Skip to content

Commit 98af2d6

Browse files
author
Christopher McClister
committed
LinkFix: memdocs-pr (2022-08)
1 parent b3138f2 commit 98af2d6

2 files changed

Lines changed: 6 additions & 6 deletions

File tree

memdocs/intune/protect/security-baseline-settings-defender-atp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -497,7 +497,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your
497497

498498
- **Outbound connections required**
499499
Baseline default: *Yes*
500-
[Learn more](https://aka.ms/intune-firewall-outboundaction)
500+
[Learn more](/windows/client-management/mdm/firewall-csp#defaultoutboundaction)
501501

502502
- **Inbound notifications blocked**
503503
Baseline default: *Yes*
@@ -549,7 +549,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your
549549

550550
- **Outbound connections required**
551551
Baseline default: *Yes*
552-
[Learn more](https://aka.ms/intune-firewall-outboundaction)
552+
[Learn more](/windows/client-management/mdm/firewall-csp#defaultoutboundaction)
553553

554554
- **Authorized application rules from group policy not merged**
555555
Baseline default: Yes**

windows-365/enterprise/security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,12 +45,12 @@ Take a look at the sections below to better understand the components and featur
4545

4646
The first consideration for securing your environment is to secure access to the Cloud PC.
4747

48-
As described in [identity and authentication](/windows-365/enterprise/identity-authentication#authentication), there are two authentication challenges to access the Cloud PC:
48+
As described in [identity and authentication](./identity-authentication.md#authentication), there are two authentication challenges to access the Cloud PC:
4949

5050
- The Windows 365 service.
5151
- The Cloud PC.
5252

53-
The primary control for securing access is by using Azure Active Directory (Azure AD) Conditional Access to conditionally grant access to the Windows 365 service. To secure access to the Cloud PC, see [set conditional access policies](/windows-365/enterprise/set-conditional-access-policies).
53+
The primary control for securing access is by using Azure Active Directory (Azure AD) Conditional Access to conditionally grant access to the Windows 365 service. To secure access to the Cloud PC, see [set conditional access policies](./set-conditional-access-policies.md).
5454

5555
## Secure Cloud PC devices
5656

@@ -85,10 +85,10 @@ The third consideration for securing your environment is to secure the Cloud PC
8585

8686
### Security of Cloud PC data
8787

88-
The data of the Cloud PC data itself is secured through encryption. For more details, see [data encryption in Windows 365](/windows-365/enterprise/encryption).
88+
The data of the Cloud PC data itself is secured through encryption. For more details, see [data encryption in Windows 365](./encryption.md).
8989

9090
### Security of data available on the Cloud PC
9191

9292
Securing the data available to users on their Cloud PCs should be no different than securing the data available to users on work-assigned Windows PCs, with the caveat that the Cloud PC is being accessed through Remote Desktop Protocol (RDP).
9393

94-
To manage RDP features available to the user during their Cloud PC connection, see [manage RDP device redirections for Cloud PCs](/windows-365/enterprise/manage-rdp-device-redirections).
94+
To manage RDP features available to the user during their Cloud PC connection, see [manage RDP device redirections for Cloud PCs](./manage-rdp-device-redirections.md).

0 commit comments

Comments
 (0)