Skip to content

Commit bb74ddf

Browse files
authored
Merge pull request #172 from MicrosoftDocs/chrisda
Link fixes per build report
2 parents 6172673 + e2f82f6 commit bb74ddf

29 files changed

+84
-89
lines changed

defender-business/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@
102102
- name: Troubleshooting
103103
href: mdb-troubleshooting.yml
104104
- name: API reference information
105-
href: /defender-endpoint/api/exposed-apis-create-app-partners.md?bc=%2Fmicrosoft-365%2Fsecurity%2Fdefender-business%2Fbreadcrumb%2Ftoc.json&toc=%2Fmicrosoft-365%2Fsecurity%2Fdefender-business%2Ftoc.json
105+
href: /defender-endpoint/api/exposed-apis-create-app-partners?bc=%2Fmicrosoft-365%2Fsecurity%2Fdefender-business%2Fbreadcrumb%2Ftoc.json&toc=%2Fmicrosoft-365%2Fsecurity%2Fdefender-business%2Ftoc.json
106106
- name: Microsoft 365 Business Premium
107107
href: /microsoft-365/business-premium/
108108
- name: Microsoft 365 Lighthouse

defender-endpoint/troubleshoot-microsoft-defender-antivirus-when-migrating.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ sections:
141141
> [!WARNING]
142142
> Solutions suggesting that you edit the Windows Defender start values for `wdboot`, `wdfilter`, `wdnisdrv`, `wdnissvc`, and `windefend` in `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services` are unsupported, and might force you to reimage your system.
143143
144-
Passive mode is available if you start using Microsoft Defender for Endpoint and a non-Microsoft antivirus together with Microsoft Defender Antivirus. Passive mode allows Microsoft Defender Antivirus to scan files and update itself, but it doesn't remediate threats in passive mode. In addition, behavior monitoring via [Real Time Protection](configure-real-time-protection-microsoft-defender-antivirus.md) isn't available in passive mode, unless [Endpoint data loss prevention (DLP)](/defender-endpoint/information-protection-in-windows-overview) is deployed.
144+
Passive mode is available if you start using Microsoft Defender for Endpoint and a non-Microsoft antivirus together with Microsoft Defender Antivirus. Passive mode allows Microsoft Defender Antivirus to scan files and update itself, but it doesn't remediate threats in passive mode. In addition, behavior monitoring via [Real Time Protection](configure-real-time-protection-microsoft-defender-antivirus.md) isn't available in passive mode, unless [Endpoint data loss prevention (DLP)](/purview/endpoint-dlp-getting-started) is deployed.
145145
146146
Another feature, known as [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md), is available to end-users when Microsoft Defender Antivirus is set to turn off automatically. This feature allows Microsoft Defender Antivirus to scan files periodically alongside a non-Microsoft antivirus, using a limited number of detections.
147147

defender-office-365/pim-in-mdo-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ The name of the user (Alex in this scenario) appears under Eligible assignments
5454
> [!NOTE]
5555
> For a quick review of Privileged Identity Management see [this video](https://www.youtube.com/watch?v=VQMAg0sa_lE).
5656
57-
:::image type="content" source="/defender/media/pim-mdo-role-setting-details-for-security-reader-show-8-hr-duration.png" alt-text="The Role setting details - Security Reader page" lightbox="/defender/media/pim-mdo-role-setting-details-for-security-reader-show-8-hr-duration.png":::
57+
:::image type="content" source="/defender/media/pim-mdo-role-setting-details-for-security-reader-show-8-hr-duration.PNG" alt-text="The Role setting details - Security Reader page" lightbox="/defender/media/pim-mdo-role-setting-details-for-security-reader-show-8-hr-duration.PNG":::
5858

5959
***Step 2***. Create the required second (elevated) permission group for other tasks and assign eligibility.
6060

defender-vulnerability-management/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@
113113
- name: Authenticated scan methods and properties
114114
href: /defender-endpoint/get-authenticated-scan-properties
115115
- name: Get all scan definitions
116-
href: /defender-endpoint/get-all-scan-definitions
116+
href: /defender-endpoint/api/get-all-scan-definitions
117117
- name: Add, delete or update a scan definition
118118
href: /defender-endpoint/api/add-a-new-scan-definition
119119
- name: Get all scan agents

defender-vulnerability-management/windows-authenticated-scan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ To configure a new authenticated scan:
192192

193193
You can use APIs to create a new scan and view all existing configured scans in your organization. For more information, see:
194194

195-
- [Get all scan definitions](/defender-endpoint/get-all-scan-definitions)
195+
- [Get all scan definitions](/defender-endpoint/api/get-all-scan-definitions)
196196
- [Add, delete or update a scan definition](/defender-endpoint/api/add-a-new-scan-definition)
197197
- [Get all scan agents](/defender-endpoint/api/get-all-scan-agents)
198198
- [Get scan agent by Id](/defender-endpoint/api/Get-agent-details)

defender-xdr/advanced-hunting-security-copilot.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ ms.date: 04/01/2024
2929

3030
## Copilot for Security in advanced hunting
3131

32-
[Microsoft Copilot for Security in Microsoft Defender](security-copilot-in-microsoft-365-defender.md) comes with a query assistant capability in advanced hunting.
32+
[Microsoft Copilot for Security in Microsoft Defender](security-copilot-in-microsoft-365-defender.md) comes with a query assistant capability in advanced hunting.
3333

3434
Threat hunters or security analysts who are not yet familiar with or have yet to learn KQL can make a request or ask a question in natural language (for instance, *Get all alerts involving user admin123*). Copilot for Security then generates a KQL query that corresponds to the request using the advanced hunting data schema.
3535

@@ -45,48 +45,50 @@ Users with access to Copilot for Security have access to this capability in adva
4545
1. Open the **advanced hunting** page from the navigation bar in Microsoft Defender XDR. The Copilot for Security side pane for advanced hunting appears at the right hand side.
4646

4747
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-pane.png" alt-text="Screenshot of the Copilot pane in advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-pane-big.png":::
48-
48+
4949
You can also reopen Copilot by selecting **Copilot** at the top of the query editor.
50-
1. In the Copilot prompt bar, ask any threat hunting query that you want to run and press ![Send icon](/defender/media/Send.png) or **Enter** .
50+
1. In the Copilot prompt bar, ask any threat hunting query that you want to run and press :::image type="icon" source="media/Send.png" border="false"::: or **Enter** .
51+
52+
5153

5254
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-query.png" alt-text="Screenshot that shows prompt bar in the Copilot for Security for advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-query-big.png":::
53-
55+
5456
1. Copilot generates a KQL query from your text instruction or question. While Copilot is generating, you can cancel the query generation by selecting **Stop generating**.
5557

56-
![Screenshot of Copilot for Security in advanced hunting generating a response.](/defender/media/advanced-hunting-security-copilot-generate.png)
58+
![Screenshot of Copilot for Security in advanced hunting generating a response.](/defender/media/advanced-hunting-security-copilot-generate.png)
59+
5760

58-
59-
1. Review the generated query. You can then choose to run the query by selecting **Add and run**.
61+
1. Review the generated query. You can then choose to run the query by selecting **Add and run**.
6062

61-
![Screenshot of Copilot button showing Add the query to query editor and run.](/defender/media/advanced-hunting-security-copilot-run-query.png)
63+
![Screenshot of Copilot button showing Add the query to query editor and run.](/defender/media/advanced-hunting-security-copilot-run-query.png)
6264

63-
The generated query then appears as the last query in the query editor and runs automatically.
65+
The generated query then appears as the last query in the query editor and runs automatically.
6466

65-
If you need to make further tweaks, select **Add to editor**.
67+
If you need to make further tweaks, select **Add to editor**.
6668

6769
![Screenshot of Copilot for Security in advanced hunting showing the Add to editor option.](/defender/media/advanced-hunting-security-copilot-add-editor.png)
6870

6971
The generated query appears in the query editor as the last query, where you can edit it before running using the regular **Run query** above the query editor.
7072

71-
73+
7274
1. You can provide feedback about the generated response by selecting the feedback icon ![Screenshot of feedback icon](/defender/media/advanced-hunting-security-copilot-feedback-icon.png) and choosing **Confirm**, **Off-target**, or **Potentially harmful**.
7375

7476

7577
> [!TIP]
76-
> Providing feedback is an important way to let the Copilot for Security team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could have made the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
78+
> Providing feedback is an important way to let the Copilot for Security team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could have made the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
7779
7880
## Query sessions
7981

80-
You can start your first session anytime by asking a question in the Copilot side pane in advanced hunting. Your session contains the requests you made using your user account. Closing the side pane or refreshing the advanced hunting page does not discard the session. You can still access the generated queries should you need them.
82+
You can start your first session anytime by asking a question in the Copilot side pane in advanced hunting. Your session contains the requests you made using your user account. Closing the side pane or refreshing the advanced hunting page does not discard the session. You can still access the generated queries should you need them.
8183

82-
Select the chat bubble icon (**New chat**) to discard the current session.
84+
Select the chat bubble icon (**New chat**) to discard the current session.
8385

84-
![Screenshot of Copilot for Security in advanced hunting showing the new chat icon.](/defender/media/advanced-hunting-security-copilot-clear-session.png)
86+
![Screenshot of Copilot for Security in advanced hunting showing the new chat icon.](/defender/media/advanced-hunting-security-copilot-clear-session.png)
8587

8688
## Modify settings
8789

88-
Select the ellipses in the Copilot side pane to choose whether or not to automatically add and run the generated query in advanced hunting.
90+
Select the ellipses in the Copilot side pane to choose whether or not to automatically add and run the generated query in advanced hunting.
8991

90-
![Screenshot of Copilot for Security in advanced hunting showing the settings ellipses icon.](/defender/media/advanced-hunting-security-copilot-settings.png)
92+
![Screenshot of Copilot for Security in advanced hunting showing the settings ellipses icon.](/defender/media/advanced-hunting-security-copilot-settings.png)
9193

92-
Deselecting the **Run generated query automatically** setting gives you the option of running the generated query automatically (**Add and run**) or adding the generated query to the query editor for further modification (**Add to editor**).
94+
Deselecting the **Run generated query automatically** setting gives you the option of running the generated query automatically (**Add and run**) or adding the generated query to the query editor for further modification (**Add to editor**).

defender-xdr/api-supported.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ All APIs along the `/api` path use the [OData](/odata/overview) Protocol; for ex
6060

6161
- [Microsoft Defender XDR APIs overview](api-overview.md)
6262
- [Access the Microsoft Defender XDR APIs](api-access.md)
63-
- [Streaming API](/defender-endpoint/raw-data-export)
63+
- [Streaming API](/defender-endpoint/api/raw-data-export)
6464
- [Learn about API limits and licensing](/legal/microsoft-365/api-terms)
6565
- [Understand error codes](api-error-codes.md)
6666
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/before-you-begin-defender-experts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,9 +71,9 @@ The following sections enumerate additional information about the service's data
7171

7272
### Data collection, usage, and retention
7373

74-
All data used for hunting from existing Defender services will continue to reside in the customer's original Microsoft Defender XDR service storage location. [Learn more](/enterprise/o365-data-locations)
74+
All data used for hunting from existing Defender services will continue to reside in the customer's original Microsoft Defender XDR service storage location. [Learn more](/microsoft-365/enterprise/o365-data-locations)
7575

76-
Defender Experts for Hunting operational data, such as case tickets and analyst notes, are generated and stored in a Microsoft data center in the US region for the length of the service, irrespective of the Microsoft Defender XDR service storage location. Data generated for the reporting dashboard is stored in customer's Microsoft Defender XDR service storage location. Reporting data and operational data will be retained for a grace period of no more than 90 days after a customer's subscription expires. If the customer terminates their subscription, data will be deleted within 30 days.
76+
Defender Experts for Hunting operational data, such as case tickets and analyst notes, are generated and stored in a Microsoft data center in the US region for the length of the service, irrespective of the Microsoft Defender XDR service storage location. Data generated for the reporting dashboard is stored in customer's Microsoft Defender XDR service storage location. Reporting data and operational data will be retained for a grace period of no more than 90 days after a customer's subscription expires. If the customer terminates their subscription, data will be deleted within 30 days.
7777

7878
Microsoft experts hunt over [advanced hunting logs](advanced-hunting-schema-tables.md) in Microsoft Defender XDR advanced hunting tables. The data in these tables depend on the set of Defender services the customer is enabled for (for example, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Entra ID). Experts also use a large set of internal threat intelligence data to inform their hunting and automation.
7979

defender-xdr/configure-email-notifications.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,8 @@ This section lists various issues that you may encounter when using email notifi
9696

9797
## Related topics
9898

99-
- [Update data retention settings](/defender-endpoint/data-retention-settings)
99+
- [Update data retention settings](/defender-endpoint/preferences-setup)
100100
- [Configure advanced features](/defender-endpoint/advanced-features)
101101
- [Configure vulnerability email notifications](/defender-endpoint/configure-vulnerability-email-notifications)
102102
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
103+

defender-xdr/configure-siem-defender.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,9 +99,9 @@ For more information on the Elastic connector, see: [Microsoft M365 Defender | E
9999

100100
## Ingesting streaming event data via Event Hubs
101101

102-
First you need to stream events from your Microsoft Entra tenant to your Event Hubs or Azure Storage Account. For more information, see [Streaming API](/defender/streaming-api).
102+
First you need to stream events from your Microsoft Entra tenant to your Event Hubs or Azure Storage Account. For more information, see [Streaming API](streaming-api.md).
103103

104-
For more information on the event types supported by the Streaming API, see [Supported streaming event types](/defender/supported-event-types).
104+
For more information on the event types supported by the Streaming API, see [Supported streaming event types](supported-event-types.md).
105105

106106
### Splunk
107107

0 commit comments

Comments
 (0)