Skip to content

Commit 1003c53

Browse files
Merge pull request #283545 from ElazarK/wi275497-scan-vs-purview
sensitive info type
2 parents 088303f + 3edbec3 commit 1003c53

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-cloud/concept-data-security-posture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.author: dacurwin
55
author: dcurwin
66
ms.service: defender-for-cloud
77
ms.topic: concept-article
8-
ms.date: 07/30/2024
8+
ms.date: 08/04/2024
99
#customer intent: As a security professional, I want to understand how Defender for Cloud enhances data security in a multicloud environment so that I can effectively protect sensitive data.
1010
---
1111

@@ -75,7 +75,7 @@ Changes in sensitivity settings take effect the next time that resources are dis
7575

7676
Sensitive data discovery identifies sensitive resources and their related risk and then helps to prioritize and remediate those risks.
7777

78-
Defender for Cloud considers a resource sensitive if a Sensitive Information Type (SIT) is detected in it and the customer has configured the SIT to be considered sensitive. Defender for Cloud detects SITs that are considered sensitive by default.
78+
Defender for Cloud considers a resource sensitive if a Sensitive Information Type (SIT) is detected in it and you have configured the SIT to be considered sensitive. Check out [the list of SITs that are considered sensitive by default](sensitive-info-types.md).
7979

8080
The sensitive data discovery process operates by taking samples of the resource’s data. The sample data is then used to identify sensitive resources with high confidence without performing a full scan of all assets in the resource.
8181

0 commit comments

Comments
 (0)