diff --git a/windows/security/operating-system-security/virus-and-threat-protection/toc.yml b/windows/security/operating-system-security/virus-and-threat-protection/toc.yml index 36969190cd..9f7c2d6f2f 100644 --- a/windows/security/operating-system-security/virus-and-threat-protection/toc.yml +++ b/windows/security/operating-system-security/virus-and-threat-protection/toc.yml @@ -1,18 +1,18 @@ items: - name: Microsoft Defender Antivirus πŸ”— - href: /microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows.md + href: /microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows - name: Configuring LSA Protection href: /windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection?toc=/windows/security/toc.json&bc=/windows/security/breadcrumb/toc.json - name: Attack surface reduction (ASR) πŸ”— - href: /microsoft-365/security/defender-endpoint/attack-surface-reduction.md + href: /microsoft-365/security/defender-endpoint/attack-surface-reduction - name: Tamper protection for MDE πŸ”— - href: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md + href: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection - name: Microsoft Vulnerable Driver Blocklist πŸ”— href: ../../threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md - name: Controlled folder access πŸ”— - href: /microsoft-365/security/defender-endpoint/controlled-folders.md + href: /microsoft-365/security/defender-endpoint/controlled-folders - name: Exploit protection πŸ”— - href: /microsoft-365/security/defender-endpoint/exploit-protection.md + href: /microsoft-365/security/defender-endpoint/exploit-protection - name: Microsoft Defender SmartScreen items: - name: Overview @@ -22,4 +22,4 @@ items: - name: Enhanced Phishing Protection href: microsoft-defender-smartscreen/enhanced-phishing-protection.md - name: Microsoft Defender for Endpoint πŸ”— - href: /microsoft-365/security/defender-endpoint.md + href: /microsoft-365/security/defender-endpoint diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index 5c41c76d73..29afee340a 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -84,7 +84,7 @@ Windows Defender SmartScreen notifies users if they click on reported phishing a For WindowsΒ 10, Microsoft improved SmartScreen (now called Windows Defender SmartScreen) protection capability by integrating its app reputation abilities into the operating system itself, which allows Windows Defender SmartScreen to check the reputation of files downloaded from the Internet and warn users when they're about to run a high-risk downloaded file. The first time a user runs an app that originates from the Internet, Windows Defender SmartScreen checks the reputation of the application by using digital signatures and other factors against a service that Microsoft maintains. If the app lacks a reputation or is known to be malicious, Windows Defender SmartScreen warns the user or blocks execution entirely, depending on how the administrator has configured Microsoft Intune or Group Policy settings. -For more information, see [Microsoft Defender SmartScreen overview](). +For more information, see [Microsoft Defender SmartScreen overview](/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/). ### Microsoft Defender Antivirus