Skip to content

Commit 01015b0

Browse files
committed
Standardized the "Learn more" links
1 parent 5d67d90 commit 01015b0

File tree

1 file changed

+19
-15
lines changed

1 file changed

+19
-15
lines changed

articles/security-center/release-notes.md

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -41,20 +41,20 @@ Suppression rules define the criteria for which alerts should be automatically d
4141

4242
- suppress alerts that are being triggered too often to be useful
4343

44-
[Learn more about suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
44+
Learn more about [suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
4545

4646

4747
### Virtual machine vulnerability assessment is now generally available
4848

49-
Security Center's standard tier now includes a built-in vulnerability assessment for virtual machines for no additional fee. This extension is powered by Qualys but reports its findings directly back to Security Center. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
49+
Security Center's standard tier now includes an integrated vulnerability assessment for virtual machines for no additional fee. This extension is powered by Qualys but reports its findings directly back to Security Center. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
5050

5151
The new solution can continuously scan your virtual machines to find vulnerabilities and present the findings in Security Center.
5252

5353
To deploy the solution, use the new security recommendation:
5454

5555
"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"
5656

57-
[Learn more](built-in-vulnerability-assessment.md).
57+
Learn more about [Security Center's integrated vulnerability assessment for virtual machines](built-in-vulnerability-assessment.md).
5858

5959

6060

@@ -68,7 +68,7 @@ This update brings the following changes to this feature:
6868

6969
- The recommendation has been set to be triggered only if there are open management ports.
7070

71-
[Learn more about the JIT access feature](security-center-just-in-time.md).
71+
Learn more about [the JIT access feature](security-center-just-in-time.md).
7272

7373

7474
### Custom recommendations have been moved to a separate security control
@@ -126,7 +126,7 @@ Create a custom initiative in Azure policy, add policies to it and onboard it to
126126

127127
We've now also added the option to edit the custom recommendation metadata. Metadata options include severity, remediation steps, threats information, and more.
128128

129-
[Learn more about enhancing your custom recommendations with detailed information](custom-security-policies.md#enhancing-your-custom-recommendations-with-detailed-information).
129+
Learn more about [enhancing your custom recommendations with detailed information](custom-security-policies.md#enhancing-your-custom-recommendations-with-detailed-information).
130130

131131

132132
### Crash dump analysis capabilities migrating to fileless attack detection
@@ -163,7 +163,7 @@ Now, you can add standards such as:
163163

164164
In addition, we've recently added the **Azure Security Benchmark**, the Microsoft-authored Azure-specific guidelines for security and compliance best practices based on common compliance frameworks. Additional standards will be supported in the dashboard as they become available.
165165

166-
[Learn more about customizing the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
166+
Learn more about [customizing the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
167167

168168

169169
### Identity recommendations now included in Azure Security Center free tier
@@ -178,8 +178,9 @@ Examples of identity and access recommendations include:
178178

179179
If you have subscriptions on the free pricing tier, their secure scores will be impacted by this change because they were never assessed for their identity and access security.
180180

181-
[Learn more about identity and access recommendations](recommendations-reference.md#recs-identity).
182-
[Learn more about monitoring identity and access](security-center-identity-access.md).
181+
Learn more about [identity and access recommendations](recommendations-reference.md#recs-identity).
182+
183+
Learn more about [monitoring identity and access](security-center-identity-access.md).
183184

184185

185186
## March 2020
@@ -192,7 +193,7 @@ Every security program includes multiple workflows for incident response. These
192193

193194
For more information about the automatic and manual Security Center capabilities for running your workflows, see [workflow automation](workflow-automation.md).
194195

195-
To learn about creating Logic Apps, see [Azure Logic Apps](https://docs.microsoft.com/azure/logic-apps/logic-apps-overview).
196+
Learn more about [creating Logic Apps](https://docs.microsoft.com/azure/logic-apps/logic-apps-overview).
196197

197198

198199
### Integration of Azure Security Center with Windows Admin Center
@@ -204,7 +205,7 @@ After moving a server from Windows Admin Center to Azure Security Center, you’
204205
- View security alerts and recommendations in the Security Center extension of the Windows Admin Center.
205206
- View the security posture and retrieve additional detailed information of your Windows Admin Center managed servers in the Security Center within the Azure portal (or via an API).
206207

207-
Learn more about how to [integrate Azure Security Center with Windows Admin Center](windows-admin-center-integration.md).
208+
Learn more about [how to integrate Azure Security Center with Windows Admin Center](windows-admin-center-integration.md).
208209

209210

210211
### Protection for Azure Kubernetes Service
@@ -219,8 +220,9 @@ The Security Center defense includes:
219220
- **Security recommendations** - Actionable recommendations to help you comply with security best-practices for AKS. These recommendations are included in your secure score to ensure they’re viewed as a part of your organization’s security posture. An example of an AKS-related recommendation you might see is "Role-based access control should be used to restrict access to a Kubernetes service cluster".
220221
- **Threat protection** - Through continuous analysis of your AKS deployment, Security Center alerts you to threats and malicious activity detected at the host and AKS cluster level.
221222

222-
[Learn more about Azure Kubernetes Services integration with Security Center](azure-kubernetes-service-integration.md).
223-
[Learn more about the container security features in Security Center](container-security.md).
223+
Learn more about [Azure Kubernetes Services' integration with Security Center](azure-kubernetes-service-integration.md).
224+
225+
Learn more about [the container security features in Security Center](container-security.md).
224226

225227

226228
### Improved just-in-time experience
@@ -230,7 +232,7 @@ The features, operation, and UI for Azure Security Center’s just-in-time tools
230232
- **Justification field** - When requesting access to a virtual machine (VM) through the just-in-time page of the Azure portal, a new optional field is available to enter a justification for the request. Information entered into this field can be tracked in the activity log.
231233
- **Automatic cleanup of redundant just-in-time (JIT) rules** - Whenever you update a JIT policy, a cleanup tool automatically runs to check the validity of your entire ruleset. The tool looks for mismatches between rules in your policy and rules in the NSG. If the cleanup tool finds a mismatch, it determines the cause and, when it's safe to do so, removes built-in rules that aren't needed anymore. The cleaner never deletes rules that you've created.
232234

233-
[Learn more about the JIT access feature](security-center-just-in-time.md).
235+
Learn more about [the JIT access feature](security-center-just-in-time.md).
234236

235237

236238
### Two security recommendations for web applications deprecated
@@ -245,7 +247,9 @@ Two security recommendations related to web applications are being deprecated:
245247

246248
These recommendations will no longer appear in the Security Center list of recommendations. The related policies will no longer be included in the initiative named "Security Center Default".
247249

248-
[Learn more about security recommendations](recommendations-reference.md).
250+
Learn more about [security recommendations](recommendations-reference.md).
251+
252+
249253

250254
## February 2020
251255

@@ -267,4 +271,4 @@ An enhanced version of the secure score feature of Azure Security Center is now
267271

268272
Familiarize yourself with the secure score changes during the preview phase and determine other remediations that will help you to further secure your environment.
269273

270-
Learn more in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
274+
Learn more about [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).

0 commit comments

Comments
 (0)