Skip to content

Commit ccf987a

Browse files
committed
fix broken links
1 parent 8784972 commit ccf987a

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

learn-pr/wwl-sci/design-solutions-secure-organization-data/includes/4-design-data-security-azure-workloads.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Advanced Threat Protection is analyzing your logs to detect unusual behavior and
7474

7575
### Transport Layer Security (Encryption-in-transit)
7676

77-
SQL Database, SQL Managed Instance, and Azure Synapse Analytics secure customer data by encrypting data in motion with [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server).
77+
SQL Database, SQL Managed Instance, and Azure Synapse Analytics secure customer data by encrypting data in motion with [Transport Layer Security (TLS)](/windows-server/security/tls/transport-layer-security-protocol).
7878

7979
SQL Database, SQL Managed Instance, and Azure Synapse Analytics enforce encryption (SSL/TLS) at all times for all connections. This ensures all data is encrypted "in transit" between the client and server irrespective of the setting of **Encrypt** or **TrustServerCertificate** in the connection string.
8080

learn-pr/wwl-sci/design-solutions-secure-organization-data/includes/6-design-security-defender-sql-storage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Microsoft Defender offers workload protections for multiple Azure workloads, suc
66

77
## Defender for Storage
88

9-
**Microsoft Defender for Storage** is an Azure-native layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit your storage accounts. It uses advanced threat detection capabilities and [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
9+
**Microsoft Defender for Storage** is an Azure-native layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit your storage accounts. It uses advanced threat detection capabilities and [Microsoft Threat Intelligence](https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-threat-intelligence) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
1010

1111
You can [enable Microsoft Defender for Storage](/azure/storage/common/azure-defender-storage-configure) at either the subscription level (recommended) or the resource level.
1212

@@ -80,7 +80,7 @@ You can review and manage your current security alerts from Microsoft Defender f
8080

8181
### Limitations of hash reputation analysis
8282

83-
- **Hash reputation isn't deep file inspection** - Microsoft Defender for Storage uses hash reputation analysis supported by [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) to determine whether an uploaded file is suspicious. The threat protection tools don’t scan the uploaded files; rather they analyze the telemetry generated from the Blobs Storage and Files services. Defender for Storage then compares the hashes of newly uploaded files with hashes of known viruses, trojans, spyware, and ransomware.
83+
- **Hash reputation isn't deep file inspection** - Microsoft Defender for Storage uses hash reputation analysis supported by [Microsoft Threat Intelligence](https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-threat-intelligence) to determine whether an uploaded file is suspicious. The threat protection tools don’t scan the uploaded files; rather they analyze the telemetry generated from the Blobs Storage and Files services. Defender for Storage then compares the hashes of newly uploaded files with hashes of known viruses, trojans, spyware, and ransomware.
8484

8585
- **Hash reputation analysis isn't supported for all files protocols and operation types** - Some, but not all, of the telemetry logs contain the hash value of the related blob or file. In some cases, the telemetry doesn't contain a hash value. As a result, some operations can't be monitored for known malware uploads. Examples of such unsupported use cases include SMB file-shares and when a blob is created using [Put Block](/rest/api/storageservices/put-block) and [Put Block List](/rest/api/storageservices/put-block-list).
8686

@@ -128,7 +128,7 @@ Defender for Cloud detects anomalous activities indicating unusual and potential
128128

129129
Microsoft Defender for Azure Cosmos DB detects potential SQL injections, known bad actors based on Microsoft Threat Intelligence, suspicious access patterns, and potential exploitation of your database through compromised identities, or malicious insiders.
130130

131-
Defender for Azure Cosmos DB uses advanced threat detection capabilities, and [Microsoft Threat Intelligence](https://www.microsoft.com/insidetrack/microsoft-uses-threat-intelligence-to-protect-detect-and-respond-to-threats) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
131+
Defender for Azure Cosmos DB uses advanced threat detection capabilities, and [Microsoft Threat Intelligence](https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-threat-intelligence) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
132132

133133
You can [enable protection for all your databases](/azure/defender-for-cloud/quickstart-enable-database-protections) (recommended), or [enable Microsoft Defender for Azure Cosmos DB](/azure/defender-for-cloud/quickstart-enable-database-protections) at either the subscription level, or the resource level.
134134

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/6-design-cloud-workload-protection-microsoft-defender-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Defender for Cloud monitors for many threats to your App Service resources. The
7979

8080
- **Pre-attack threats** - Defender for Cloud can detect the execution of multiple types of vulnerability scanners that attackers frequently use to probe applications for weaknesses.
8181

82-
- **Initial access threats** - [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) powers these alerts that include triggering an alert when a known malicious IP address connects to your Azure App Service FTP interface.
82+
- **Initial access threats** - [Microsoft Threat Intelligence](https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-threat-intelligence) powers these alerts that include triggering an alert when a known malicious IP address connects to your Azure App Service FTP interface.
8383

8484
- **Execution threats** - Defender for Cloud can detect attempts to run high privilege commands, Linux commands on a Windows App Service, fileless attack behavior, digital currency mining tools, and many other suspicious and malicious code execution activities.
8585

0 commit comments

Comments
 (0)