From d415e63a64784f9efc0d53ffde9e1df56388df53 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 16 Aug 2018 16:13:12 -0700 Subject: [PATCH] fixed links --- windows/security/threat-protection/index.md | 2 +- .../evaluate-exploit-protection.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 564367028b..8d1bd617ae 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -62,7 +62,7 @@ To further reinforce the security perimeter of your network, Windows Defender AT Endpoint protection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. - [Alerts](/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md) -- [Historical endpoint data](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline.md) +- [Historical endpoint data](/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline) - [Realtime and historical threat hunting](/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md) - [API and SIEM integration](/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md) - [Response orchestration](/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md index 1e2d43213c..d4d3705b4a 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md @@ -120,6 +120,6 @@ For further details on how audit mode works, and when you might want to use it, - [Configure and audit exploit protection mitigations](customize-exploit-protection.md) - [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md) - [Enable network protection](enable-network-protection.md) -- [Enable controlled folder access](enable-controlled-folder-access.md) +- [Enable controlled folder access](enable-controlled-folders-exploit-guard.md) - [Enable attack surface reduction](enable-attack-surface-reduction.md)