Skip to content

Commit b9a7a4b

Browse files
authored
Merge pull request #2414 from meganbradley/meganbradley/docutune-autopr-20250111-054319-1393866-ignore-build
[BULK] - DocuTune remediation - Red Tiger deprecation (part 3)
2 parents 72a97f8 + ab01ae1 commit b9a7a4b

10 files changed

+15
-16
lines changed

defender-endpoint/indicator-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The following table shows the supported parameters.
7878
> Network indicators do not support the action type, `BlockAndRemediate`. If a network indicator is set to `BlockAndRemediate`, it won't import.
7979
8080
Watch this video to learn how Microsoft Defender for Endpoint provides multiple ways to add and manage Indicators of compromise (IoCs).
81-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4qLVw]
81+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=a4469df9-4f31-4ed0-9577-8b26ac5293ad]
8282
8383
## See also
8484

defender-endpoint/indicators-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Organizations can create indicators that define the detection, prevention, and e
4747

4848
This video shows a walkthrough of creating and adding indicators:
4949

50-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4qLVw]
50+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=a4469df9-4f31-4ed0-9577-8b26ac5293ad]
5151
5252
### About Microsoft indicators
5353

@@ -178,4 +178,4 @@ Microsoft Store apps cannot be blocked by Defender because they're signed by Mic
178178
- [Use partner integrated solutions](partner-applications.md)
179179

180180

181-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
181+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/investigate-incidents.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ When you investigate an incident, you'll see:
3535
- Incident comments and actions
3636
- Tabs (alerts, devices, investigations, evidence, graph)
3737

38-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4qLUV]
38+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=46fe6a58-ea33-4f79-a1ec-26ae86d68033]
3939
4040
## Analyze incident details
4141

defender-endpoint/live-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Live response gives security operations teams instantaneous access to a device (
3131

3232
Live response is designed to enhance investigations by enabling your security operations team to collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and proactively hunt for emerging threats.
3333

34-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4qLUW]
34+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=38c8abec-021a-4cda-9198-5ff6402a79ee]
3535
3636
With live response, analysts can do all of the following tasks:
3737

defender-endpoint/manage-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Selecting an alert in either of those places brings up the **Alert management pa
3838
:::image type="content" source="media/atp-alerts-selected.png" alt-text="The Alert management pane and the Alerts queue" lightbox="media/atp-alerts-selected.png":::
3939

4040
Watch this video to learn how to use the new Microsoft Defender for Endpoint alert page.
41-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4yiO5]
41+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=8a9c08a6-558c-47a8-a336-d748acbdaa80]
4242
4343
## Link to another incident
4444

@@ -120,7 +120,7 @@ Alternatively, the team leader might assign the alert to the **Resolved** queue
120120
You can choose not to set a classification, or specify whether an alert is a true alert or a false alert. It's important to provide the classification of true positive/false positive. This classification is used to monitor alert quality, and make alerts more accurate. The "determination" field defines additional fidelity for a "true positive" classification.
121121

122122
The steps to classify alerts are included in this video:
123-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4LHJq]
123+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=e2ff3e56-0f6e-4f9a-996e-25dabd77ebe7]
124124
125125
## Add comments and view the history of an alert
126126

defender-endpoint/mde-sap-windows-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Defender for Endpoint is a component of [Microsoft Defender XDR](/defender-xdr/)
4141

4242
Before you begin to plan or deploy Defender for Endpoint on Windows Server with SAP, take a moment to get an overview of Defender for Endpoint. The following video provides an overview:
4343

44-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4wDob]
44+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=88c39a8e-5b13-418e-9093-f8d6100ca728]
4545
4646
For more detailed information about Defender for Endpoint and Microsoft security offerings, see the following resources:
4747

defender-endpoint/microsoft-cloud-app-security-integration.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Microsoft Defender for Cloud Apps is a comprehensive solution that gives visibil
4040

4141
Defender for Cloud Apps discovery relies on cloud traffic logs being forwarded to it from enterprise firewall and proxy servers. Microsoft Defender for Endpoint integrates with Defender for Cloud Apps by collecting and forwarding all cloud app networking activities, providing unparalleled visibility to cloud app usage. The monitoring functionality is built into the device, providing complete coverage of network activity.
4242

43-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4r4yQ]
43+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=0bba87dc-5047-492b-add5-c942faa050d4]
4444
4545
The integration provides the following major improvements to the existing Defender for Cloud Apps discovery:
4646

@@ -56,4 +56,3 @@ For more information about cloud discovery, see [Working with discovered apps](/
5656

5757
- [Configure Microsoft Defender for Cloud Apps integration](microsoft-cloud-app-security-config.md)
5858
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
59-

defender-endpoint/microsoft-defender-endpoint.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Microsoft Defender for Endpoint is an enterprise endpoint security platform desi
4444

4545
Watch the following video to learn more about Defender for Endpoint:
4646

47-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4wDob]
47+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=88c39a8e-5b13-418e-9093-f8d6100ca728]
4848
4949
Defender for Endpoint uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
5050

@@ -76,7 +76,7 @@ Defender for Endpoint uses the following combination of technology built into Wi
7676

7777
<p></p>
7878

79-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4vnC4?rel=0]
79+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=95c63786-0382-413d-8a75-eb373e825fa6]
8080
8181
> [!TIP]
8282
> - Learn about the latest enhancements in Defender for Endpoint: [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md).

defender-endpoint/mtd.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Deployment of Microsoft Defender for Endpoint on mobile can be done via Microsof
5454

5555
<br/>
5656

57-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMpiC]
57+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=c944a31c-0017-4707-a1bc-afff9e2f2e00]
5858
5959
### Deploy
6060

@@ -115,7 +115,7 @@ iOS Dedicated/shared/kiosk device enrollment isn't supported.
115115

116116
<br/>
117117

118-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMwR1]
118+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=eac95cd5-17b0-47ca-8819-41d7d5247af9]
119119
120120
### Simplify Onboarding
121121

defender-endpoint/network-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ There might be up to two hours of latency (usually less) between the time when t
7272

7373
Watch this video to learn how network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
7474

75-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4r4yZ]
75+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2d0270f9-f216-4e9e-85c7-5e2b183c6d73]
7676
7777
## Requirements for network protection
7878

@@ -466,4 +466,4 @@ Network protection includes performance optimization that allows `block` mode to
466466
- [Network protection for Linux](network-protection-linux.md) | To learn about using Microsoft Network protection for Linux devices.
467467
- [Network protection for macOS](network-protection-macos.md) | To learn more about Microsoft Network protection for macOS
468468

469-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
469+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)