Skip to content

Commit e21dc06

Browse files
(maint) Fix redirecting link (#30992)
* (maint) Fix redirecting link * Fix link * More fixes * more link fixes * one more fix
1 parent 0e5e1ff commit e21dc06

File tree

6 files changed

+11
-13
lines changed

6 files changed

+11
-13
lines changed

content/en/remote_configuration/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ further_reading:
1111
- link: "/dynamic_instrumentation/?tab=configurationyaml#enable-remote-configuration"
1212
tag: "Documentation"
1313
text: "Dynamic Instrumentation"
14-
- link: "/security/threats/setup"
14+
- link: "/security/workload_protection/"
1515
tag: "Documentation"
1616
text: "Setting Up Workload Protection"
1717
- link: "https://www.datadoghq.com/blog/compliance-governance-transparency-with-datadog-audit-trail/"

content/en/security/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ further_reading:
2424
- link: "/security/cloud_security_management/misconfigurations/"
2525
tag: "Documentation"
2626
text: "Start tracking misconfigurations with Cloud Security Misconfigurations"
27-
- link: "/security/threats/setup"
27+
- link: "/security/workload_protection/"
2828
tag: "Documentation"
2929
text: "Uncover kernel-level threats with Workload Protection"
3030
- link: "https://securitylabs.datadoghq.com/"

content/en/security/threats/_index.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ By default, all OOTB Agent crypto mining threat detection rules are enabled and
3434

3535
Workload Protection Threats comes with more than 50 out-of-the-box detection rules that are maintained by a team of security experts. The rules surface the most important risks so that you can immediately take steps to remediate. Agent expression rules define the workload activities to be collected for analysis while backend detection rules analyze the activities and identify attacker techniques and other risky patterns of behavior.
3636

37-
Use [Remote Configuration][7] to automatically deploy new and updated rules to the Agent. [Customize the rules][5] by defining how each rule monitors process, network, and file activity, [create custom rules][6], and [set up real-time notifications](#set-up-real-time-notifications) for new signals.
37+
Use [Cloud Security][1] with {{< tooltip glossary="Remote Configuration" case="title" >}} to automatically deploy new and updated rules to the Agent. [Customize the rules][5] by defining how each rule monitors process, network, and file activity, [create custom rules][6], and [set up real-time notifications](#set-up-real-time-notifications) for new signals.
3838

3939
{{< img src="security/cws/threats_detection_rules.png" alt="Workload Protection detection rules in the Datadog app" width="100%">}}
4040

@@ -58,20 +58,19 @@ Datadog is introducing a new feature called Active Protection to address the cry
5858
## Get started
5959

6060
{{< whatsnext >}}
61-
{{< nextlink href="/security/threats/setup">}}Complete setup and configuration{{< /nextlink >}}
61+
{{< nextlink href="/security/cloud_security_management/setup/">}}Complete setup and configuration{{< /nextlink >}}
6262
{{< nextlink href="/account_management/rbac/permissions/#cloud-security-platform">}}Datadog role permissions for Workload Protection{{< /nextlink >}}
6363
{{< nextlink href="/security/workload_protection/workload_security_rules">}}Learn about Workload Protection detection rules{{< /nextlink >}}
6464
{{< nextlink href="/security/default_rules/#cat-workload-security">}}Start using out-of-the-box Workload Protection detection rules{{< /nextlink >}}
6565
{{< nextlink href="/getting_started/cloud_security_management">}}Getting Started with Cloud Security{{< /nextlink >}}
6666
{{< /whatsnext >}}
6767

68-
[1]: /security/threats/setup/?tab=kuberneteshelm#prerequisites
68+
[1]: /security/cloud_security_management/setup/
6969
[2]: /agent/
7070
[3]: /security/notifications/
7171
[4]: /security/notifications/#notification-channels
7272
[5]: /security/notifications/#detection-rule-notifications
7373
[6]: /security/workload_protection/agent_expressions
74-
[7]: /security/threats/setup
7574
[8]: /security/workload_protection/security_signals
7675
[9]: /network_monitoring/performance/
7776
[10]: /security/workload_protection/guide/active-protection

content/en/security/threats/workload_security_rules/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ aliases:
44
- /security_platform/cloud_workload_security/workload_security_rules
55
- /security/cloud_workload_security/workload_security_rules
66
further_reading:
7-
- link: "/security/threats/setup"
7+
- link: "/security/workload_protection/"
88
tag: "Documentation"
99
text: "Setting Up Workload Protection"
1010
- link: "/security/workload_protection/agent_expressions"
@@ -135,7 +135,7 @@ Detection rules run in the Datadog backend after events are sent over as logs. T
135135
[4]: https://app.datadoghq.com/security/configuration/agent-rules
136136
[5]: /security/notifications/variables/
137137
[6]: https://app.datadoghq.com/security/configuration/workload/agent-rules
138-
[7]: /security/threats/setup?tab=kuberneteshelm#enable-remote-configuration
138+
[7]: /remote_configuration/
139139
[8]: /security/workload_protection/security_signals
140140
[9]: https://app.datadoghq.com/security/configuration/workload/agent-rules
141141
[10]: https://app.datadoghq.com/security/configuration/notification-rules

content/en/security/threats/workload_security_rules/custom_rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create Policies and Custom Rules
33
further_reading:
4-
- link: "/security/threats/setup"
4+
- link: "/security/workload_protection/"
55
tag: "Documentation"
66
text: "Setting Up Workload Protection"
77
- link: "/security/workload_protection/agent_expressions"

content/en/security/workload_protection/_index.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ By default, all OOTB Agent crypto mining threat detection rules are enabled and
5757

5858
Workload Protection Threats comes with more than 50 out-of-the-box detection rules that are maintained by a team of security experts. The rules surface the most important risks so that you can immediately take steps to remediate. Agent expression rules define the workload activities to be collected for analysis while backend detection rules analyze the activities and identify attacker techniques and other risky patterns of behavior.
5959

60-
Set up [Cloud Security][7] with {{< tooltip glossary="Remote Configuration" case="title" >}} to automatically deploy new and updated rules to the Agent. [Customize the rules][5] by defining how each rule monitors process, network, and file activity, [create custom rules][6], and [set up real-time notifications](#set-up-real-time-notifications) for new signals.
60+
Set up [Cloud Security][1] with {{< tooltip glossary="Remote Configuration" case="title" >}} to automatically deploy new and updated rules to the Agent. [Customize the rules][5] by defining how each rule monitors process, network, and file activity, [create custom rules][6], and [set up real-time notifications](#set-up-real-time-notifications) for new signals.
6161

6262
<!-- {{< img src="security/cws/threats_detection_rules.png" alt="Workload Protection detection rules in the Datadog app" width="100%">}} -->
6363

@@ -81,20 +81,19 @@ Datadog is introducing a new feature called Active Protection to address the cry
8181
## Get started
8282

8383
{{< whatsnext >}}
84-
{{< nextlink href="/security/threats/setup">}}Complete setup and configuration{{< /nextlink >}}
84+
{{< nextlink href="/security/cloud_security_management/setup/">}}Complete setup and configuration{{< /nextlink >}}
8585
{{< nextlink href="/account_management/rbac/permissions/#cloud-security-platform">}}Datadog role permissions for Workload Protection{{< /nextlink >}}
8686
{{< nextlink href="/security/workload_protection/workload_security_rules">}}Learn about Workload Protection detection rules{{< /nextlink >}}
8787
{{< nextlink href="/security/default_rules/#cat-workload-security">}}Start using out-of-the-box Workload Protection detection rules{{< /nextlink >}}
8888
{{< nextlink href="/getting_started/cloud_security_management">}}Getting Started with Cloud Security Management{{< /nextlink >}}
8989
{{< /whatsnext >}}
9090

91-
[1]: /security/threats/setup/?tab=kuberneteshelm#prerequisites
91+
[1]: /security/cloud_security_management/setup/
9292
[2]: /agent/
9393
[3]: /security/notifications/
9494
[4]: /security/notifications/#notification-channels
9595
[5]: /security/notifications/#detection-rule-notifications
9696
[6]: /security/workload_protection/agent_expressions
97-
[7]: /security/threats/setup
9897
[8]: /security/workload_protection/security_signals
9998
[9]: /network_monitoring/performance/
10099
[10]: /security/workload_protection/guide/active-protection

0 commit comments

Comments
 (0)