Skip to content

Commit 3cbd30a

Browse files
authored
Merge pull request #165 from MicrosoftDocs/shdyas-migration-fixes
redirect fixes and acrolinx setup for new docsets
2 parents 48116ee + 6b1c05c commit 3cbd30a

11 files changed

+13
-13
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{:changed-files-limit 30
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["defender-xdr/" "exposure-management/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["defender-xdr/" "exposure-management/" "defender/" "defender-business/" "defender-vulnerability-management/" "defender-office-365/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

defender-endpoint/endpoint-attack-notifications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ If you're a Microsoft Defender for Endpoint customer, you can apply for Endpoint
5252
Endpoint Attack Notifications are alerts that have been hand crafted by Microsoft's managed hunting service based on suspicious activity in your environment. They can be viewed through several mediums:
5353
- The alerts queue in the Microsoft Defender portal
5454
- Using the [API](/defender-endpoint/get-alerts)
55-
- [DeviceAlertEvents](/defender-endpoint/advanced-hunting-devicealertevents-table) table in Advanced hunting
55+
- [DeviceAlertEvents](/defender-xdr/advanced-hunting-migrate-from-mde#map-devicealertevents-table) table in Advanced hunting
5656
- Your email if you [configure an email notifications](/defender-endpoint/configure-vulnerability-email-notifications) rule
5757

5858
Endpoint Attack Notifications can be identified by:

defender-endpoint/investigate-machines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ A grey circle indicates that the data is unknown.
233233
> [!NOTE]
234234
> The overall status message for macOS and Linux devices currently shows up as 'Status not available for macOS & Linux'. Currently, the status summary is only available for Windows devices. All other information in the table is up to date to show the individual states of each device health signal for all supported platforms.
235235
236-
To gain an in-depth view of the device health report, you can go to **Reports > Devices health**. For more information, see [Device health and compliance report in Microsoft Defender for Endpoint](/defender-endpoint/machine-reports).
236+
To gain an in-depth view of the device health report, you can go to **Reports > Devices health**. For more information, see [Device health and compliance report in Microsoft Defender for Endpoint](device-health-reports.md).
237237

238238
> [!NOTE]
239239
> The date and time for Defender Antivirus mode is currently not available.

defender-endpoint/whats-new-mde-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ For more information on Microsoft Defender for Endpoint on specific operating sy
8888

8989
- [Device health status](investigate-machines.md#device-health-status)<br>The Device health status card shows a summarized health report for the specific device.
9090

91-
- [Device health reporting (Preview)](/defender-endpoint/machine-reports)<br> The devices status report provides high-level information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, and Windows 10 versions.
91+
- [Device health reporting (Preview)](device-health-reports.md)<br> The devices status report provides high-level information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, and Windows 10 versions.
9292

9393
- [Tamper protection on macOS is now generally available](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/tamper-protection-on-macOS-is-now-generally-available/ba-p/3595422)<br> This feature will be released with audit mode enabled by default, and you can decide whether to enforce (block) or turn off the capability. Later this year, we'll offer a gradual rollout mechanism that will automatically switch endpoints to "block" mode; this mechanism applies only if you haven't made a choice to either enable ("block" mode) or disable the capability.
9494

defender-vulnerability-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,9 +127,9 @@
127127
- name: Browser extensions
128128
items:
129129
- name: Export browser extensions assessment
130-
href: /defender-endpoint/get-assessment-browser-extensions
130+
href: /defender-endpoint/api/get-assessment-browser-extensions
131131
- name: Get browser extensions permission information
132-
href: /defender-endpoint/get-browser-extensions-permission-info
132+
href: /defender-endpoint/api/get-browser-extensions-permission-info
133133
- name: Information gathering
134134
items:
135135
- name: Export information gathering assessment

defender-vulnerability-management/defender-vulnerability-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Run vulnerability management related API calls to automate vulnerability managem
8787

8888
See the following articles for related Defender for Endpoint APIs:
8989

90-
- [Machine APIs](/defender-endpoint/machine)
90+
- [Machine APIs](/defender-endpoint/api/machine)
9191
- [Recommendation APIs](/defender-endpoint/api/vulnerability)
9292
- [Score APIs](/defender-endpoint/score)
9393
- [Software APIs](/defender-endpoint/api/software)

defender-vulnerability-management/tvm-browser-extensions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,8 +106,8 @@ You can also view a list of extensions installed on a device:
106106

107107
You can use APIs to view all browser extensions installed in your organization, including installed versions, permissions requested, and associated risk. For more information, see:
108108

109-
- [Export browser extensions assessment per device](/defender-endpoint/get-assessment-browser-extensions)
110-
- [Get browser extensions permission information](/defender-endpoint/get-browser-extensions-permission-info)
109+
- [Export browser extensions assessment per device](/defender-endpoint/api/get-assessment-browser-extensions)
110+
- [Get browser extensions permission information](/defender-endpoint/api/get-browser-extensions-permission-info)
111111

112112
### Use advanced hunting
113113

defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ To address this, Defender Vulnerability Management will no longer report such CV
7474

7575
- Defender Vulnerability Management is now supported for Amazon Linux 2 and Fedora 33 or higher.
7676

77-
- [Browser extensions APIs](/defender-endpoint/get-assessment-browser-extensions) </br>
77+
- [Browser extensions APIs](/defender-endpoint/api/get-assessment-browser-extensions) </br>
7878
You can now use the new browser extensions APIs to view all browser extensions installed in your organization, including installed versions, permissions requested, and associated risk.
7979

8080
- [Extended software inventory API support for non product code software](/defender-endpoint/get-assessment-non-cpe-software-inventory) </br>

defender-xdr/configure-email-notifications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ You can create rules that determine the devices and alert severities to send ema
5757
> [!NOTE]
5858
> This information might be processed by recipient mail servers that are not in the geographic location you have selected for your Defender data.
5959
60-
- **Devices** - Choose whether to notify recipients for alerts on all devices (Global administrator role only) or on selected device groups. For more information, see [Create and manage device groups](/defender-endpoint/machine-groups.md). (If you're using [Defender for Business](/defender-business/mdb-overview), device groups do not apply.)
60+
- **Devices** - Choose whether to notify recipients for alerts on all devices (Global administrator role only) or on selected device groups. For more information, see [Create and manage device groups](/defender-endpoint/machine-groups). (If you're using [Defender for Business](/defender-business/mdb-overview), device groups do not apply.)
6161
- **Alert severity** - Choose the alert severity level.
6262

6363
4. Click **Next**.

defender-xdr/m365d-configure-auto-investigation-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ You can choose from several options to change settings for your automated invest
7777

7878
|To do this|Follow these steps|
7979
|---|---|
80-
|Specify automation levels for groups of devices|<ol><li>Set up one or more device groups. See [Create and manage device groups](/defender-endpoint/machine-groups.md). </li><li>In the Microsoft Defender portal, go to **Permissions** \> **Endpoints roles & groups** \> **Device groups**.</li><li>Select a device group and review its **Automation level** setting. (We recommend using **Full - remediate threats automatically**). See [Automation levels in automated investigation and remediation capabilities](/defender-endpoint/automation-levels).</li><li>Repeat steps 2 and 3 as appropriate for all your device groups. </li></ol>|
80+
|Specify automation levels for groups of devices|<ol><li>Set up one or more device groups. See [Create and manage device groups](/defender-endpoint/machine-groups). </li><li>In the Microsoft Defender portal, go to **Permissions** \> **Endpoints roles & groups** \> **Device groups**.</li><li>Select a device group and review its **Automation level** setting. (We recommend using **Full - remediate threats automatically**). See [Automation levels in automated investigation and remediation capabilities](/defender-endpoint/automation-levels).</li><li>Repeat steps 2 and 3 as appropriate for all your device groups. </li></ol>|
8181

8282
## Next steps
8383

0 commit comments

Comments
 (0)