Skip to content

Commit 7c7136e

Browse files
committed
fixes
1 parent 52ebb68 commit 7c7136e

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Windows authenticated scan will officially be deprecated on November 30, 2025. A
138138

139139
### What happens to my data after the product is deprecated?
140140

141-
All user data is handled according to our [data storage and privacy policy](tvm-prerequisites.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
141+
All user data is handled according to our [Data storage and privacy](defender-vulnerability-management.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
142142

143143
### Will the product be replaced?
144144

defender-vulnerability-management/tvm-prerequisites.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.date: 02/23/2025
2020

2121
## Licensing requirements
2222

23-
Microsoft Defender Vulnerability Management is available as an add-on for [Microsoft Defender for Endpoint Plan 2](../defender-endpoint/microsoft-defender-endpoint.md) or as a standalone subscription.
23+
Microsoft Defender Vulnerability Management is available as an add-on for [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint) or as a standalone subscription.
2424

2525
- Defender for Endpoint Plan 2 includes core vulnerability management capabilities. The Defender Vulnerability Management add-on extends these capabilities with consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools.
2626

@@ -34,17 +34,17 @@ To start a trial or to purchase Defender Vulnerability Management, see [Sign up
3434

3535
- Devices must be running a [Supported operating systems, platforms, and capabilities](tvm-supported-os.md) with available updates installed
3636

37-
- Devices must meet the minimum requirements for [Defender for Endpoint](../defender-endpoint/minimum-requirements.md)
37+
- Devices must meet the minimum requirements for [Defender for Endpoint](/defender-endpoint/minimum-requirements)
3838

3939
## Roles and permissions
4040

41-
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control]((../defender-xdr/manage-rbac.md)) (RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.
41+
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control]((/defender-xdr/manage-rbac)) (RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.
4242

4343
- **Read** permissions enable your security team to view Defender Vulnerability Management data for software, weaknesses, missing KBs, advanced hunting, security baselines assessment, and devices.
4444

4545
- **Manage** permissions enable your security team to address vulnerabilities, manage remediation activities, and manage exceptions to security recommendations
4646

47-
For more information, see [Start using Microsoft Defender XDR Unified RBAC model](../defender-xdr/manage-rbac.md#start-using-microsoft-defender-xdr-unified-rbac-model).
47+
For more information, see [Start using Microsoft Defender XDR Unified RBAC model](/defender-xdr/manage-rbac#start-using-microsoft-defender-xdr-unified-rbac-model).
4848

4949

5050
## Related articles

0 commit comments

Comments
 (0)