Skip to content

Commit 26f7ed4

Browse files
committed
Fixes per build report
1 parent f0f661d commit 26f7ed4

File tree

5 files changed

+5
-5
lines changed

5 files changed

+5
-5
lines changed

defender-office-365/step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ When your security team has decided on which categories of items that users can
5757
1. Repeat these same steps for the other policies: **Anti-phishing policy**, **Anti-Malware policy**, and **Safe Attachment policy**.
5858

5959
> [!TIP]
60-
> For more detailed information on what you've learned so far, see [Configure spam filter policies - Office 365](../anti-spam-policies-configure.md)| [Configure anti-phishing policies in EOP](../anti-phishing-policies-eop-configure.md) | [Configure anti-malware policies](../anti-malware-policies-configure.md)| [Set up Safe Attachments policies in Microsoft Defender for Office 365](../safe-attachments-policies-configure)
60+
> For more detailed information on what you've learned so far, see [Configure spam filter policies - Office 365](../anti-spam-policies-configure.md)| [Configure anti-phishing policies in EOP](../anti-phishing-policies-eop-configure.md) | [Configure anti-malware policies](../anti-malware-policies-configure.md)| [Set up Safe Attachments policies in Microsoft Defender for Office 365](../safe-attachments-policies-configure.md)
6161
6262
## Next Steps
6363

defender-xdr/advanced-hunting-emailpostdeliveryevents-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ To get more information about individual email messages, you can also use the [`
5555

5656
This table captures events with the following `ActionType` values:
5757

58-
- **Manual remediation** – An administrator manually took action on an email message after it was delivered to the user mailbox. This includes actions taken manually through [Threat Explorer](/defender-office-365/threat-explorer-real-time-detections-about) or approvals of [automated investigation and response (AIR) actions](m365d-autoir-actions).
58+
- **Manual remediation** – An administrator manually took action on an email message after it was delivered to the user mailbox. This includes actions taken manually through [Threat Explorer](/defender-office-365/threat-explorer-real-time-detections-about) or approvals of [automated investigation and response (AIR) actions](m365d-autoir-actions.md).
5959
- **Phish ZAP**[Zero-hour auto purge (ZAP)](/defender-office-365/zero-hour-auto-purge) took action on a phishing email after delivery.
6060
- **Malware ZAP** – Zero-hour auto purge (ZAP) took action on an email message found containing malware after delivery.
6161

defender-xdr/deploy-supported-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Deploying each service typically requires provisioning to your tenant and some i
7676
| Service | Provisioning instructions | Initial configuration |
7777
| ------ | ------ | ------ |
7878
| Microsoft Defender for Endpoint | [Microsoft Defender for Endpoint deployment guide](/defender-endpoint/deployment-phases) | *See provisioning instructions* |
79-
|Microsoft Defender for Office 365 | *None, provisioned with Office 365* | [Configure Microsoft Defender for Office 365 policies](/defender-office-365/defender-for-office-365#configure-atp-policies) |
79+
|Microsoft Defender for Office 365 | *None, provisioned with Office 365* | [Configure Defender for Office 365 protection policies](/defender-office-365/mdo-deployment-guide#step-2-configure-protection-policies) |
8080
| Microsoft Defender for Identity | [Quickstart: Create your Microsoft Defender for Identity instance](/azure-advanced-threat-protection/install-atp-step1) | *See provisioning instructions* |
8181
| Microsoft Defender for Cloud Apps | *None* | [Quickstart: Get started with Microsoft Defender for Cloud Apps](/cloud-app-security/getting-started-with-cloud-app-security) |
8282

defender-xdr/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ landingContent:
7979
- linkListType: overview
8080
links:
8181
- text: What is Microsoft Defender for Office 365?
82-
url: /defender-office-365/defender-for-office-365
82+
url: /defender-office-365/mdo-about
8383
- text: Microsoft Defender for Office 365 service description
8484
url: /office365/servicedescriptions/office-365-advanced-threat-protection-service-description
8585
- text: Microsoft Defender for Office 365 in Microsoft Defender XDR

defender-xdr/m365d-configure-auto-investigation-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Then, after you're all set up, you can [view and manage remediation actions in t
4343
|Subscription requirements|One of these subscriptions: <ul><li>Microsoft 365 E5</li><li>Microsoft 365 A5</li><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on</li><li>Microsoft 365 A3 with the Microsoft 365 A5 Security add-on</li><li>Office 365 E5 plus Enterprise Mobility + Security E5 plus Windows E5</li></ul> <br/> See [Microsoft Defender XDR licensing requirements](./prerequisites.md#licensing-requirements).|
4444
|Network requirements|<ul><li>[Microsoft Defender for Identity](/azure-advanced-threat-protection/what-is-atp) enabled</li><li>[Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security) configured</li><li>[Microsoft Defender for Identity integration](/cloud-app-security/mdi-integration)</li></ul>|
4545
|Windows device requirements|<ul><li>Windows 11</li><li>Windows 10, version 1709 or later installed (See [Windows release information](/windows/release-information/))</li><li>The following threat protection services are configured:<ul><li>[Microsoft Defender for Endpoint](/defender-endpoint/configure-endpoints)</li><li>[Microsoft Defender Antivirus](/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features)</li></ul></li></ul>|
46-
|Protection for email content and Office files|<ul><li>[Microsoft Defender for Office 365 is configured](/defender-office-365/defender-for-office-365#configure-atp-policies)</li><li>[Automated investigation and remediation capabilities in Defender for Endpoint are configured](/defender-endpoint/configure-automated-investigations-remediation) (required for manual response actions, such as deleting email messages on devices)</li></ul>|
46+
|Protection for email content and Office files|<ul><li>[Microsoft Defender for Office 365 is configured](/defender-office-365/mdo-deployment-guide#step-2-configure-protection-policies)</li><li>[Automated investigation and remediation capabilities in Defender for Endpoint are configured](/defender-endpoint/configure-automated-investigations-remediation) (required for manual response actions, such as deleting email messages on devices)</li></ul>|
4747
|Permissions|To configure automated investigation and response capabilities, you must have one of the following roles assigned in either Microsoft Entra ID (<https://portal.azure.com>) or in the Microsoft 365 admin center (<https://admin.microsoft.com>): <ul><li>Global Administrator</li><li>Security Administrator</li></ul>To work with automated investigation and response capabilities, such as by reviewing, approving, or rejecting pending actions, see [Required permissions for Action center tasks](m365d-action-center.md#required-permissions-for-action-center-tasks).|
4848

4949
## Review or change the automation level for device groups

0 commit comments

Comments
 (0)