MSC/MSDATP: Advanced hunting 404 URL correction

Description:

As reported in issue ticket #5484, the link URL pointing to Advanced
hunting is broken on this page due to changes in the page filename
structure. This URL correction amends that issue.

Thanks to Peter Forster (myfope) for reporting the issue.

Proposed change:
- adjust the filename part of the URL to point to the correct page

issue ticket closure or reference:

Closes #5484
This commit is contained in:
illfated 2019-11-21 10:52:49 +01:00
parent 9b0b385981
commit e7611a2a0c

View File

@ -49,7 +49,7 @@ Many of the features in the [Enhanced Mitigation Experience Toolkit (EMET)](http
Microsoft Defender ATP provides detailed reporting into events and blocks as part of its alert investigation scenarios.
You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender.md), you can use Advanced hunting to see how exploit protection settings could affect your environment.
You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview). If you're using [audit mode](audit-windows-defender.md), you can use Advanced hunting to see how exploit protection settings could affect your environment.
Here is an example query: