Skip to content

Commit 555e158

Browse files
committed
Fix remaining broken Entra documentation links
- Fix concept-fundamentals-security-defaults -> security-defaults (both files) - Fix overview-reports -> howto-access-activity-logs
1 parent ede3bd1 commit 555e158

2 files changed

Lines changed: 3 additions & 3 deletions

File tree

articles/security/fundamentals/identity-management-best-practices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ Following are options and benefits for enabling multifactor authentication:
166166
* Require MFA challenge via Microsoft Authenticator for all users
167167
* Restrict legacy authentication protocols.
168168

169-
This method is available to all licensing tiers but is not able to be mixed with existing Conditional Access policies. You can find more information in [Microsoft Entra Security Defaults](/entra/fundamentals/concept-fundamentals-security-defaults)
169+
This method is available to all licensing tiers but is not able to be mixed with existing Conditional Access policies. You can find more information in [Microsoft Entra Security Defaults](/entra/fundamentals/security-defaults)
170170

171171
**Option 2**: [Enable multifactor authentication by changing user state](/entra/identity/authentication/howto-mfa-userstates).
172172
**Benefit**: This is the traditional method for requiring two-step verification. It works with both [Microsoft Entra multifactor authentication in the cloud and Azure Multi-Factor Authentication Server](/entra/identity/authentication/concept-mfa-howitworks). Using this method requires users to perform two-step verification every time they sign in and overrides Conditional Access policies.
@@ -334,7 +334,7 @@ An active identity monitoring system can quickly detect suspicious behavior and
334334
- Sign-ins from [infected devices](/entra/identity/monitoring-health/howto-access-activity-logs).
335335
- Suspicious IP addresses.
336336

337-
**Detail**: Use Microsoft Entra ID P1 or P2 [anomaly reports](/entra/identity/monitoring-health/overview-reports). Have processes and procedures in place for IT admins to run these reports on a daily basis or on demand (usually in an incident response scenario).
337+
**Detail**: Use Microsoft Entra ID P1 or P2 [anomaly reports](/entra/identity/monitoring-health/howto-access-activity-logs). Have processes and procedures in place for IT admins to run these reports on a daily basis or on demand (usually in an incident response scenario).
338338

339339
**Best practice**: Have an active monitoring system that notifies you of risks and can adjust risk level (high, medium, or low) to your business requirements.
340340
**Detail**: Use [Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection), which flags the current risks on its own dashboard and sends daily summary notifications via email. To help protect your organization's identities, you can configure risk-based policies that automatically respond to detected issues when a specified risk level is reached.

articles/security/fundamentals/operational-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Following are options and benefits for enabling two-step verification:
4040
* Require MFA challenge via Microsoft Authenticator for all users
4141
* Restrict legacy authentication protocols.
4242

43-
This method is available to all licensing tiers but is not able to be mixed with existing Conditional Access policies. You can find more information in [Microsoft Entra Security Defaults](/entra/fundamentals/concept-fundamentals-security-defaults)
43+
This method is available to all licensing tiers but is not able to be mixed with existing Conditional Access policies. You can find more information in [Microsoft Entra Security Defaults](/entra/fundamentals/security-defaults)
4444

4545
**Option 2**: [Enable multifactor authentication by changing user state](/entra/identity/authentication/howto-mfa-userstates).
4646
**Benefit**: This is the traditional method for requiring two-step verification. It works with both [Microsoft Entra multifactor authentication in the cloud and Azure Multi-Factor Authentication Server](/entra/identity/authentication/concept-mfa-howitworks). Using this method requires users to perform two-step verification every time they sign in and overrides Conditional Access policies.

0 commit comments

Comments
 (0)