Skip to content

Commit 145aad0

Browse files
authored
Merge pull request #599 from MicrosoftDocs/shdyas
update content referencing redirected files and fix indentation
2 parents 7b2e151 + 1675ff7 commit 145aad0

8 files changed

+66
-66
lines changed

.openpublishing.redirection.defender.json

Lines changed: 56 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -1,74 +1,74 @@
11
{
2-
"redirections": [
2+
"redirections": [
33
{
4-
"source_path": "defender/advanced-hunting-overview.md",
5-
"redirect_url": "/defender-xdr/advanced-hunting-overview",
6-
"redirect_document_id": false
4+
"source_path": "defender/advanced-hunting-overview.md",
5+
"redirect_url": "/defender-xdr/advanced-hunting-overview",
6+
"redirect_document_id": false
77
},
88
{
99
"source_path": "defender-office-365/zero-trust-continuous-access-evaluation-microsoft-365.md",
1010
"redirect_url": "/security/zero-trust/zero-trust-continuous-access-evaluation-microsoft-365",
1111
"redirect_document_id": false
12-
},
13-
{
14-
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-common.md",
15-
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-common",
16-
"redirect_document_id": false
17-
},
18-
{
19-
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-exchange.md",
20-
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-exchange",
21-
"redirect_document_id": false
22-
},
23-
{
24-
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-guest-access.md",
25-
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-guest-access",
26-
"redirect_document_id": false
27-
},
28-
{
29-
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-mcas-saas.md",
30-
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-mcas-saas",
31-
"redirect_document_id": false
32-
},
33-
{
34-
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-overview.md",
35-
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-overview",
36-
"redirect_document_id": false
37-
},
38-
{
39-
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-prereq.md",
40-
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-prerequisite",
41-
"redirect_document_id": false
42-
},
43-
{
44-
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-sharepoint.md",
45-
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-sharepoint",
46-
"redirect_document_id": false
47-
},
48-
{
49-
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-teams.md",
50-
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-teams",
51-
"redirect_document_id": false
52-
},
53-
{
12+
},
13+
{
14+
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-common.md",
15+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-common",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-exchange.md",
20+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-exchange",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-guest-access.md",
25+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-guest-access",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-mcas-saas.md",
30+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-mcas-saas",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-overview.md",
35+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-overview",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-prereq.md",
40+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-prerequisite",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-sharepoint.md",
45+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-sharepoint",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "defender-office-365/zero-trust-identity-device-access-policies-teams.md",
50+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-teams",
51+
"redirect_document_id": false
52+
},
53+
{
5454
"source_path": "defender-endpoint/microsoft-defender-antivirus-using-mde-security-set-mngmnt.md",
5555
"redirect_url": "/defender-endpoint/evaluate-mdav-using-gp",
5656
"redirect_document_id": false
5757
},
58-
{
59-
"source_path": "defender-endpoint/preview.md",
60-
"redirect_url": "/defender-xdr/preview",
61-
"redirect_document_id": false
58+
{
59+
"source_path": "defender-endpoint/preview.md",
60+
"redirect_url": "/defender-xdr/preview",
61+
"redirect_document_id": false
6262
},
6363
{
64-
"source_path": "defender-endpoint/preview-settings.md",
65-
"redirect_url": "/defender-xdr/preview",
66-
"redirect_document_id": false
64+
"source_path": "defender-endpoint/preview-settings.md",
65+
"redirect_url": "/defender-xdr/preview",
66+
"redirect_document_id": false
6767
},
6868
{
69-
"source_path": "defender-business/mdb-preview.md",
70-
"redirect_url": "/defender-xdr/preview",
71-
"redirect_document_id": false
69+
"source_path": "defender-business/mdb-preview.md",
70+
"redirect_url": "/defender-xdr/preview",
71+
"redirect_document_id": false
7272
},
7373
{
7474
"source_path": "defender-endpoint/evaluation-lab.md",

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ To run any of the provided simulations, you need at least [one onboarded device]
129129
The Microsoft Defender for Endpoint evaluation lab is designed to eliminate the complexities of device and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action. Using the simplified set-up experience in evaluation lab, you can focus on running your own test scenarios and the pre-made simulations to see how Defender for Endpoint performs.
130130

131131
- [Watch the video overview](https://www.microsoft.com/videoplayer/embed/RE4qLUM) of the evaluation lab
132-
- [Get started with the lab](evaluation-lab.md)
132+
- [Get started with the lab](evaluate-microsoft-defender-antivirus.md)
133133

134134

135135
## See also

defender-endpoint/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ landingContent:
5050
- linkListType: get-started
5151
links:
5252
- text: Evaluate Microsoft Defender for Endpoint
53-
url: evaluation-lab.md
53+
url: evaluate-microsoft-defender-antivirus.md
5454
- text: Plan your deployment
5555
url: deployment-strategy.md
5656
- linkListType: deploy

defender-endpoint/migration-guides.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ If you're considering moving to Defender for Endpoint, we have guidance to help.
3434

3535
|Scenario|Guidance|
3636
|---|---|
37-
|You don't have an endpoint protection solution in place yet, and you want to know more about Defender for Endpoint. You want to see how Defender for Endpoint works before rolling it out in your environment.|[Microsoft Defender for Endpoint evaluation lab](evaluation-lab.md)|
37+
|You don't have an endpoint protection solution in place yet, and you want to know more about Defender for Endpoint. You want to see how Defender for Endpoint works before rolling it out in your environment.|[Microsoft Defender for Endpoint evaluation lab](evaluate-microsoft-defender-antivirus.md)|
3838
|You already have Defender for Endpoint, and you want some help getting everything set up and configured.|[Microsoft Defender for Endpoint deployment guide](mde-planning-guide.md)|
3939
|You're planning to switch from a non-Microsoft endpoint protection solution to Defender for Endpoint, which includes Microsoft Defender Antivirus. You want to get an overview of the migration process and how to make the switch.|[Make the switch to Microsoft Defender for Endpoint](switch-to-mde-overview.md)|
4040
|You've already migrated or onboarded to Defender for Endpoint. You want some help with next steps, such as managing your security settings, configuring more features, or fine-tuning your security policies.| [Configure general Defender for Endpoint settings](preferences-setup.md) |

defender-endpoint/whats-new-mde-archive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ For more information on Microsoft Defender for Endpoint on specific operating sy
9898

9999
## July 2022
100100

101-
- [Add domain controller devices - Evaluation lab enhancement](evaluation-lab.md#add-a-domain-controller)<br>Now generally available - Add a domain controller to run complex scenarios such as lateral movement and multistage attacks across multiple devices.
101+
- [Add domain controller devices - Evaluation lab enhancement](evaluate-microsoft-defender-antivirus.md)<br>Now generally available - Add a domain controller to run complex scenarios such as lateral movement and multistage attacks across multiple devices.
102102

103103
- [Announcing File page enhancements in Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-file-page-enhancements-in-microsoft-defender-for/ba-p/3584004)<br>Have you ever investigated files in Microsoft Defender for Endpoint? We now make it even easier with our recent announcement of enhancements to the File page and side panel. Users can now streamline processes by having a more efficient navigation experience that hosts all this information in one place.
104104

@@ -190,7 +190,7 @@ For more information on Microsoft Defender for Endpoint on specific operating sy
190190

191191
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md) <br> Microsoft Defender for Endpoint now adds support for Linux. This article [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md) enables you learn how to install, configure, update, and use Microsoft Defender for Endpoint for Linux.
192192

193-
- [Attack simulators in the evaluation lab](evaluation-lab.md#threat-simulator-scenarios) <br> Microsoft Defender for Endpoint has partnered with various threat simulation platforms to give you convenient access to test the capabilities of the platform right from within the portal.
193+
- [Attack simulators in the evaluation lab](evaluate-microsoft-defender-antivirus.md) <br> Microsoft Defender for Endpoint has partnered with various threat simulation platforms to give you convenient access to test the capabilities of the platform right from within the portal.
194194

195195
## April 2020
196196

@@ -222,7 +222,7 @@ For more information on Microsoft Defender for Endpoint on specific operating sy
222222

223223
- [Live response](live-response.md)<BR> Get instantaneous access to a device using a remote shell connection. Do in-depth investigative work and take immediate response actions to promptly contain identified threats - real time.
224224

225-
- [Evaluation lab](evaluation-lab.md) <BR> The Microsoft Defender for Endpoint evaluation lab is designed to eliminate the complexities of device and environment configuration so that you can
225+
- [Evaluation lab](evaluate-microsoft-defender-antivirus.md) <BR> The Microsoft Defender for Endpoint evaluation lab is designed to eliminate the complexities of device and environment configuration so that you can
226226
focus on evaluating the capabilities of the platform; running simulations; and seeing the prevention, detection, and remediation features in action.
227227

228228
- [Windows Server 2008 R2 SP1](configure-server-endpoints.md) <BR> You can now onboard Windows Server 2008 R2 SP1.

defender-office-365/step-by-step-guides/reducing-attack-surface-in-microsoft-teams.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,6 @@ Note that external organizations must also allow your organization's domain for
126126

127127
Consider configuring access policies to implement Zero Trust identity and device access policies to protect Microsoft Teams chats, groups, and content such as files and calendars.
128128

129-
Learn more about teams access policies: [Policy recommendations for securing Teams chats, groups, and files](../zero-trust-identity-device-access-policies-teams.md).
129+
Learn more about teams access policies: [Policy recommendations for securing Teams chats, groups, and files](/security/zero-trust/zero-trust-identity-device-access-policies-teams).
130130

131131
Security in Microsoft Teams: [Overview of security and compliance - Microsoft Teams | Microsoft Docs](/microsoftteams/security-compliance-overview).

defender-office-365/step-by-step-guides/utilize-microsoft-defender-for-office-365-in-sharepoint-online.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,4 +51,4 @@ To learn more, read [Step 2: (*Recommended*) Use SharePoint Online PowerShell to
5151

5252
### Further reading
5353

54-
[Policy recommendations for securing SharePoint sites and files](../zero-trust-identity-device-access-policies-sharepoint.md)
54+
[Policy recommendations for securing SharePoint sites and files](/security/zero-trust/zero-trust-identity-device-access-policies-sharepoint)

defender-office-365/tenant-wide-setup-for-increased-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ For information about ransomware protection, see the following articles:
8484

8585
## Configure tenant-wide sharing policies in SharePoint admin center
8686

87-
Microsoft recommendations for configuring SharePoint team sites at increasing levels of protection, starting with baseline protection. For more information, see [Policy recommendations for securing SharePoint sites and files](zero-trust-identity-device-access-policies-sharepoint.md).
87+
Microsoft recommendations for configuring SharePoint team sites at increasing levels of protection, starting with baseline protection. For more information, see [Policy recommendations for securing SharePoint sites and files](/security/zero-trust/zero-trust-identity-device-access-policies-sharepoint).
8888

8989
SharePoint team sites configured at the baseline level allow sharing files with external users by using anonymous access links. This approach is recommended instead of sending files in email.
9090

@@ -143,4 +143,4 @@ These articles and guides provide additional prescriptive information for securi
143143

144144
- [Microsoft security guidance for political campaigns, nonprofits, and other agile organizations](/microsoft-365/solutions/productivity-illustrations#security-guidance-for-political-campaigns-nonprofits-and-other-agile-organizations) (you can use these recommendations in any environment, especially cloud-only environments)
145145

146-
- [Recommended security policies and configurations for identities and devices](zero-trust-identity-device-access-policies-overview.md) (these recommendations include help for AD FS environments)
146+
- [Recommended security policies and configurations for identities and devices](/security/zero-trust/zero-trust-identity-device-access-policies-overview) (these recommendations include help for AD FS environments)

0 commit comments

Comments
 (0)