Skip to content

Commit ea7030e

Browse files
committed
status
1 parent 99056d5 commit ea7030e

10 files changed

+11
-12
lines changed

defender-endpoint/api/apis-intro.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Defender for Endpoint exposes much of its data and actions through a set of prog
3939

4040
Watch this video for a quick overview of Defender for Endpoint's APIs.
4141

42-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4d73M]
42+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=f6300637-b48e-49d7-aa76-2778a711ae6c]
4343
4444
In general, you'll need to take the following steps to use the APIs:
4545

defender-endpoint/api/management-apis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Defender for Endpoint offers a layered API model exposing data and capabilities
6565

6666
Watch this video for a quick overview of Defender for Endpoint's APIs.
6767

68-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4d73M]
68+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=f6300637-b48e-49d7-aa76-2778a711ae6c]
6969
7070
The **Investigation API** exposes the richness of Defender for Endpoint - exposing calculated or 'profiled' entities (for example, device, user, and file) and discrete events (for example, process creation and file creation) which typically describes a behavior related to an entity, enabling access to data via investigation interfaces allowing a query-based access to data. For more information, see [Supported APIs](exposed-apis-list.md).
7171

defender-endpoint/api/raw-data-export.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ ms.date: 12/18/2020
3939

4040
Microsoft Defender for Endpoint supports streaming events available through [Advanced Hunting](/defender-xdr/advanced-hunting-overview) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/storage/common/storage-account-overview).
4141

42-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4r4ga]
42+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=56edfb3f-b612-4e4c-acb9-4bbd141bd535]
4343
4444
## In this section
4545

defender-endpoint/automated-investigations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ search.appverid: met150
3232

3333
Want to see how it works? Watch the following video:
3434

35-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bOeh]
35+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=f7299926-ec86-40f6-9188-372304ab80f9]
3636
3737
The technology in automated investigation uses various inspection algorithms and is based on processes that are used by security analysts. AIR capabilities are designed to examine alerts and take immediate action to resolve breaches. AIR capabilities significantly reduce alert volume, allowing security operations to focus on more sophisticated threats and other high-value initiatives. All remediation actions, whether pending or completed, are tracked in the [Action center](auto-investigation-action-center.md). In the Action center, pending actions are approved (or rejected), and completed actions can be undone if needed.
3838

defender-endpoint/conditional-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ ms.date: 12/18/2020
2929
3030
Conditional Access is a capability that helps you better protect your users and enterprise information by making sure that only secure devices have access to applications.
3131

32-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4byD1]
32+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=d5655a77-d21f-4da4-b00c-3260d0bf13d6]
3333
3434
With Conditional Access, you can control access to enterprise information based on the risk level of a device. This helps keep trusted users on trusted devices using trusted applications.
3535

defender-endpoint/configure-machines-onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Before you can track and manage onboarding of devices:
3535
- [Ensure you have the necessary permissions](configure-machines.md#obtain-required-permissions)
3636

3737
Watch this video to learn how to easily onboard clients with Microsoft Defender for Endpoint.
38-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqr?rel=0]
38+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2524ee5d-6a5f-482c-8f69-dc3792577c60]
3939
4040
## Discover and track unprotected devices
4141

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ The Microsoft Defender portal ([https://security.microsoft.com](https://security
101101

102102
This section outlines the general steps you to onboard devices (endpoints).
103103

104-
1. [Watch this video](https://www.microsoft.com/videoplayer/embed/RE4bGqr) for a quick overview of the onboarding process and learn about the available tools and methods.
104+
1. [Watch this video](https://learn-video.azurefd.net/vod/player?id=2524ee5d-6a5f-482c-8f69-dc3792577c60) for a quick overview of the onboarding process and learn about the available tools and methods.
105105

106106
2. Review your [device onboarding tool options](onboarding.md) and select the most appropriate option for your environment.
107107

defender-endpoint/device-discovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Unknown and unmanaged devices introduce significant risks to your network - whet
4444
- Reduce the attack surface by identifying and assessing vulnerabilities, and detecting configuration gaps.
4545

4646
Watch this video for a quick overview of how to assess and onboard unmanaged devices that Defender for Endpoint discovered.
47-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4RwQz]
47+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=a101261e-87ab-4aa6-a1e1-c1463e797ca2]
4848
4949
With this capability, a security recommendation to onboard devices to Defender for Endpoint is available as part of the existing Microsoft Defender Vulnerability Management experience.
5050

defender-endpoint/edr-in-block-mode.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ EDR in block mode is integrated with [threat & vulnerability management](/defend
5858
> To get the best protection, make sure to **[deploy Microsoft Defender for Endpoint baselines](configure-machines-security-baseline.md)**.
5959
6060
Watch this video to learn why and how to turn on endpoint detection and response (EDR) in block mode, enable behavioral blocking, and containment at every stage from pre-breach to post-breach.
61-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4HjW2]
61+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=69b80126-fa43-4f52-b89d-e4ebc3aba0a4]
6262
6363
## What happens when something is detected?
6464

@@ -115,4 +115,3 @@ The following table lists requirements for EDR in block mode:
115115
- [Endpoint detection and response (EDR) in block mode frequently asked questions (FAQ)](edr-block-mode-faqs.yml)
116116

117117
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
118-

defender-endpoint/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ landingContent:
4141
- linkListType: video
4242
links:
4343
- text: Overview video
44-
url: https://www.microsoft.com/videoplayer/embed/RE4vnC4?rel=0
44+
url: https://learn-video.azurefd.net/vod/player?id=95c63786-0382-413d-8a75-eb373e825fa6
4545

4646

4747
# Card
@@ -68,7 +68,7 @@ landingContent:
6868
- linkListType: video
6969
links:
7070
- text: Onboarding video
71-
url: https://www.microsoft.com/videoplayer/embed/RE4bGqr
71+
url: https://learn-video.azurefd.net/vod/player?id=2524ee5d-6a5f-482c-8f69-dc3792577c60
7272

7373
# Card
7474
- title: Security operations

0 commit comments

Comments
 (0)