Skip to content

Commit fc9a5b9

Browse files
authored
Broken link fixed
1 parent 410b4df commit fc9a5b9

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-cloud/defender-for-cloud-glossary.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This glossary provides a brief description of important terms and concepts for t
2222
|**APT** | Advanced Persistent Threats | [Video: Understanding APTs](/events/teched-2012/sia303)|
2323
| **Arc-enabled Kubernetes**| Azure Arc-enabled Kubernetes allows you to attach and configure Kubernetes clusters running anywhere. You can connect your clusters running on other public cloud providers or clusters running on your on-premises data center.|[What is Azure Arc-enabled Logic Apps? (Preview)](../logic-apps/azure-arc-enabled-logic-apps-overview.md)
2424
|**ARM**| Azure Resource Manager-the deployment and management service for Azure.| [Azure Resource Manager Overview](../azure-resource-manager/management/overview.md)|
25-
|**ASB**| Azure Security Benchmark provides recommendations on how you can secure your cloud solutions on Azure.| [Azure Security Benchmark](/azure/baselines/security-center-security-baseline) |
25+
|**ASB**| Azure Security Benchmark provides recommendations on how you can secure your cloud solutions on Azure.| [Azure Security Benchmark](/security/benchmark/azure/baselines/security-center-security-baseline) |
2626
|**Auto-provisioning**| To make sure that your server resources are secure, Microsoft Defender for Cloud uses agents installed on your servers to send information about your servers to Microsoft Defender for Cloud for analysis. You can use auto provisioning to quietly deploy the Azure Monitor Agent on your servers.| [Configure auto provision](../iot-dps/quick-setup-auto-provision.md)|
2727

2828
## B
@@ -123,4 +123,4 @@ This glossary provides a brief description of important terms and concepts for t
123123
|**Zero-Trust**|A new security model that assumes breach and verifies each request as though it originated from an uncontrolled network.|[Zero-Trust Security](../security/fundamentals/zero-trust.md)|
124124

125125
## Next Steps
126-
[Microsoft Defender for Cloud-overview](overview-page.md)
126+
[Microsoft Defender for Cloud-overview](overview-page.md)

0 commit comments

Comments
 (0)