Skip to content

Commit e8a8d57

Browse files
committed
Link fixes per build report
1 parent d3bdb1c commit e8a8d57

6 files changed

+7
-7
lines changed

defender-office-365/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@
162162
- name: Bulk complaint level (BCL)
163163
href: anti-spam-bulk-complaint-level-bcl-about.md
164164
- name: Bulk senders insight
165-
href: anti-spam-bulk-senders
165+
href: anti-spam-bulk-senders-insight.md
166166
- name: Backscatter messages cloud organizations
167167
href: anti-spam-backscatter-about.md
168168
- name: Configure junk email settings on Exchange Online mailboxes

defender-office-365/anti-spam-spam-vs-bulk-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Another option that's easy to overlook: if a user complains about receiving bulk
5555

5656
## How to tune bulk email
5757

58-
Admins can follow the [recommended bulk threshold values](recommended-settings-for-eop-and-office365.md#default-email-protections-in-microsoft-365) or choose a bulk threshold value that suits the needs of their organization.
58+
Admins can follow the [recommended bulk threshold values](recommended-settings-for-eop-and-office365.md#anti-spam-policy-settings) or choose a bulk threshold value that suits the needs of their organization.
5959

6060
### Tune bulk email in Microsoft 365
6161

defender-office-365/eop-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The default email protections for cloud mailboxes are on by default via the defa
3434

3535
- [Anti-malware protection](anti-malware-protection-about.md)
3636
- [Anti-spam protection](anti-spam-protection-about.md)
37-
- [Anti-phishing (spoofing) protection](anti-phishing-protection-about.md#default-anti-phishing-protection-in-microsoft-365)
37+
- [Anti-phishing (spoofing) protection](anti-phishing-protection-about.md#anti-phishing-protection-for-all-cloud-mailboxes)
3838

3939
The default threat policies for these features apply to all recipients. You can't turn them off, but you can override them by turning on and configuring [preset security policies](preset-security-policies.md) or creating custom threat policies.
4040

defender-office-365/migrate-to-defender-for-office-365-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Welcome to **Phase 2: Setup** of your **[migration to Microsoft Defender for Off
3838
2. [Configure user reported message settings](#step-2-configure-user-reported-message-settings)
3939
3. [Maintain or create the SCL=-1 mail flow rule](#step-3-maintain-or-create-the-scl-1-mail-flow-rule)
4040
4. [Configure Enhanced Filtering for Connectors](#step-4-configure-enhanced-filtering-for-connectors)
41-
5. [Create pilot threat policies](#step-5-create-pilot-protection-policies)
41+
5. [Create pilot threat policies](#step-5-create-pilot-threat-policies)
4242

4343
## Step 1: Create distribution groups for pilot users
4444

defender-office-365/reports-mdo-email-collaboration-dashboard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Hover over a category in the chart to see the number of **Impacted users** (the
138138

139139
**Notes**:
140140

141-
- The [Built-in protection](preset-security-policies.md#preset-security-policies-in-microsoft-365) preset security policy gives a basic level of Safe Links and Safe Attachments protection to all users by default (and you can [exclude recipients](preset-security-policies.md#use-the-microsoft-defender-portal-to-add-exclusions-to-the-built-in-protection-preset-security-policy)).
141+
- The [Built-in protection](preset-security-policies.md) preset security policy gives a basic level of Safe Links and Safe Attachments protection to all users by default (and you can [exclude recipients](preset-security-policies.md#use-the-microsoft-defender-portal-to-add-exclusions-to-the-built-in-protection-preset-security-policy)).
142142
- Users get a higher level of Safe Links and Safe Attachments protection from either of the following settings:
143143
- [Turn on the Standard or Strict preset security policies](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users), and make sure the users are included in **Defender for Office 365 protection**.
144144
- Create custom [Safe Links policies](safe-links-policies-configure.md#use-the-microsoft-defender-portal-to-create-safe-links-policies) or [Safe Attachment policies](safe-attachments-policies-configure.md#use-the-microsoft-defender-portal-to-create-safe-attachments-policies) with the users as members.

defender-office-365/step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ When your security team has decided on which categories of items that users can
6060
> For more detailed information on what you've learned so far, see:
6161
>
6262
> - [Configure spam filter policies](../anti-spam-policies-configure.md)
63-
> - [Configure anti-phishing policies if you don't have Microsoft Defender for Office 365](anti-phishing-policies-eop-configure.md)
64-
> - [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)
63+
> - [Configure anti-phishing policies if you don't have Microsoft Defender for Office 365](../anti-phishing-policies-eop-configure.md)
64+
> - [Configure anti-phishing policies in Microsoft Defender for Office 365](../anti-phishing-policies-mdo-configure.md)
6565
> - [Set up Safe Attachments policies in Microsoft Defender for Office 365](../safe-attachments-policies-configure.md)
6666
6767
## Next Steps

0 commit comments

Comments
 (0)