@@ -43072,6 +43072,116 @@
43072
43072
"source_path": "learn-pr/language/typescript-work-external-libraries/index.yml",
43073
43073
"redirect_url": "https://www.typescriptlang.org/",
43074
43074
"redirect_document_id": false
43075
+ },
43076
+ {
43077
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/10-defender-for-storage.md",
43078
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/4-defender-storage",
43079
+ "redirect_document_id": false
43080
+ },
43081
+ {
43082
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/11-malware-scanning-in-defender-for-storage.md",
43083
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/5-malware-scanning-defender-storage",
43084
+ "redirect_document_id": false
43085
+ },
43086
+ {
43087
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/12-detect-threats-to-sensitive-data.md",
43088
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/6-detect-threats-sensitive-data",
43089
+ "redirect_document_id": false
43090
+ },
43091
+ {
43092
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/13-deploy-microsoft-defender-for-storage.md",
43093
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/7-enable-microsoft-defender-storage",
43094
+ "redirect_document_id": false
43095
+ },
43096
+ {
43097
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/14-configure-azure-built-in-policy.md",
43098
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/8-configure-azure-built-in-policy",
43099
+ "redirect_document_id": false
43100
+ },
43101
+ {
43102
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/15-microsoft-defender-cloud-devops-security.md",
43103
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/25-microsoft-defender-cloud-devops-security",
43104
+ "redirect_document_id": false
43105
+ },
43106
+ {
43107
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/16-devops-security-support-prerequisites.md",
43108
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/26-devops-security-support-prerequisites",
43109
+ "redirect_document_id": false
43110
+ },
43111
+ {
43112
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/17-devops-environment-security-posture.md",
43113
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/27-devops-environment-security-posture",
43114
+ "redirect_document_id": false
43115
+ },
43116
+ {
43117
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/18-connect-your-git-hub-lab-environment-microsoft-defender-cloud.md",
43118
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/28-connect-your-git-hub-lab-environment-microsoft-defender-cloud",
43119
+ "redirect_document_id": false
43120
+ },
43121
+ {
43122
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/19-configure-microsoft-security-devops-github-action.md",
43123
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/29-configure-microsoft-security-devops-github-action",
43124
+ "redirect_document_id": false
43125
+ },
43126
+ {
43127
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/20-security-alerts-incidents.md",
43128
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/",
43129
+ "redirect_document_id": false
43130
+ },
43131
+ {
43132
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/21-automate-responses-microsoft-defender-cloud-triggers.md",
43133
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/",
43134
+ "redirect_document_id": false
43135
+ },
43136
+ {
43137
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/22-view-remediate-findings-from-vulnerability-assessments.md",
43138
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/",
43139
+ "redirect_document_id": false
43140
+ },
43141
+ {
43142
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/23-knowledge-check.md",
43143
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/30-knowledge-check",
43144
+ "redirect_document_id": false
43145
+ },
43146
+ {
43147
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/24-summary.md",
43148
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/31-summary",
43149
+ "redirect_document_id": false
43150
+ },
43151
+ {
43152
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/3-protect-your-servers-with-defender-servers.md",
43153
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/",
43154
+ "redirect_document_id": false
43155
+ },
43156
+ {
43157
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/4-protect-your-databases-with-defender-databases.md",
43158
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/",
43159
+ "redirect_document_id": false
43160
+ },
43161
+ {
43162
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/5-container-security-microsoft-defender-containers.md",
43163
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/21-container-security-microsoft-defender-containers",
43164
+ "redirect_document_id": false
43165
+ },
43166
+ {
43167
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/6-managed-kubernetes.md",
43168
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/22-managed-kubernetes",
43169
+ "redirect_document_id": false
43170
+ },
43171
+ {
43172
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/7-defender-containers-architecture.md",
43173
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/23-defender-containers-architecture",
43174
+ "redirect_document_id": false
43175
+ },
43176
+ {
43177
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/8-configure-microsoft-defender-containers-components.md",
43178
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/24-configure-microsoft-defender-containers-components",
43179
+ "redirect_document_id": false
43180
+ },
43181
+ {
43182
+ "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/9-vulnerability-assessments.md",
43183
+ "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/",
43184
+ "redirect_document_id": false
43075
43185
}
43076
43186
]
43077
43187
}
0 commit comments