From 5afbfbf5dc69179336ffe655163d9bfddc3330ff Mon Sep 17 00:00:00 2001 From: Edgar Parra <127970167+EdgarPMIA@users.noreply.github.com> Date: Tue, 10 Sep 2024 13:29:49 -0400 Subject: [PATCH] Update comprehensive-guidance-on-linux-deployment.md updated the URL to use a relative link URL. Hopefully that works better, first time doing that in an article --- defender-endpoint/comprehensive-guidance-on-linux-deployment.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/defender-endpoint/comprehensive-guidance-on-linux-deployment.md b/defender-endpoint/comprehensive-guidance-on-linux-deployment.md index 9c1e6e6764..10cb82fb7f 100644 --- a/defender-endpoint/comprehensive-guidance-on-linux-deployment.md +++ b/defender-endpoint/comprehensive-guidance-on-linux-deployment.md @@ -131,7 +131,7 @@ The following table lists the supported proxy settings: #### Step 3: Verify SSL inspection isn't being performed on the network traffic To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You have to bypass SSL inspection for Microsoft Defender for Endpoint URLs. For additional information about the certificate pinning process, please visit the following link: -https://learn.microsoft.com/windows/security/identity-protection/enterprise-certificate-pinning +[enterprise-certificate-pinning] (/windows/security/identity-protection/enterprise-certificate-pinning). ##### Troubleshoot cloud connectivity issues