Cache, Azure Data Factory, Azure Database for MySQL, Azure Database for PostgreSQL, Azure Database for MariaDB, Azure ExpressRoute, Azure Cosmos DB, Azure public IP addresses, Azure Synapse Analytics, SQL servers, storage accounts, Traffic Manager profiles, and virtual machines.
5454

55-
Azure Advisor also includes your recommendations from [Microsoft Defender for Cloud](../security-center/security-center-recommendations.md) which may include recommendations for additional resource types.
55+
Azure Advisor also includes your recommendations from [Microsoft Defender for Cloud](../defender-for-cloud/defender-for-cloud-introduction.md) which may include recommendations for additional resource types.
5656

5757
### Can I postpone or dismiss a recommendation?
5858

articles/advisor/advisor-security-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Azure Advisor provides you with a consistent, consolidated view of recommendatio
1010

1111
Defender for Cloud helps you prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources. It periodically analyzes the security state of your Azure resources. When Defender for Cloud identifies potential security vulnerabilities, it creates recommendations. The recommendations guide you through the process of configuring the controls you need.
1212

13-
For more information about security recommendations, see [Managing security recommendations in Microsoft Defender for Cloud](../security-center/security-center-recommendations.md).
13+
For more information about security recommendations, see [Review your security recommendations in Microsoft Defender for Cloud](../defender-for-cloud/review-security-recommendations.md).
1414

1515
## How to access Security recommendations in Azure Advisor
1616

articles/advisor/azure-advisor-score.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ The calculation of the Advisor score can be summarized in four steps:
6868
* Resources with long-standing recommendations will count more against your score.
6969
* Resources that you postpone or dismiss in Advisor are removed from your score calculation entirely.
7070

71-
Advisor applies this model at an Advisor category level to give an Advisor score for each category. **Security** uses a [secure score](../security-center/secure-score-security-controls.md#introduction-to-secure-score) model. A simple average produces the final Advisor score.
71+
Advisor applies this model at an Advisor category level to give an Advisor score for each category. **Security** uses a [secure score](../defender-for-cloud/secure-score-security-controls.md#introduction-to-secure-score) model. A simple average produces the final Advisor score.
7272

7373
## Advisor score FAQs
7474

articles/aks/monitor-aks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ This scenario is intended for customers using Azure Monitor to monitor AKS. It d
2121
- Monitoring of AKS with tools other than Azure Monitor except to fill gaps in Azure Monitor and Container Insights.
2222

2323
> [!NOTE]
24-
> Azure Monitor was designed to monitor the availability and performance of cloud resources. While the operational data stored in Azure Monitor may be useful for investigating security incidents, other services in Azure were designed to monitor security. Security monitoring for AKS is done with [Microsoft Sentinel](../sentinel/overview.md) and [Microsoft Defender for Cloud](../security-center/security-center-introduction.md). See [Monitor virtual machines with Azure Monitor - Security monitoring](../azure-monitor/vm/monitor-virtual-machine-security.md) for a description of the security monitoring tools in Azure and their relationship to Azure Monitor.
24+
> Azure Monitor was designed to monitor the availability and performance of cloud resources. While the operational data stored in Azure Monitor may be useful for investigating security incidents, other services in Azure were designed to monitor security. Security monitoring for AKS is done with [Microsoft Sentinel](../sentinel/overview.md) and [Microsoft Defender for Cloud](../defender-for-cloud/defender-for-cloud-introduction.md). See [Monitor virtual machines with Azure Monitor - Security monitoring](../azure-monitor/vm/monitor-virtual-machine-security.md) for a description of the security monitoring tools in Azure and their relationship to Azure Monitor.
2525
>
26-
> For information on using the security services to monitor AKS, see [Microsoft Defender for Kubernetes - the benefits and features](../security-center/defender-for-kubernetes-introduction.md) and [Connect Azure Kubernetes Service (AKS) diagnostics logs to Microsoft Sentinel](../sentinel/data-connectors-reference.md#azure-kubernetes-service-aks).
26+
> For information on using the security services to monitor AKS, see [Microsoft Defender for Kubernetes - the benefits and features](../defender-for-cloud/defender-for-kubernetes-introduction.md) and [Connect Azure Kubernetes Service (AKS) diagnostics logs to Microsoft Sentinel](../sentinel/data-connectors-reference.md#azure-kubernetes-service-aks).
2727
## Container insights
2828
AKS generates [platform metrics and resource logs](monitor-aks-reference.md), like any other Azure resource, that you can use to monitor its basic health and performance. Enable [Container insights](../azure-monitor/containers/container-insights-overview.md) to expand on this monitoring. Container insights is a feature in Azure Monitor that monitors the health and performance of managed Kubernetes clusters hosted on AKS in addition to other cluster configurations. Container insights provides interactive views and workbooks that analyze collected data for a variety of monitoring scenarios.
2929

articles/aks/operator-best-practices-cluster-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -306,5 +306,5 @@ For Windows Server nodes, regularly perform a node image upgrade operation to sa
306306
[best-practices-pod-security]: developer-best-practices-pod-security.md
307307
[pod-security-contexts]: developer-best-practices-pod-security.md#secure-pod-access-to-resources
308308
[aks-ssh]: ssh.md
309-
[security-center-aks]: ../security-center/defender-for-kubernetes-introduction.md
309+
[security-center-aks]: ../defender-for-cloud/defender-for-kubernetes-introduction.md
310310
[node-image-upgrade]: node-image-upgrade.md

articles/azure-functions/security-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This section guides you on configuring and running your function app as securely
2121

2222
### Defender for Cloud
2323

24-
Defender for Cloud integrates with your function app in the portal. It provides, for free, a quick assessment of potential configuration-related security vulnerabilities. Function apps running in a dedicated plan can also use Defender for Cloud's enhanced security features for an additional cost. To learn more, see [Protect your Azure App Service web apps and APIs](../security-center/defender-for-app-service-introduction.md).
24+
Defender for Cloud integrates with your function app in the portal. It provides, for free, a quick assessment of potential configuration-related security vulnerabilities. Function apps running in a dedicated plan can also use Defender for Cloud's enhanced security features for an additional cost. To learn more, see [Protect your Azure App Service web apps and APIs](../defender-for-cloud/defender-for-app-service-introduction.md).
2525

2626
### Log and monitor
2727

0 commit comments

Comments
 (0)