Skip to content

Commit 58fa8e4

Browse files
committed
a
1 parent 53d3cde commit 58fa8e4

File tree

3 files changed

+3
-0
lines changed

3 files changed

+3
-0
lines changed

src/pentesting-cloud/azure-security/az-services/az-defender.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,3 +36,4 @@ Moreover, the continuous monitoring can also show **changes in the exposed infra
3636
By delivering real-time insights and detailed asset inventories, Defender EASM empowers organizations to **continuously monitor and track changes to their external exposure**. It uses risk-based analysis to prioritize findings based on severity and contextual factors, ensuring that remediation efforts are focused where they matter most. This proactive approach not only helps in uncovering hidden vulnerabilities but also supports the continuous improvement of your overall security posture by alerting you to any new exposures as they emerge.
3737

3838
{{#include ../../../banners/hacktricks-training.md}}
39+

src/pentesting-cloud/azure-security/az-services/az-monitoring.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,3 +106,4 @@ az monitor activity-log alert list --output table
106106
```
107107

108108
{{#include ../../../banners/hacktricks-training.md}}
109+

src/pentesting-cloud/azure-security/az-services/az-sentinel.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,3 +43,4 @@ You start by enabling Sentinel on an Azure Log Analytics workspace (the workspac
4343

4444

4545
{{#include ../../../banners/hacktricks-training.md}}
46+

0 commit comments

Comments
 (0)