Skip to content

Commit 7fe8efb

Browse files
authored
Merge pull request #26909 from MicrosoftDocs/chrisda
Link fixes per build report
2 parents 4445941 + 49006fd commit 7fe8efb

24 files changed

Lines changed: 98 additions & 96 deletions

microsoft-365/business-premium/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
- name: Trial user guide - Microsoft 365 Business Premium
1212
href: m365bp-trial-playbook-microsoft-business-premium.md
1313
- name: Resources for partners
14-
href: ../security/defender-business/mdb-partners.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
14+
href: /defender-business/mdb-partners?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
1515
- name: Step 1- Sign in and set up
1616
items:
1717
- name: Microsoft 365 Business Premium
@@ -89,23 +89,23 @@
8989
- name: Overview
9090
href: m365bp-security-incident-management.md
9191
- name: Review security recommendations
92-
href: ../security/defender-business/mdb-view-tvm-dashboard.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
92+
href: /defender-business/mdb-view-tvm-dashboard?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
9393
- name: Review threats detected on devices
9494
href: m365bp-review-threats-take-action.md
9595
- name: Review remediation actions on devices
9696
href: m365bp-review-remediation-actions-devices.md
9797
- name: Respond to a compromised email account
9898
href: /defender-office-365/responding-to-a-compromised-email-account?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
9999
- name: Streaming API (preview)
100-
href: ../security/defender-business/mdb-streaming-api.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
100+
href: /defender-business/mdb-streaming-api?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
101101
- name: Maintain your environment
102102
href: m365bp-mdb-maintain-environment.md
103103
- name: Reference
104104
items:
105105
- name: Microsoft 365 Business Premium FAQ
106106
href: microsoft-365-business-faqs.yml
107107
- name: Microsoft Defender for Business
108-
href: ../security/defender-business/index.yml
108+
href: /defender-business/index.yml
109109
- name: Microsoft Defender for Office 365
110110
href: /defender-office-365/defender-for-office-365
111111
- name: Microsoft 365 admin content

microsoft-365/business-premium/m365-campaigns-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Make sure that you meet the following requirements before you begin your setup p
8585
|Permissions|To complete the initial setup process, you must have an appropriate role assigned. [Learn more about admin roles](../admin/add-users/about-admin-roles.md).|
8686
|Browser requirements|Microsoft Edge, Safari, Chrome or Firefox. [Learn more about browser requirements](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources#coreui-heading-uyetipy).|
8787
|Operating systems (client)|**Windows**: Windows 10 or 11 Pro <br/> **macOS**: One of the three most recent versions of macOS|
88-
|Operating systems (servers)|Windows Server or Linux Server <br/> (Requires an additional license, such as [Microsoft Defender for Business servers](../security/defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).)|
88+
|Operating systems (servers)|Windows Server or Linux Server <br/> (Requires an additional license, such as [Microsoft Defender for Business servers](/defender-business/get-defender-business#how-to-get-microsoft-defender-for-business-servers).)|
8989

9090
> [!TIP]
9191
> For more detailed information about Microsoft 365, Office, and system requirements, see [Microsoft 365 and Office Resources](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources).

microsoft-365/business-premium/m365bp-device-groups-mdb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ You can create a new device group while you are in the process of creating or ed
5959

6060
8. On the **Device groups** step, review the list of device groups for the policy. If needed, remove a group from the list. Then choose **Next**.
6161

62-
9. On the **Configuration settings** page, review and edit settings as needed, and then choose **Next**. For more information about these settings, see [Understand next-generation configuration settings in Microsoft Defender for Business](../security/defender-business/mdb-next-gen-configuration-settings.md).
62+
9. On the **Configuration settings** page, review and edit settings as needed, and then choose **Next**. For more information about these settings, see [Understand next-generation configuration settings in Microsoft Defender for Business](/defender-business/mdb-next-generation-protection).
6363

6464
10. On the **Review your policy** step, review all the settings, make any needed edits, and then choose **Create policy** or **Update policy**.
6565

microsoft-365/business-premium/m365bp-device-states.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ description: "View device health with Defender for Business in Microsoft 365 Bus
2323

2424
# View device status in Microsoft Defender for Business
2525

26-
Microsoft Defender for Business is included with Microsoft 365 Business Premium, as of March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
26+
Microsoft Defender for Business is included with Microsoft 365 Business Premium, as of March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](/defender-business/mdb-overview).
2727

2828
You can view and monitor device health state by using Defender for Business capabilities.
2929

@@ -40,5 +40,5 @@ You can view and monitor device health state by using Defender for Business capa
4040
## See also
4141

4242
- [View and edit device protection policies](m365bp-view-edit-create-mdb-policies.md)
43-
- [What is Microsoft Defender for Business?](../security/defender-business/mdb-overview.md)
43+
- [What is Microsoft Defender for Business?](/defender-business/mdb-overview)
4444
- [Best practices for securing Microsoft 365 for business plans](secure-your-business-data.md)

microsoft-365/business-premium/m365bp-intune-admin-roles-in-the-mac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,4 +108,4 @@ Before the partner can assign these roles to users, you must add the partner as
108108

109109
## See also
110110

111-
[Resources for Microsoft partners working with small and medium-sized businesses](../security/defender-business/mdb-partners.md)
111+
[Resources for Microsoft partners working with small and medium-sized businesses](/defender-business/mdb-partners)

microsoft-365/business-premium/m365bp-managed-unmanaged-devices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To protect managed devices, your organization's IT or security team can:
3333

3434
- **Use Windows Autopilot to get a user's Windows device ready for first use**. With Autopilot you can install business critical apps, apply policies, and enable features like BitLocker before the device is given to a user. You can also use Autopilot to reset, repurpose, and recover Windows devices. To learn more, see [Windows Autopilot](/mem/autopilot/windows-autopilot).
3535
- **Upgrade Windows devices from previous versions of Windows to Windows 10 Pro or Windows 11 Pro**. Before onboarding, Windows client devices should be running Windows 10 Pro or Enterprise, or Windows 11 Pro or Enterprise. If your organization has Windows devices running Windows 7 Pro, Windows 8 Pro, or Windows 8.1 Pro, your Microsoft 365 Business Premium subscription entitles you to upgrade those devices at no additional cost. To learn more, see [Upgrade Windows devices to Windows 10 or 11 Pro](m365bp-upgrade-windows-pro.md).
36-
- **Onboard devices and protect them with [mobile threat defense](../security/defender-business/mdb-mtd.md) capabilities**. Microsoft Defender for Business is included with Microsoft 365 Business Premium. It includes advanced protection from ransomware, malware, phishing, and other threats. If you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) instead, you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).
36+
- **Onboard devices and protect them with [mobile threat defense](/defender-business/mdb-mtd) capabilities**. Microsoft Defender for Business is included with Microsoft 365 Business Premium. It includes advanced protection from ransomware, malware, phishing, and other threats. If you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) instead, you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).
3737
- **View and monitor device health in the Microsoft Defender portal** (<https://security.microsoft.com>). You can view details, such as health state and exposure level for all onboarded devices. You can also take actions, such as running an antivirus scan or starting an automated investigation on a device that has detected threats or vulnerabilities. To learn more, see [Monitor onboarded devices](m365bp-device-states.md) and [Review detected threats](m365bp-review-threats-take-action.md).
3838

3939
For their part in protecting managed devices, users can:
@@ -48,8 +48,8 @@ To learn more about protecting managed devices, see [Set up and secure managed d
4848

4949
To protect unmanaged devices, such as BYOD devices, your organization's IT or security team can:
5050

51-
- **Encourage users to keep their antivirus protection turned on and up to date**. Devices should have the latest technology and features needed to protect against new malware and attack techniques. Microsoft regularly releases security intelligence updates and product updates. To learn more, see [Microsoft Defender Antivirus security intelligence and product updates](../security/defender-endpoint/microsoft-defender-antivirus-updates.md).
52-
- **Consider onboarding unmanaged devices and protecting them with [mobile threat defense](../security/defender-business/mdb-mtd.md) capabilities**. Or, if you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).
51+
- **Encourage users to keep their antivirus protection turned on and up to date**. Devices should have the latest technology and features needed to protect against new malware and attack techniques. Microsoft regularly releases security intelligence updates and product updates. To learn more, see [Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates).
52+
- **Consider onboarding unmanaged devices and protecting them with [mobile threat defense](/defender-business/mdb-mtd) capabilities**. Or, if you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).
5353
- **View and monitor device health in the Microsoft Defender portal** (<https://security.microsoft.com>). After devices are onboarded to Defender for Business (or Intune), you can view details, such as health state and exposure level for onboarded devices. You can also take actions, such as running an antivirus scan or starting an automated investigation on a device that has detected threats or vulnerabilities. To learn more, see [Monitor onboarded devices](m365bp-device-states.md) and [Review detected threats](m365bp-review-threats-take-action.md).
5454

5555
For their part in protecting unmanaged devices, users can:

0 commit comments

Comments
 (0)