Skip to content

Commit 21c6379

Browse files
committed
Fix docs-link-absolute
1 parent 29b38c8 commit 21c6379

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

CloudAppSecurityDocs/posture-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 11/17/2024
1010
> [!NOTE]
1111
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation).
1212
13-
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](https://learn.microsoft.com/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
13+
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
1414

1515
![Screenshot of the SalesForce recommendations in Secure Score.](media/security-saas-sspm-in-secure-score-salesforce-filter.png)
1616

@@ -59,7 +59,7 @@ For more information, see [Assess your security posture with Microsoft Secure Sc
5959
6060
To effectively manage your organization’s SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
6161

62-
- [SaaS Security Initiative](https://learn.microsoft.com/defender-cloud-apps/saas-security-initiative)
62+
- [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative)
6363

6464
In addition you can find a variety of SSPM recommendations under different initiatives. Key initiatives include:
6565

CloudAppSecurityDocs/saas-security-initiative.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,6 @@ Once selected, you can click on any of the **Non-Compliant** recommendations to
4040
## Additional Information
4141

4242
- Each metric includes a list of associated app connectors, encouraging organizations to enable more connectors for enhanced visibility. If you're interested in recommendations for specific applications, navigate to the **Security Recommendations** tab and filter by the relevant application.
43-
- To learn more about Exposure Management initiatives visit [here](https://learn.microsoft.com/security-exposure-management/initiatives)
43+
- To learn more about Exposure Management initiatives, see [Review security initiatives](security-exposure-management/initiatives).
4444

4545

0 commit comments

Comments
 (0)