Skip to content

Commit 937a2cf

Browse files
authored
Merge pull request #27007 from MicrosoftDocs/MDO-chrisda
M365 to Defender repo link updates
2 parents 1417377 + d4217f5 commit 937a2cf

5 files changed

Lines changed: 8 additions & 8 deletions

File tree

microsoft-365/business-premium/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@
107107
- name: Microsoft Defender for Business
108108
href: ../security/defender-business/index.yml
109109
- name: Microsoft Defender for Office 365
110-
href: /microsoft-365/security/office-365-security/defender-for-office-365
110+
href: /defender-office-365/defender-for-office-365
111111
- name: Microsoft 365 admin content
112112
href: /microsoft-365/admin/
113113
- name: Microsoft 365 Lighthouse

microsoft-365/business-premium/m365bp-mdb-maintain-environment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Security tasks are typically performed by security administrators and security o
107107

108108
|Task|Description|
109109
|---|---|
110-
|**Manage false positives/negatives**|A false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Office 365 and Microsoft Defender for Business, which are both included in Microsoft 365 Business Premium. Fortunately, steps can be taken to address and reduce these kinds of issues. <br/><br/>For false positives/negatives on devices, see [Address false positives/negatives in Microsoft Defender for Endpoint](../security/defender-endpoint/defender-endpoint-false-positives-negatives.md).<br/><br/>For false positives/negatives in email, see the following articles: <br/>- [How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365)<br/>- [How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365)|
110+
|**Manage false positives/negatives**|A false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Office 365 and Microsoft Defender for Business, which are both included in Microsoft 365 Business Premium. Fortunately, steps can be taken to address and reduce these kinds of issues. <br/><br/>For false positives/negatives on devices, see [Address false positives/negatives in Microsoft Defender for Endpoint](../security/defender-endpoint/defender-endpoint-false-positives-negatives.md).<br/><br/>For false positives/negatives in email, see the following articles: <br/>- [How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365)<br/>- [How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365)|
111111
|**Strengthen your security posture**|Defender for Business includes a vulnerability management dashboard that provides you with exposure score and enables you to view information about exposed devices and see relevant security recommendations. You can use your Defender Vulnerability Management dashboard to reduce exposure and improve your organization's security posture. <br/><br/>See the following articles:<br/>- [Use your vulnerability management dashboard in Microsoft Defender for Business](../security/defender-business/mdb-view-tvm-dashboard.md)<br/>- [Dashboard insights](../security/defender-vulnerability-management/tvm-dashboard-insights.md)|
112112
|**Adjust security policies**|[Reports](../security/defender-business/mdb-reports.md) are available so that you can view information about detected threats, device status, and more. Sometimes it's necessary to adjust your security policies. For example, you might apply strict protection to some user accounts or devices, and standard protection to others. <br/><br/>See the following articles: <br/>- For device protection: [View or edit policies in Microsoft Defender for Business](../security/defender-business/mdb-view-edit-create-policies.md) <br/>- For email protection: [Recommended settings for EOP and Microsoft Defender for Office 365 security](../security/office-365-security/recommended-settings-for-eop-and-office365.md)|
113113
|**Analyze admin submissions**|Sometimes it's necessary to submit entities, such as email messages, URLs, or attachments to Microsoft for further analysis. Reporting items can help reduce the occurrence of false positives/negatives and improve threat detection accuracy. <br/><br/>See the following articles: <br/>- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](../security/office-365-security/submissions-admin.md)<br/>- [Admin review for user reported messages](../security/office-365-security/submissions-admin-review-user-reported-messages.md)|
@@ -120,7 +120,7 @@ Security tasks are typically performed by security administrators and security o
120120

121121
|Task|Description|
122122
|---|---|
123-
|**Manage false positives/negatives**|A false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Office 365 and Microsoft Defender for Business, which are both included in Microsoft 365 Business Premium. Fortunately, steps can be taken to address and reduce these kinds of issues. <br/><br/>For false positives/negatives on devices, see [Address false positives/negatives in Microsoft Defender for Endpoint](../security/defender-endpoint/defender-endpoint-false-positives-negatives.md).<br/><br/>For false positives/negatives in email, see the following articles: <br/>- [How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365)<br/>- [How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365)|
123+
|**Manage false positives/negatives**|A false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Office 365 and Microsoft Defender for Business, which are both included in Microsoft 365 Business Premium. Fortunately, steps can be taken to address and reduce these kinds of issues. <br/><br/>For false positives/negatives on devices, see [Address false positives/negatives in Microsoft Defender for Endpoint](../security/defender-endpoint/defender-endpoint-false-positives-negatives.md).<br/><br/>For false positives/negatives in email, see the following articles: <br/>- [How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365)<br/>- [How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365)|
124124
|**Strengthen your security posture**|Defender for Business includes a vulnerability management dashboard that provides you with exposure score and enables you to view information about exposed devices and see relevant security recommendations. You can use your Defender Vulnerability Management dashboard to reduce exposure and improve your organization's security posture. <br/><br/>See the following articles:<br/>- [Use your vulnerability management dashboard in Microsoft Defender for Business](../security/defender-business/mdb-view-tvm-dashboard.md)<br/>- [Dashboard insights](../security/defender-vulnerability-management/tvm-dashboard-insights.md)|
125125
|**Adjust security policies**|[Reports](../security/defender-business/mdb-reports.md) are available so that you can view information about detected threats, device status, and more. Sometimes it's necessary to adjust your security policies. For example, you might apply strict protection to some user accounts or devices, and standard protection to others. <br/><br/>See the following articles: <br/>- For device protection: [View or edit policies in Microsoft Defender for Business](../security/defender-business/mdb-view-edit-create-policies.md) <br/>- For email protection: [Recommended settings for EOP and Microsoft Defender for Office 365 security](../security/office-365-security/recommended-settings-for-eop-and-office365.md)|
126126
|**Analyze admin submissions**|Sometimes it's necessary to submit entities, such as email messages, URLs, or attachments to Microsoft for further analysis. Reporting items can help reduce the occurrence of false positives/negatives and improve threat detection accuracy. <br/><br/>See the following articles: <br/>- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](../security/office-365-security/submissions-admin.md)<br/>- [Admin review for user reported messages](../security/office-365-security/submissions-admin-review-user-reported-messages.md)|

microsoft-365/business-premium/m365bp-threats-detected-defender-av.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,4 +84,4 @@ To learn more about different threats, visit the <a href="https://www.microsoft.
8484
[How to turn on and use Microsoft Defender Antivirus from the Windows Security app](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus) (article)\
8585
[How to turn on Microsoft Defender Antivirus by using Group Policy](/mem/intune/user-help/turn-on-defender-windows#turn-on-windows-defender) (article)\
8686
[How to update your antivirus definitions](/mem/intune/user-help/turn-on-defender-windows#update-your-antivirus-definitions) (article)\
87-
[How to submit malware and non-malware to Microsoft for analysis](/microsoft-365/security/office-365-security/submissions-submit-files-to-microsoft) (article)
87+
[How to submit malware and non-malware to Microsoft for analysis](/defender-office-365/submissions-submit-files-to-microsoft) (article)

microsoft-365/business-premium/microsoft-365-business-faqs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ metadata:
1212
ms.collection:
1313
- tier2
1414
- m365-security
15-
ms.date: 05/31/2024
15+
ms.date: 11/15/2024
1616
ms.localizationpriority: medium
1717
audience: microsoft-business
1818
keywords: Microsoft 365 Business Premium, Microsoft 365, SMB, FAQ, frequently asked questions, answers, business
@@ -87,7 +87,7 @@ sections:
8787
8888
**Microsoft 365 Business Standard** includes the apps and services that businesses need for remote work and collaboration. It includes Microsoft Teams, secure cloud storage, business email, and premium Office applications across devices.
8989
90-
**Microsoft 365 Business Premium** is a comprehensive cloud productivity and security solution that was designed and built for small and medium-sized businesses (1-300 employees). Microsoft 365 Business Premium includes everything in Microsoft 365 Business Standard, plus [Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-overview) and [Defender for Office 365 Plan 1](/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet). You get more cybersecurity and productivity capabilities, including advanced security protection for your devices, with next-generation protection, endpoint detection and response, and threat & vulnerability management. You also get advanced security protection for email and documents, with Safe Links and Safe Attachments.
90+
**Microsoft 365 Business Premium** is a comprehensive cloud productivity and security solution that was designed and built for small and medium-sized businesses (1-300 employees). Microsoft 365 Business Premium includes everything in Microsoft 365 Business Standard, including [Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-overview) and [Defender for Office 365 Plan 1](/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet). You get more cybersecurity and productivity capabilities, including advanced security protection for your devices, with next-generation protection, endpoint detection and response, and threat & vulnerability management.
9191
9292
**Microsoft 365 Enterprise** is a complete, intelligent solution that empowers everyone to be creative and work together securely. Microsoft 365 for enterprise is designed for large organizations, but it can also be used for medium-sized and small businesses who need the most advanced security and productivity capabilities.
9393

microsoft-365/business-premium/secure-your-business-data.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,11 +62,11 @@ The following table summarizes how to secure your data using Microsoft 365 for b
6262
|- [Advanced threat protection](../security/office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
6363
|**6. Use Microsoft Teams for collaboration and sharing**.|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|
6464
|- [Microsoft Teams](create-teams-for-collaboration.md) for communication, collaboration, and sharing|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|
65-
|- [Safe Links & Safe Attachments](/microsoft-365/security/office-365-security/mdo-support-teams-about) with Microsoft Teams|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
65+
|- [Safe Links & Safe Attachments](/defender-office-365/mdo-support-teams-about) with Microsoft Teams|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
6666
|- [Sensitivity labels for meetings](/purview/sensitivity-labels-meetings) to protect calendar items, Microsoft Teams meetings, and chat|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
6767
|- [Data Loss Prevention](/purview/dlp-teams-default-policy) in Microsoft Teams to safeguard company data|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
6868
|**7. Set sharing settings for SharePoint and OneDrive files and folders**.|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|
69-
|- [Safe Links](/microsoft-365/security/office-365-security/safe-links-about) and [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about) for SharePoint and OneDrive|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
69+
|- [Safe Links](/defender-office-365/safe-links-about) and [Safe Attachments](/defender-office-365/safe-attachments-for-spo-odfb-teams-about) for SharePoint and OneDrive|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
7070
|- [Sensitivity labels](/purview/get-started-with-sensitivity-labels) to mark items as sensitive, confidential. etc.|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
7171
|- [Data Loss Prevention](/purview/dlp-get-started-with-the-default-policy) to safeguard company data|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|||
7272
|**8. Use Microsoft 365 Apps on devices**|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||

0 commit comments

Comments
 (0)