Skip to content

Commit f5a27c8

Browse files
authored
Merge pull request #2753 from ElazarK/fix-links-that-redirect
WI570505 fix links to non redirected links
2 parents 99b8f09 + 50b4a59 commit f5a27c8

19 files changed

Lines changed: 46 additions & 46 deletions

articles/defender-for-cloud/asset-inventory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Cloud asset inventory
33
description: Learn about the cloud asset inventory in Microsoft Defender for Cloud and Security Exposure Management
4-
ms.date: 12/03/2025
4+
ms.date: 04/19/2026
55
ms.topic: how-to
66
ms.author: dlanger
77
author: dlanger
@@ -181,7 +181,7 @@ securityresources
181181
- [Manage and respond to security alerts](manage-respond-alerts.md)
182182
- [Continuous export](continuous-export.md) - Export security data to SIEM, SOAR, or other tools
183183
- [Create custom security dashboards with Azure Workbooks](custom-dashboards-azure-workbooks.md)
184-
- [Enable Defender for Cloud plans](enable-enhanced-security.md)
184+
- [Enable Defender for Cloud plans](connect-azure-subscription.md)
185185
- [Connect AWS accounts](quickstart-onboard-aws.md)
186186
- [Connect GCP projects](quickstart-onboard-gcp.md)
187187

articles/defender-for-cloud/concept-agentless-data-collection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Elazark
55
ms.author: elkrieger
66
ms.service: defender-for-cloud
77
ms.topic: concept-article
8-
ms.date: 02/19/2025
8+
ms.date: 04/19/2026
99
ms.custom: template-concept
1010
#customer intent: As a user, I want to understand how agentless machine scanning works in Defender for Cloud so that I can effectively collect data from my machines.
1111
---
@@ -138,4 +138,4 @@ In addition, permissions to an existing GCP KMS role are granted to support scan
138138

139139
## Next steps
140140

141-
[Enable agentless machine scanning](enable-vulnerability-assessment-agentless.md).
141+
[Enable agentless machine scanning](enable-agentless-scanning-vms.md).

articles/defender-for-cloud/concept-attack-path.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Investigate risks with security explorer/attack paths in Microsoft Defender for Cloud
33
description: Learn about investigating risks with security explorer/attack paths in Microsoft Defender for Cloud.
44
ms.topic: concept-article
5-
ms.date: 09/10/2025
5+
ms.date: 04/19/2026
66
#customer intent: As a security analyst, I want to understand attack paths so that I can mitigate risks effectively.
77
---
88

@@ -59,5 +59,5 @@ Learn how to use the [cloud security explorer](how-to-manage-cloud-security-expl
5959
## Next steps
6060

6161
- [Identify and remediate attack paths](how-to-manage-attack-path.md)
62-
- [Enabling agentless scanning for machines](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines)
62+
- [Enable agentless scanning for machines](enable-agentless-scanning-vms.md#enable-agentless-scanning-on-azure)
6363
- [Build a query with the cloud security explorer](how-to-manage-cloud-security-explorer.md)

articles/defender-for-cloud/defender-for-app-service-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for App Service - the benefits and features
33
description: Learn about the capabilities of Microsoft Defender for App Service and how to enable it on your subscription.
4-
ms.date: 05/13/2025
4+
ms.date: 04/19/2026
55
ms.topic: overview
66
ms.author: elkrieger
77
author: Elazark
@@ -80,7 +80,7 @@ For a full list of the App Service alerts, see the [Reference table of alerts](a
8080
In this article, you learned about Microsoft Defender for App Service.
8181

8282
> [!div class="nextstepaction"]
83-
> [Enable enhanced protections](enable-enhanced-security.md)
83+
> [Enable enhanced protections](connect-azure-subscription.md)
8484
8585
For related material, see the following articles:
8686

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Microsoft Defender for Cloud Overview
33
description: Secure your Azure, hybrid, and multicloud resources with Microsoft Defender for Cloud. This cloud-native application protection platform (CNAPP) includes two key capabilities, cloud security posture management (CSPM) and cloud workload protection platform (CWPP). It helps protect your environments across Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises systems.
44
ms.topic: overview
5-
ms.date: 01/01/2026
5+
ms.date: 04/19/2026
66
ms.author: elkrieger
77
author: Elazark
88
#customer intent: As a security professional, I want to understand Microsoft Defender for Cloud so that I can protect my cloud resources.
@@ -79,8 +79,8 @@ Defender for Cloud includes free Foundational CSPM capabilities. Enable advanced
7979
| [Centralized policy management](security-policy-concept.md) | Define the security conditions that you want to maintain across your environment. The policy translates to recommendations that identify resource configurations that violate your security policy. The [Microsoft cloud security benchmark](concept-regulatory-compliance.md) is a built-in standard that applies security principles with detailed technical implementation guidance for Azure and other cloud providers (such as Amazon Web Services (AWS) and Google Cloud Platform (GCP). | [Customize a security policy](create-custom-recommendations.md) | Foundational CSPM (Free) |
8080
| [Secure score](secure-score-security-controls.md) | Summarize your security posture based on the security recommendations. As you remediate recommendations, your secure score improves. | [Track your secure score](secure-score-access-and-track.md) | Foundational CSPM (Free) |
8181
| [Multicloud coverage](plan-multicloud-security-get-started.md) | Connect to your multicloud environments by using agentless methods for CSPM insight and CWPP protection. | Connect your [Amazon AWS](quickstart-onboard-aws.md) and [Google GCP](quickstart-onboard-gcp.md) cloud resources to Defender for Cloud | Foundational CSPM (Free) |
82-
| [Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) | Use the dashboard to see weaknesses in your security posture. | [Enable CSPM tools](enable-enhanced-security.md) | Foundational CSPM (Free) |
83-
| [Advanced Cloud Security Posture Management](concept-cloud-security-posture-management.md) | Get advanced tools to identify weaknesses in your security posture, including:</br>- Governance to drive actions to improve your security posture</br>- Regulatory compliance to verify compliance with security standards</br>- Cloud security explorer to build a comprehensive view of your environment | [Enable CSPM tools](enable-enhanced-security.md) | Defender CSPM |
82+
| [Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) | Use the dashboard to see weaknesses in your security posture. | [Enable CSPM tools](connect-azure-subscription.md) | Foundational CSPM (Free) |
83+
| [Advanced Cloud Security Posture Management](concept-cloud-security-posture-management.md) | Get advanced tools to identify weaknesses in your security posture, including:</br>- Governance to drive actions to improve your security posture</br>- Regulatory compliance to verify compliance with security standards</br>- Cloud security explorer to build a comprehensive view of your environment | [Enable CSPM tools](connect-azure-subscription.md) | Defender CSPM |
8484
| [Data Security Posture Management](concept-data-security-posture.md) | Data security posture management automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. | [Enable data security posture management](data-security-posture-enable.md) | Defender CSPM or Defender for Storage |
8585
| [Attack path analysis](concept-attack-path.md#what-is-an-attack-path) | Model traffic on your network to identify potential risks before you implement changes to your environment. | [Build queries to analyze paths](how-to-manage-attack-path.md) | Defender CSPM |
8686
| [Cloud Security Explorer](concept-attack-path.md#what-is-cloud-security-explorer) | A map of your cloud environment that lets you build queries to find security risks. | [Build queries to find security risks](how-to-manage-cloud-security-explorer.md) | Defender CSPM |
@@ -139,4 +139,4 @@ For more information about Defender for Cloud and how it works, see:
139139
## Next steps
140140

141141
> [!div class="nextstepaction"]
142-
> [Enable Microsoft Defender plans](enable-enhanced-security.md)
142+
> [Enable Microsoft Defender plans](connect-azure-subscription.md)

articles/defender-for-cloud/defender-for-resource-manager-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Resource Manager - Benefits and Features
33
description: Learn about the benefits and features of Microsoft Defender for Resource Manager to protect your Azure resources from potential threats.
4-
ms.date: 08/20/2025
4+
ms.date: 04/19/2026
55
ms.topic: overview
66
#customer intent: As a security operations team, I want to learn about the benefits and features of Microsoft Defender for Resource Manager so that I can protect the resource management layer of my Azure resources.
77
---
@@ -38,7 +38,7 @@ A full list of the alerts provided by Microsoft Defender for Resource Manager is
3838
In this article, you learned about Microsoft Defender for Resource Manager.
3939

4040
> [!div class="nextstepaction"]
41-
> [Enable enhanced protections](enable-enhanced-security.md)
41+
> [Enable enhanced protections](connect-azure-subscription.md)
4242
4343
For related material, see the following article:
4444

articles/defender-for-cloud/defender-for-storage-classic-migrate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Migrate from Defender for Storage (classic)
33
description: Learn about how to migrate from Defender for Storage (classic) to the new Defender for Storage plan to take advantage of its enhanced capabilities and pricing.
4-
ms.date: 05/13/2025
4+
ms.date: 04/19/2026
55
author: Elazark
66
ms.author: elkrieger
77
ms.topic: how-to
@@ -112,4 +112,4 @@ Get-AzPolicyAssignment -Scope "/subscriptions/{subscriptionId}"
112112
In this article, you learned about migrating to the new Microsoft Defender for Storage plan.
113113

114114
> [!div class="nextstepaction"]
115-
> [Enable Defender for Storage](enable-enhanced-security.md)
115+
> [Enable Defender for Storage](connect-azure-subscription.md)

articles/defender-for-cloud/enable-defender-for-storage-data-sensitivity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Enable sensitive data threat detection
33
description: Learn how to enable and configure sensitive data threat detection in Microsoft Defender for Storage to protect your data and enhance security.
4-
ms.date: 07/01/2025
4+
ms.date: 04/19/2026
55
author: Elazark
66
ms.author: elkrieger
77
ms.topic: how-to
@@ -41,4 +41,4 @@ You can also create and publish sensitivity labels for your tenant in Microsoft
4141
In this article, you learned about Microsoft Defender for Storage's sensitive data scanning.
4242

4343
> [!div class="nextstepaction"]
44-
> [Enable Defender for Storage](enable-enhanced-security.md)
44+
> [Enable Defender for Storage](connect-azure-subscription.md)

articles/defender-for-cloud/how-to-enable-agentless-containers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: How-to enable agentless container posture
33
description: Learn how to onboard agentless containers
44
ms.service: defender-for-cloud
55
ms.topic: how-to
6-
ms.date: 03/02/2026
6+
ms.date: 04/19/2026
77
---
88

99
# Onboard agentless container posture in Defender CSPM
@@ -14,7 +14,7 @@ Agentless container posture is available for Azure, AWS, and GCP environments.
1414

1515
## Prerequisites
1616

17-
- [Defender CSPM plan is enabled for your environment](enable-enhanced-security.md).
17+
- [Defender CSPM plan is enabled for your environment](connect-azure-subscription.md).
1818

1919
## How to onboard agentless container posture in Defender CSPM
2020

@@ -105,7 +105,7 @@ Agentless container posture is available for Azure, AWS, and GCP environments.
105105

106106
## Related content
107107

108-
- [Enable Defender CSPM](enable-enhanced-security.md)
108+
- [Enable Defender CSPM](connect-azure-subscription.md)
109109

110110
- [Agentless container posture capabilities](concept-agentless-containers.md)
111111

articles/defender-for-cloud/how-to-manage-attack-path.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ author: Elazark
44
ms.author: elkrieger
55
description: Learn how to identify and remediate attack paths in Microsoft Defender for Cloud and enhance the security of your environment.
66
ms.topic: how-to
7-
ms.date: 05/18/2025
7+
ms.date: 04/19/2026
88
ms.custom: sfi-image-nochange
99
zone_pivot_groups: defender-portal-experience
1010
#customer intent: As a security analyst, I want to learn how to identify and remediate attack paths in Microsoft Defender for Cloud so that I can enhance the security of my environment.
@@ -32,7 +32,7 @@ By default attack paths are organized by risk level. The risk level is determine
3232

3333
## Prerequisites
3434

35-
- You must [enable Defender Cloud Security Posture Management (CSPM)](enable-enhanced-security.md) and have [agentless scanning](enable-vulnerability-assessment-agentless.md) enabled.
35+
- You must [enable Defender Cloud Security Posture Management (CSPM)](connect-azure-subscription.md) and have [agentless scanning](enable-agentless-scanning-vms.md) enabled.
3636

3737
- **Required roles and permissions**: Security Reader, Security Admin, Reader, Contributor, or Owner.
3838

0 commit comments

Comments
 (0)