Skip to content

Commit ab01ae1

Browse files
authored
Merge branch 'main' into meganbradley/docutune-autopr-20250111-054319-1393866-ignore-build
2 parents ddc39af + 72a97f8 commit ab01ae1

File tree

70 files changed

+104
-94
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+104
-94
lines changed

ATPDocs/microsoft-365-security-center-mdi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ The following table lists the changes in navigation between Microsoft Defender f
106106

107107
For more information, see:
108108

109-
- [Related videos for Microsoft Defender for Identity](https://www.microsoft.com/videoplayer/embed/RE4HcEU)
109+
- [Related videos for Microsoft Defender for Identity](https://learn-video.azurefd.net/vod/player?id=f4589332-7b78-40f0-b456-b896851a5aae)
110110
- [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender)
111111
- [Microsoft Defender for Identity](/defender-for-identity/)
112112

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Use app governance to create OAuth policies for apps connected to Microsoft 365,
1717

1818
<br>
1919

20-
>[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4YU37]
20+
>[!VIDEO https://learn-video.azurefd.net/vod/player?id=b10dbf02-9f56-4f37-8c68-8221be5b4aea]
2121
2222
<a name='create-oauth-app-policies-for-azure-ad'></a>
2323

CloudAppSecurityDocs/app-governance-manage-app-governance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Cyber attacks have become increasingly sophisticated in the ways they exploit th
1111

1212
To understand the potential risks and stop these types of attacks, you need to gain clear visibility into your organization’s app compliance posture. You need to be able to quickly identify when an app exhibits anomalous behaviors and respond when these behaviors present risks to your environment, data, and users. <br><br>
1313

14-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4S7sp]
14+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=ed7ad7f7-58dc-4a09-ace3-e1d6b8f55353]
1515
1616
## App governance features
1717

CloudAppSecurityDocs/app-governance-predefined-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ description: Get started learning about predefined app policies.
1010
App governance contains a set of out of the box policies to detect anomalous app behaviors. These policies are activated by default, but you can deactivate them if you choose to.<br>
1111
<br>
1212

13-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4YpJN]
13+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=22872b35-18aa-424d-bec7-3f77869a5e47]
1414
1515
## Working with predefined policies
1616

CloudAppSecurityDocs/app-governance-secure-apps-app-hygiene-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ These features enable automatic control over these apps and provide extra app be
1717

1818
Watch this video for a brief explanation of these features:
1919

20-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWWYEm]
20+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=d22073a4-555a-413a-8e01-fc0f42d97f6f]
2121
2222
## App insights
2323

CloudAppSecurityDocs/mde-investigation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Sometimes, access to an unsanctioned app isn't blocked, either because the endpo
110110
111111
## Related videos
112112
113-
- [Hunting with Microsoft Cloud App Security data](https://www.microsoft.com/videoplayer/embed/RWFISa)
113+
- [Hunting with Microsoft Cloud App Security data](https://learn-video.azurefd.net/vod/player?id=ffdedc73-6edf-45a9-8c90-566296e8d4ec)
114114
115115
- [Discover and block Shadow IT using Defender for Endpoint](https://www.youtube.com/watch?v=MsHkTOoqSQo)
116116

CloudAppSecurityDocs/microsoft-365-security-center-defender-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Learn how to protect your cloud apps in Microsoft Defender XDR:
6767

6868
**Protecting cloud apps in Microsoft Defender XDR**:<br>
6969

70-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE59yVU title="Protecting cloud apps in Microsoft Defender XDR"]
70+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=a722f8cd-806b-40dd-ad93-139fa2b487b9 title="Protecting cloud apps in Microsoft Defender XDR"]
7171
7272
<br>
7373

CloudAppSecurityDocs/protect-workday.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Watch our quick start video showing how to configure the prerequisites and perfo
5959
6060
<br />
6161

62-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4n1ZO]
62+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=abfc7df7-12cc-4c9b-bb81-cf00450f9b76]
6363
6464
### Prerequisites
6565

CloudAppSecurityDocs/webinars.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,11 @@ You can watch recorded sessions at any time.
2121
2222
| Title | Learn about |
2323
| --- | --- |
24-
| **Information protection**<br />[Watch now](https://www.microsoft.com/videoplayer/embed/RE4Gejk)<br />*Captions available* | - Protecting your cloud data<br />- Real-time monitoring and control<br />- Best practices for connecting your apps, identify data types, auditing your environment, and remediating with governance actions |
25-
| **Threat detection**<br />[Watch now](https://www.microsoft.com/videoplayer/embed/RE4I2y0)<br />*Captions available* | - Protecting against cloud threats<br />- Detecting threats across cloud apps<br />- Detecting malware<br />- OAuth app permissions<br />- Configuring alerts in policies |
24+
| **Information protection**<br />[Watch now](https://learn-video.azurefd.net/vod/player?id=2b0ccbae-0ef5-42d0-8937-de14c8f9a2dd)<br />*Captions available* | - Protecting your cloud data<br />- Real-time monitoring and control<br />- Best practices for connecting your apps, identify data types, auditing your environment, and remediating with governance actions |
25+
| **Threat detection**<br />[Watch now](https://learn-video.azurefd.net/vod/player?id=4b45e4b8-9273-4347-8460-6df64e8f018a)<br />*Captions available* | - Protecting against cloud threats<br />- Detecting threats across cloud apps<br />- Detecting malware<br />- OAuth app permissions<br />- Configuring alerts in policies |
2626
| **Extending real-time monitoring & controls**<br />[Watch now](https://www.youtube.com/watch?v=hGqL89V6zAI) | - Session control & reverse proxy infrastructure<br />- Featured apps and out-of-the-box controls<br />- Onboarding any apps (new, custom, and on-premises apps)<br />- Extending controls for any app |
27-
| **App discovery and log collector configuration**<br />[Watch now](https://www.microsoft.com/videoplayer/embed/RE4GtTy)<br />*Captions available* | - How discovery works<br />- The Shadow IT discovery lifecycle<br />- Extending integration with secure web gateways<br />- Discovery using log collectors |
28-
| **Automation and integration with Microsoft Power Automate**<br />[Watch now](https://www.microsoft.com/videoplayer/embed/RE4GjvM)<br />*Captions available* | Extending Defender for Cloud Apps with Microsoft Flow to automate advanced remediation scenarios |
27+
| **App discovery and log collector configuration**<br />[Watch now](https://learn-video.azurefd.net/vod/player?id=615a1bdd-7db1-4541-8ac0-6545c5e060c8)<br />*Captions available* | - How discovery works<br />- The Shadow IT discovery lifecycle<br />- Extending integration with secure web gateways<br />- Discovery using log collectors |
28+
| **Automation and integration with Microsoft Power Automate**<br />[Watch now](https://learn-video.azurefd.net/vod/player?id=6c01d595-b69c-4b3f-8016-d44f34f60118)<br />*Captions available* | Extending Defender for Cloud Apps with Microsoft Flow to automate advanced remediation scenarios |
2929

3030
## Next steps
3131

defender-endpoint/api/apis-intro.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Defender for Endpoint exposes much of its data and actions through a set of prog
3939

4040
Watch this video for a quick overview of Defender for Endpoint's APIs.
4141

42-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4d73M]
42+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=f6300637-b48e-49d7-aa76-2778a711ae6c]
4343
4444
In general, you'll need to take the following steps to use the APIs:
4545

0 commit comments

Comments
 (0)