Skip to content

Commit caf84a6

Browse files
committed
Update links to replacement article and appropriate heading
1 parent 85222e1 commit caf84a6

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

defender-for-cloud-apps/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Integrating Defender for Cloud Apps with Microsoft Defender for Endpoint gives y
4545
**For more information**:
4646

4747
* [Cloud discovery policies](cloud-discovery-policies.md)
48-
* [Cloud discovery anomaly detection policy](cloud-discovery-anomaly-detection-policy.md)
48+
* [Cloud discovery anomaly detection policy](cloud-discovery-policies.md#cloud-discovery-anomaly-detection)
4949
* [Get instantaneous behavioral analytics and anomaly detection](anomaly-detection-policy.md)
5050

5151
---

defender-for-cloud-apps/tutorial-suspicious-activity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,9 +116,9 @@ Once you're familiar with the policies, you should consider how you want to fine
116116

117117
## Phase 3: Tune cloud discovery anomaly detection policies
118118

119-
Like the anomaly detection policies, there are several built-in [cloud discovery anomaly detection policies](cloud-discovery-anomaly-detection-policy.md) that you can fine-tune. For example, the Data exfiltration to unsanctioned apps policy alerts you when data is being exfiltrated to an unsanctioned app and comes preconfigured with settings based on Microsoft experience in the security field.
119+
Like the anomaly detection policies, there are several built-in [cloud discovery anomaly detection policies](cloud-discovery-policies.md#cloud-discovery-anomaly-detection) that you can fine-tune. For example, the Data exfiltration to unsanctioned apps policy alerts you when data is being exfiltrated to an unsanctioned app and comes preconfigured with settings based on Microsoft experience in the security field.
120120

121-
However, you can fine-tune the built-in policies or create your own policies to aid you in identifying other scenarios that you may be interested in investigating. Since these policies are based on cloud discovery logs, they have different [tuning capabilities](cloud-discovery-anomaly-detection-policy.md#legacy-create-anomaly-detection-policy) more focused on anomalous app behavior and data exfiltration.
121+
However, you can fine-tune the built-in policies or create your own policies to aid you in identifying other scenarios that you may be interested in investigating. Since these policies are based on cloud discovery logs, they have different [tuning capabilities](cloud-discovery-policies.md#cloud-discovery-anomaly-detection) more focused on anomalous app behavior and data exfiltration.
122122

123123
1. **Tune usage monitoring**
124124
Set the usage filters to control the baseline, scope, and activity period for detecting anomalous behavior. For example, you may want to receive alerts for anomalous activities relating to executive-level employees.

0 commit comments

Comments
 (0)