Skip to content

Commit 14678e9

Browse files
committed
Relative to file links
1 parent 8825f3c commit 14678e9

6 files changed

+10
-10
lines changed

defender-office-365/step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Our Strict preset security policy has more aggressive limits and settings for se
4545
- If the criteria above are met, then the user should be placed in the Strict preset security policy. Otherwise the user should be placed in the Standard preset security policy.
4646

4747
> [!TIP]
48-
> For information on what Standard and Strict security policies are, see this [article](/defender-office-365/recommended-settings-for-eop-and-office365).
48+
> For information on what Standard and Strict security policies are, see this [article](../recommended-settings-for-eop-and-office365.md).
4949
5050
## Enable Security Presets in Microsoft Defender for Office 365
5151

@@ -66,13 +66,13 @@ Once you've chosen between the Standard and Strict security preset policies for
6666
1. Click on the **Confirm** button.
6767

6868
> [!TIP]
69-
> To learn more about preset policies click [here](/defender-office-365/preset-security-policies)
69+
> To learn more about preset policies click [here](../preset-security-policies.md)
7070
7171
## Your next step is Config Analyzer
7272

7373
Use config analyzer to determine if your users are configured per Microsoft's best practices.
7474

7575
> [!TIP]
76-
> Configuration analyzer allows admins to find and fix security policies where the settings are below the Standard or Strict protection profile settings in preset security policies. Find out more about Configuration analyzer [here](/defender-office-365/configuration-analyzer-for-security-policies).
76+
> Configuration analyzer allows admins to find and fix security policies where the settings are below the Standard or Strict protection profile settings in preset security policies. Find out more about Configuration analyzer [here](../configuration-analyzer-for-security-policies.md).
7777
78-
Secure Presets are always recommended because it *ensures* admins are exercising Microsoft best practices. However, in some cases customized configurations are required. Learn about the reasons to use custom policies [here](/defender-office-365/mdo-deployment-guide#determine-your-protection-policy-strategy)
78+
Secure Presets are always recommended because it *ensures* admins are exercising Microsoft best practices. However, in some cases customized configurations are required. Learn about the reasons to use custom policies [here](../mdo-deployment-guide#determine-your-protection-policy-strategy.md)

defender-office-365/step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Our custom policies give admins the ability to decide what items their users can
3939
1. It's **strongly recommended** that malware and high confidence phish items be assigned to **AdminOnlyPolicy**, regular confidence phish items be assigned *limited access with request release*, while bulk and spam can be left as full access for users.
4040

4141
> [!IMPORTANT]
42-
> For more information on how granular custom policies can be created, see [Quarantine policies - Office 365 | Microsoft Docs](/defender-office-365/quarantine-policies).
42+
> For more information on how granular custom policies can be created, see [Quarantine policies - Office 365 | Microsoft Docs](../quarantine-policies.md).
4343
4444
## Assigning quarantine policies and enabling notification with organization branding
4545

@@ -66,4 +66,4 @@ When your security team has decided on which categories of items that users can
6666

6767
## More information
6868

69-
Learn more about organization branding and notification settings here [Quarantine policies](/defender-office-365/quarantine-policies).
69+
Learn more about organization branding and notification settings here [Quarantine policies](../quarantine-policies.md).

defender-office-365/step-by-step-guides/how-to-run-attack-simulations-for-your-team.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,4 @@ Attack simulation training allows you to run realistic but benign cyber attack s
5252

5353
### Further reading
5454

55-
To learn how Attack Simulation works see [Simulate a phishing attack with Attack simulation training - Office 365 | Microsoft Docs](/defender-office-365/attack-simulation-training-simulations).
55+
To learn how Attack Simulation works see [Simulate a phishing attack with Attack simulation training - Office 365 | Microsoft Docs](../attack-simulation-training-simulations.md).

defender-office-365/step-by-step-guides/how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,4 +49,4 @@ Attack simulation training lets you run benign attack simulations on your organi
4949

5050
## Learn More
5151

52-
Full guidance can be found at [Simulation automations for Attack simulation training - Office 365 | Microsoft Docs](/defender-office-365/attack-simulation-training-simulation-automations).
52+
Full guidance can be found at [Simulation automations for Attack simulation training - Office 365 | Microsoft Docs](../attack-simulation-training-simulation-automations.md).

defender-office-365/step-by-step-guides/optimize-and-correct-security-policies-with-configuration-analyzer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,4 +41,4 @@ While in **Configuration analyzer** you can select **Configuration drift analysi
4141

4242
The page which loads will show you the modifications to your security policies in the timeframe selected by the filters, along with data about the change and if it increased or decreased your overall posture.
4343

44-
To learn more details about Configuration Analyzer, see [Configuration analyzer for security policies - Office 365 | Microsoft Docs](/defender-office-365/configuration-analyzer-for-security-policies).
44+
To learn more details about Configuration Analyzer, see [Configuration analyzer for security policies - Office 365 | Microsoft Docs](../configuration-analyzer-for-security-policies.md).

defender-office-365/step-by-step-guides/search-for-emails-and-remediate-threats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,4 +69,4 @@ Given the common scenarios, email remediation can be triggered in three differen
6969

7070
## More information
7171

72-
[Learn more about email remediation](/defender-office-365/air-review-approve-pending-completed-actions).
72+
[Learn more about email remediation](../air-review-approve-pending-completed-actions.md).

0 commit comments

Comments
 (0)