|
1852 | 1852 | }, |
1853 | 1853 | { |
1854 | 1854 | "source_path":"microsoft-365/security/defender/m365d-whats-new.md", |
1855 | | - "redirect_url":"/microsoft-365/security/defender/whats-new?view=o365-worldwide", |
| 1855 | + "redirect_url":"/microsoft-365/security/defender/whats-new", |
1856 | 1856 | "redirect_document_id":false |
1857 | 1857 | }, |
1858 | 1858 | { |
1859 | 1859 | "source_path":"microsoft-365/security/defender-endpoint/old-index.md", |
1860 | | - "redirect_url":"/microsoft-365/security/defender-endpoint/?view=o365-worldwide", |
| 1860 | + "redirect_url":"/microsoft-365/security/defender-endpoint/", |
1861 | 1861 | "redirect_document_id":false |
1862 | 1862 | }, |
1863 | 1863 | { |
|
2685 | 2685 | "redirect_url":"/microsoft-365/security/defender-endpoint/device-discovery", |
2686 | 2686 | "redirect_document_id":true |
2687 | 2687 | }, |
| 2688 | + { |
| 2689 | + "source_path":"microsoft-365/security/intelligence/understanding-malware.md", |
| 2690 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2691 | + "redirect_document_id":false |
| 2692 | + }, |
| 2693 | + { |
| 2694 | + "source_path":"microsoft-365/security/intelligence/coinminer-malware.md", |
| 2695 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2696 | + "redirect_document_id":false |
| 2697 | + }, |
| 2698 | + { |
| 2699 | + "source_path":"microsoft-365/security/intelligence/exploits-malware.md", |
| 2700 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2701 | + "redirect_document_id":false |
| 2702 | + }, |
| 2703 | + { |
| 2704 | + "source_path":"microsoft-365/security/intelligence/macro-malware.md", |
| 2705 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2706 | + "redirect_document_id":false |
| 2707 | + }, |
| 2708 | + { |
| 2709 | + "source_path":"microsoft-365/security/intelligence/rootkits-malware.md", |
| 2710 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2711 | + "redirect_document_id":false |
| 2712 | + }, |
| 2713 | + { |
| 2714 | + "source_path":"microsoft-365/security/intelligence/trojans-malware.md", |
| 2715 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2716 | + "redirect_document_id":false |
| 2717 | + }, |
| 2718 | + { |
| 2719 | + "source_path":"microsoft-365/security/intelligence/worms-malware.md", |
| 2720 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2721 | + "redirect_document_id":false |
| 2722 | + }, |
| 2723 | + { |
| 2724 | + "source_path":"microsoft-365/security/intelligence/fileless-threats.md", |
| 2725 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2726 | + "redirect_document_id":false |
| 2727 | + }, |
| 2728 | + { |
| 2729 | + "source_path":"microsoft-365/security/intelligence/phishing.md", |
| 2730 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2731 | + "redirect_document_id":false |
| 2732 | + }, |
| 2733 | + { |
| 2734 | + "source_path":"microsoft-365/security/intelligence/phishing-trends.md", |
| 2735 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2736 | + "redirect_document_id": false |
| 2737 | + }, |
| 2738 | + { |
| 2739 | + "source_path":"microsoft-365/security/intelligence/supply-chain-malware.md", |
| 2740 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2741 | + "redirect_document_id": false |
| 2742 | + }, |
| 2743 | + { |
| 2744 | + "source_path":"microsoft-365/security/intelligence/prevent-malware-infection.md", |
| 2745 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2746 | + "redirect_document_id": false |
| 2747 | + }, |
| 2748 | + { |
| 2749 | + "source_path":"microsoft-365/security/intelligence/unwanted-software.md", |
| 2750 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2751 | + "redirect_document_id": false |
| 2752 | + }, |
| 2753 | + { |
| 2754 | + "source_path":"microsoft-365/security/intelligence/support-scams.md", |
| 2755 | + "redirect_url":"/microsoft-365/security/defender/", |
| 2756 | + "redirect_document_id": false |
| 2757 | + }, |
2688 | 2758 | { |
2689 | 2759 | "source_path": "microsoft-365/security/defender/first-incident-prepare.md", |
2690 | 2760 | "redirect_url": "/microsoft-365/security/defender/respond-first-incident-365-defender", |
|
2709 | 2779 | "source_path": "microsoft-365/security/defender/first-incident-post.md", |
2710 | 2780 | "redirect_url": "/microsoft-365/security/defender/respond-first-incident-remediate", |
2711 | 2781 | "redirect_document_id": false |
2712 | | - } |
| 2782 | + }, |
| 2783 | + { |
| 2784 | + "source_path":"microsoft-365/security/office-365-security/azure-ip-protection-features.md", |
| 2785 | + "redirect_url":"/azure/information-protection/what-is-information-protection", |
| 2786 | + "redirect_document_id":true |
| 2787 | + } |
2713 | 2788 | ] |
2714 | 2789 | } |
0 commit comments