diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index f6b41f4ac4..bad013d3ab 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -13948,6 +13948,6 @@ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators", "redirect_document_id": true -}, +} ] } diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 4c4b362d5c..a87f1e4e4e 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -78,7 +78,7 @@ To further reinforce the security perimeter of your network, Windows Defender AT Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. - [Alerts](windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md) -- [Historical endpoint data](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline) +- [Historical endpoint data](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#timeline) - [Response orchestration](windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md) - [Forensic collection](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package-from-machines) - [Threat intelligence](windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md)