From e7611a2a0c6422f8e27619d21b7ea50865ab2f16 Mon Sep 17 00:00:00 2001 From: illfated Date: Thu, 21 Nov 2019 10:52:49 +0100 Subject: [PATCH] MSC/MSDATP: Advanced hunting 404 URL correction Description: As reported in issue ticket #5484, the link URL pointing to Advanced hunting is broken on this page due to changes in the page filename structure. This URL correction amends that issue. Thanks to Peter Forster (myfope) for reporting the issue. Proposed change: - adjust the filename part of the URL to point to the correct page issue ticket closure or reference: Closes #5484 --- .../microsoft-defender-atp/exploit-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md index 4bf9ad18d4..e47d2c93c1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md @@ -49,7 +49,7 @@ Many of the features in the [Enhanced Mitigation Experience Toolkit (EMET)](http Microsoft Defender ATP provides detailed reporting into events and blocks as part of its alert investigation scenarios. -You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender.md), you can use Advanced hunting to see how exploit protection settings could affect your environment. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview). If you're using [audit mode](audit-windows-defender.md), you can use Advanced hunting to see how exploit protection settings could affect your environment. Here is an example query: