fix links in index file

This commit is contained in:
Joey Caparas 2018-08-23 19:38:46 -07:00
parent 2861b9b575
commit da1821ac3d
3 changed files with 4 additions and 11 deletions

View File

@ -66,7 +66,7 @@ Endpoint protection and response capabilities are put in place to detect, invest
- [Response orchestration](windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md)
- [Forensic collection](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package-from-machines)
- [Threat intelligence](windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md)
- [Advanced detonation and analysis service](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis.md)
- [Advanced detonation and analysis service](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis)
<a name="ai"></a>
@ -75,8 +75,8 @@ In conjunction with being able to quickly respond to advanced attacks, Windows D
- [Automated investigation and remediation](windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md)
- [Threat remediation](windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md#how-threats-are-remediated)
- [Manage automated investigations](windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md#manage-automated-investigations)
- [Analyze automated investigation](windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md#analyze-automated-investigations)
- [Manage automated investigations](windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md)
- [Analyze automated investigation](windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md#analyze-automated-investigations)
<a name="sp"></a>

View File

@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: medium
ms.date: 05/21/2018
ms.date: 09/03/2018
---
# Overview of Automated investigations

View File

@ -15,14 +15,10 @@ ms.date: 05/08/2018
# Manage portal access using role-based access control
**Applies to:**
- Azure Active Directory
- Office 365
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-rbac-abovefoldlink)
@ -67,9 +63,6 @@ Someone with a Windows Defender ATP Global administrator role has unrestricted a
>
> After opting in to use RBAC, you cannot revert to the initial roles as when you first logged into the portal.
To properly implement RBAC you'll need to take the following steps:
- Create roles and assign them to an Azure AD group
-
## Related topic