|
21463 | 21463 | "redirect_url": "/training/modules/configure-validate-permissions/8-summary.md",
|
21464 | 21464 | "redirect_document_id": false
|
21465 | 21465 | },
|
21466 |
| - { |
21467 |
| - "source_path_from_root": "/learn-pr/wwl-azure/configure-virtual-machine-availability/11-knowledge-check.md", |
21468 |
| - "redirect_url": "https://learn.microsoft.com/training/modules/configure-virtual-machine-availability/12-knowledge-check" |
21469 |
| - }, |
21470 |
| - { |
21471 |
| - "source_path_from_root": "/learn-pr/wwl-azure/configure-virtual-machine-availability/12-summary-resources.md", |
21472 |
| - "redirect_url": "https://learn.microsoft.com/training/modules/configure-virtual-machine-availability/13-summary-resources" |
21473 |
| - }, |
21474 | 21466 | {
|
21475 | 21467 | "source_path_from_root": "/learn-pr/wwl-azure/configure-virtual-machine-backups/11-knowledge-check.md",
|
21476 | 21468 | "redirect_url": "https://learn.microsoft.com/training/modules/configure-virtual-machine-backups/12-knowledge-check"
|
@@ -43073,14 +43065,114 @@
|
43073 | 43065 | "redirect_url": "https://www.typescriptlang.org/",
|
43074 | 43066 | "redirect_document_id": false
|
43075 | 43067 | },
|
43076 |
| - { |
43077 |
| - "source_path": "learn-pr/wwl-azure/configure-virtual-machine-availability/12-knowledge-check.md", |
43078 |
| - "redirect_url": "/training/modules/configure-virtual-machine-availability/11-knowledge-check", |
| 43068 | + { |
| 43069 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/10-defender-for-storage.md", |
| 43070 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/4-defender-storage", |
| 43071 | + "redirect_document_id": false |
| 43072 | + }, |
| 43073 | + { |
| 43074 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/11-malware-scanning-in-defender-for-storage.md", |
| 43075 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/5-malware-scanning-defender-storage", |
| 43076 | + "redirect_document_id": false |
| 43077 | + }, |
| 43078 | + { |
| 43079 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/12-detect-threats-to-sensitive-data.md", |
| 43080 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/6-detect-threats-sensitive-data", |
| 43081 | + "redirect_document_id": false |
| 43082 | + }, |
| 43083 | + { |
| 43084 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/13-deploy-microsoft-defender-for-storage.md", |
| 43085 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/7-enable-microsoft-defender-storage", |
| 43086 | + "redirect_document_id": false |
| 43087 | + }, |
| 43088 | + { |
| 43089 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/14-configure-azure-built-in-policy.md", |
| 43090 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/8-configure-azure-built-in-policy", |
| 43091 | + "redirect_document_id": false |
| 43092 | + }, |
| 43093 | + { |
| 43094 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/15-microsoft-defender-cloud-devops-security.md", |
| 43095 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/25-microsoft-defender-cloud-devops-security", |
| 43096 | + "redirect_document_id": false |
| 43097 | + }, |
| 43098 | + { |
| 43099 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/16-devops-security-support-prerequisites.md", |
| 43100 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/26-devops-security-support-prerequisites", |
| 43101 | + "redirect_document_id": false |
| 43102 | + }, |
| 43103 | + { |
| 43104 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/17-devops-environment-security-posture.md", |
| 43105 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/27-devops-environment-security-posture", |
| 43106 | + "redirect_document_id": false |
| 43107 | + }, |
| 43108 | + { |
| 43109 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/18-connect-your-git-hub-lab-environment-microsoft-defender-cloud.md", |
| 43110 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/28-connect-your-git-hub-lab-environment-microsoft-defender-cloud", |
| 43111 | + "redirect_document_id": false |
| 43112 | + }, |
| 43113 | + { |
| 43114 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/19-configure-microsoft-security-devops-github-action.md", |
| 43115 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/29-configure-microsoft-security-devops-github-action", |
| 43116 | + "redirect_document_id": false |
| 43117 | + }, |
| 43118 | + { |
| 43119 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/20-security-alerts-incidents.md", |
| 43120 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/", |
| 43121 | + "redirect_document_id": false |
| 43122 | + }, |
| 43123 | + { |
| 43124 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/21-automate-responses-microsoft-defender-cloud-triggers.md", |
| 43125 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/", |
| 43126 | + "redirect_document_id": false |
| 43127 | + }, |
| 43128 | + { |
| 43129 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/22-view-remediate-findings-from-vulnerability-assessments.md", |
| 43130 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/", |
| 43131 | + "redirect_document_id": false |
| 43132 | + }, |
| 43133 | + { |
| 43134 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/23-knowledge-check.md", |
| 43135 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/30-knowledge-check", |
| 43136 | + "redirect_document_id": false |
| 43137 | + }, |
| 43138 | + { |
| 43139 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/24-summary.md", |
| 43140 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/31-summary", |
| 43141 | + "redirect_document_id": false |
| 43142 | + }, |
| 43143 | + { |
| 43144 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/3-protect-your-servers-with-defender-servers.md", |
| 43145 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/", |
| 43146 | + "redirect_document_id": false |
| 43147 | + }, |
| 43148 | + { |
| 43149 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/4-protect-your-databases-with-defender-databases.md", |
| 43150 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/", |
| 43151 | + "redirect_document_id": false |
| 43152 | + }, |
| 43153 | + { |
| 43154 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/5-container-security-microsoft-defender-containers.md", |
| 43155 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/21-container-security-microsoft-defender-containers", |
| 43156 | + "redirect_document_id": false |
| 43157 | + }, |
| 43158 | + { |
| 43159 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/6-managed-kubernetes.md", |
| 43160 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/22-managed-kubernetes", |
| 43161 | + "redirect_document_id": false |
| 43162 | + }, |
| 43163 | + { |
| 43164 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/7-defender-containers-architecture.md", |
| 43165 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/23-defender-containers-architecture", |
43079 | 43166 | "redirect_document_id": false
|
43080 | 43167 | },
|
43081 | 43168 | {
|
43082 |
| - "source_path": "learn-pr/wwl-azure/configure-virtual-machine-availability/13-summary-resources.md", |
43083 |
| - "redirect_url": "/training/modules/configure-virtual-machine-availability/12-summary-resources", |
| 43169 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/8-configure-microsoft-defender-containers-components.md", |
| 43170 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/24-configure-microsoft-defender-containers-components", |
| 43171 | + "redirect_document_id": false |
| 43172 | + }, |
| 43173 | + { |
| 43174 | + "source_path": "learn-pr/wwl-azure/microsoft-defender-cloud-threat-protection/9-vulnerability-assessments.md", |
| 43175 | + "redirect_url": "/training/modules/microsoft-defender-cloud-threat-protection/", |
43084 | 43176 | "redirect_document_id": false
|
43085 | 43177 | }
|
43086 | 43178 | ]
|
|
0 commit comments