Skip to content

Commit 33742db

Browse files
committed
fix links
1 parent 94e486f commit 33742db

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ When a Defender for Identity sensor parses Windows event 8004, Defender for Iden
170170
171171
To configure NTLM auditing:
172172

173-
1. After you configure your initial Advanced Audit Policy settings in the [Defender portal](#configure-advanced-audit-policy-settings-from-the-ui) or [using PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell), open **Group Policy Management**. Then go to **Default Domain Controllers Policy** > **Local Policies** > **Security Options**.
173+
1. After you configure your initial Advanced Audit Policy settings in the [Defender portal](#configure-advanced-audit-policy-settings-in-the-defender-portal) or [using PowerShell](#configure-advanced-audit-policy-settings-using-powershell), open **Group Policy Management**. Then go to **Default Domain Controllers Policy** > **Local Policies** > **Security Options**.
174174

175175
1. Configure the specified security policies as follows:
176176

@@ -188,7 +188,7 @@ For example, to configure **Outgoing NTLM traffic to remote servers**, under **S
188188

189189
To collect events for object changes, such as for event 4662, you must also configure object auditing on the user, group, computer, and other objects. The following procedure describes how to enable auditing in the Active Directory domain.
190190

191-
To ensure that the domain controllers are properly configured to record the necessary events, review and audit your policies in the [Defender portal](#configure-advanced-audit-policy-settings-from-the-ui) or [using PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell) before you enable event collection. If auditing is configured properly, it has minimal effect on server performance.
191+
To ensure that the domain controllers are properly configured to record the necessary events, review and audit your policies in the [Defender portal](#configure-advanced-audit-policy-settings-in-the-defender-portal) or [using PowerShell](#configure-advanced-audit-policy-settings-using-powershell) before you enable event collection. If auditing is configured properly, it has minimal effect on server performance.
192192

193193
To configure domain object auditing:
194194

0 commit comments

Comments
 (0)