Skip to content

Commit 2df07fd

Browse files
committed
status
1 parent 99056d5 commit 2df07fd

10 files changed

+11
-11
lines changed

defender-endpoint/onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To start onboarding your devices:
4646

4747
This video provides a quick overview of the onboarding process and the different tools and methods.
4848

49-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bGqr]
49+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2524ee5d-6a5f-482c-8f69-dc3792577c60]
5050
5151
## Deploy using a ring-based approach
5252

defender-endpoint/overview-attack-surface-reduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ search.appverid: met150
3838
3939
Attack surfaces are all the places where your organization is vulnerable to cyberthreats and attacks. Defender for Endpoint includes several capabilities to help reduce your attack surfaces. Watch the following video to learn more about attack surface reduction.
4040

41-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4woug]
41+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=06675c1f-cd4d-4c79-96f5-f695aee327e5]
4242
4343
## Configure attack surface reduction capabilities
4444

defender-endpoint/rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ ms.date: 06/26/2024
3333
3434
Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have fine-grained control over what users with access to the portal can see and do.
3535

36-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bJ2a]
36+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=c9903800-3d26-4b30-bd0b-fed00dfc6a5c]
3737
3838
> [!IMPORTANT]
3939
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

defender-endpoint/respond-file-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -288,7 +288,7 @@ Use the deep analysis feature to investigate the details of any file, usually du
288288
:::image type="content" source="/defender/media/defender-endpoint/deep-analysis.png" alt-text="Screenshot of the Deep analysis action" lightbox="/defender/media/defender-endpoint/deep-analysis.png":::
289289

290290
Learn about deep analysis in the following video:
291-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4aAYy?rel=0]
291+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=c6c613b8-28dc-40cc-926d-8469472ebdfb]
292292
293293
**Submit for deep analysis** is enabled when the file is available in the Defender for Endpoint backend sample collection, or if it was observed on a Windows 10 device that supports submitting to deep analysis.
294294

defender-endpoint/review-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The alert page in Microsoft Defender for Endpoint provides full context to the a
3535

3636
Quickly triage, investigate, and take effective action on alerts that affect your organization. Understand why they were triggered, and their impact from one location. Learn more in this overview.
3737

38-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4yiO5]
38+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=8a9c08a6-558c-47a8-a336-d748acbdaa80]
3939
4040
## Getting started with an alert
4141

defender-office-365/address-compromised-users-quickly.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ When a user account is compromised, alerts are triggered. And in some cases, tha
5151
5252
Watch this short video to learn how you can detect and respond to user compromise in Microsoft Defender for Office 365 using Automated Investigation and Response (AIR) and compromised user alerts.
5353

54-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWAl83]
54+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=efb1e40c-dc48-42ea-a73c-1811a3913192]
5555
5656
### View and investigate restricted users
5757

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ In organizations with Microsoft Defender for Office 365 Plan 2 (add-on licenses
3333
This article explains the basics of Attack simulation training.
3434

3535
Watch this short video to learn more about Attack simulation training.
36-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWMhvB]
36+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=37f13948-e44b-4d1a-ac3b-a13ce02dabec]
3737
3838
> [!NOTE]
3939
> Attack simulation training replaces the old Attack Simulator v1 experience that was available in the Security & Compliance Center at **Threat management** \> **Attack simulator** or <https://protection.office.com/attacksimulator>.

defender-office-365/campaigns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The campaigns feature lets you see the overall picture of an email attack faster
3737

3838
Watch this short video on how campaigns in Microsoft Defender for Office 365 help you understand coordinated email attacks that target your organization.
3939

40-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGBL8]
40+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=0ed63ec3-48b1-4a6b-88d3-d3bb27b22c55]
4141
4242
## What is a campaign?
4343

defender-office-365/external-senders-use-the-delist-portal-to-unblock-yourself.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ As an email sender from outside Microsoft 365, are you getting an **Access denie
3333
> [!TIP]
3434
> There are good reasons for senders to wind up on the blocked senders list, but mistakes can happen. Take a look at this video for a balanced explanation of blocked senders and delisting:
3535
>
36-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMhvD]
36+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=74e1b7cf-3d15-4b69-b201-7b9220406244]
3737
>
3838
> For more information about best practices for sending messages to Microsoft 365, see the following articles:
3939
>

defender-office-365/mdo-sec-ops-manage-incidents-and-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ An [incident](/defender-xdr/incidents-overview) in Microsoft Defender XDR is a c
3232
Alerts are created when malicious or suspicious activity affects an entity (for example, email, users, or mailboxes). Alerts provide valuable insights about in-progress or completed attacks. However, an ongoing attack can affect multiple entities, which results in multiple alerts from different sources. Some built-in alerts automatically trigger AIR playbooks. These playbooks do a series of investigation steps to look for other impacted entities or suspicious activity.
3333

3434
Watch this short video on how to manage Microsoft Defender for Office 365 alerts in Microsoft Defender XDR.
35-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGrL2]
35+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=494596e0-41fe-4861-9df5-076312777b0d]
3636
3737
Defender for Office 365 alerts, investigations, and their data are automatically correlated. When a relationship is determined, the system creates an incident to give security teams visibility for the entire attack.
3838

@@ -128,4 +128,4 @@ You take action on email based on the result of a manual investigation or huntin
128128

129129
Watch this short video to learn how Microsoft Defender XDR combines alerts from various detection sources, like Defender for Office 365, into incidents.
130130

131-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGpcs]
131+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=6d002a6f-7009-428c-983e-1b5be8e0db36]

0 commit comments

Comments
 (0)