Skip to content

Commit 0b4a93e

Browse files
committed
title fix
1 parent 82d970b commit 0b4a93e

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -324,7 +324,7 @@
324324
- name: Discover generative AI workloads
325325
displayName: AI, workloads, models, applications, apps, AI BOM
326326
href: identify-ai-workload-model.md
327-
- name: Explore pre-deployment risks to generative AI artifacts
327+
- name: Explore risks to pre-deployment generative AI artifacts
328328
displayName: AI, risks, generative, applications, apps
329329
href: explore-ai-risk.md
330330
- name: Data-aware security posture

articles/defender-for-cloud/explore-ai-risk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Explore predeployment risks to generative AI artifacts
2+
title: Explore risks to pre-deployment generative AI artifacts
33
description: Learn how to discover potential security risks for your generative AI applications in Microsoft Defender for Cloud.
44
ms.topic: how-to
55
ms.date: 05/02/2024
66
# customer intent: As a user, I want to learn how to identify potential security risks for my generative AI applications in Microsoft Defender for Cloud so that I can enhance their security.
77
---
88

9-
# Explore predeployment risks to generative AI artifacts
9+
# Explore risks to pre-deployment generative AI artifacts
1010

1111
Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender for Cloud helps you to improve the security posture of generative AI apps, by identifying vulnerabilities in generative AI libraries that exist in your AI artifacts such as container images and code repositories. This article explains how to explore, identify security risks for those applications.
1212

articles/defender-for-cloud/identify-ai-workload-model.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,4 +51,4 @@ The cloud security explorer can be used to identify generative AI workloads and
5151
## Next step
5252

5353
> [!div class="nextstepaction"]
54-
> [Explore pre-deployment risks to generative AI artifacts](explore-ai-risk.md)
54+
> [Explore risks to pre-deployment generative AI artifacts](explore-ai-risk.md)

0 commit comments

Comments
 (0)