|
6 | 6 | - name: Get started |
7 | 7 | items: |
8 | 8 | - name: Microsoft 365 Zero Trust deployment plan |
9 | | - href: /security/zero-trust/microsoft-365-zero-trust?bc=/microsoft-365/security/breadcrumb/toc.json&toc=microsoft-365/security/toc.json |
| 9 | + href: /security/zero-trust/microsoft-365-zero-trust?toc=%2Fmicrosoft-365%2Fsecurity%2Ftoc.json&bc=%2Fmicrosoft-365%2Fbreadcrumb%2Ftoc.json |
10 | 10 | - name: Top tasks to support working from home |
11 | 11 | href: top-security-tasks-for-remote-work.md |
12 | 12 | - name: Zero Trust identity and device access configurations |
13 | 13 | items: |
14 | 14 | - name: Overview |
15 | | - href: ./office-365-security/zero-trust-identity-device-access-policies-overview.md |
| 15 | + href: /security/zero-trust/zero-trust-identity-device-access-policies-overview?toc=%2Fmicrosoft-365%2Fsecurity%2Ftoc.json&bc=%2Fmicrosoft-365%2Fbreadcrumb%2Ftoc.json |
16 | 16 | - name: Prerequisite work |
17 | | - href: ./office-365-security/zero-trust-identity-device-access-policies-prereq.md |
| 17 | + href: /security/zero-trust/zero-trust-identity-device-access-policies-prerequisite?toc=%2Fmicrosoft-365%2Fsecurity%2Ftoc.json&bc=%2Fmicrosoft-365%2Fbreadcrumb%2Ftoc.json |
18 | 18 | - name: Common identity and device access policies |
19 | | - href: ./office-365-security/zero-trust-identity-device-access-policies-common.md |
| 19 | + href: /security/zero-trust/zero-trust-identity-device-access-policies-common?toc=%2Fmicrosoft-365%2Fsecurity%2Ftoc.json&bc=%2Fmicrosoft-365%2Fbreadcrumb%2Ftoc.json |
20 | 20 | - name: Policies for guest and external users |
21 | | - href: ./office-365-security/zero-trust-identity-device-access-policies-guest-access.md |
22 | | - - name: Recommended Teams access policies |
23 | | - href: ./office-365-security/zero-trust-identity-device-access-policies-teams.md |
24 | | - - name: Recommended Exchange access policies |
25 | | - href: ./office-365-security/zero-trust-identity-device-access-policies-exchange.md |
26 | | - - name: Recommended SharePoint access policies |
27 | | - href: ./office-365-security/zero-trust-identity-device-access-policies-sharepoint.md |
28 | | - - name: Recommended Defender for Cloud Apps policies for SaaS apps |
29 | | - href: ./office-365-security/zero-trust-identity-device-access-policies-mcas-saas.md |
30 | | - - name: Continuous access evaluation |
31 | | - href: ./office-365-security/zero-trust-continuous-access-evaluation-microsoft-365.md |
| 21 | + href: /security/zero-trust/zero-trust-identity-device-access-policies-guest-access?toc=%2Fmicrosoft-365%2Fsecurity%2Ftoc.json&bc=%2Fmicrosoft-365%2Fbreadcrumb%2Ftoc.json |
| 22 | + - name: Recommended policies and settings for Microsoft 365 workloads |
| 23 | + href: /security/zero-trust/zero-trust-identity-device-access-policies-workloads?toc=%2Fmicrosoft-365%2Fsecurity%2Ftoc.json&bc=%2Fmicrosoft-365%2Fbreadcrumb%2Ftoc.json |
32 | 24 | - name: Strengthen your security posture with Microsoft Defender XDR |
33 | 25 | items: |
34 | 26 | - name: Overview |
|
0 commit comments