Skip to content

Commit 16fba59

Browse files
Update defender-for-cloud-glossary.md
1 parent 3bab925 commit 16fba59

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

articles/defender-for-cloud/defender-for-cloud-glossary.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Adaptive application controls are an intelligent and automated solution for defi
1818
### **AAD**
1919
Azure Active Directory (Azure AD) is a cloud-based identity and access management service. See [Adaptive Application Controls](../active-directory/fundamentals/active-directory-whatis.md).
2020
### **ACR Tasks**
21-
A suite of features within Azure container registry. See [Frequently asked questions - Azure Container Registry](../container-registry/container-registry-faq.yml).
21+
A suite of features within Azure container registry. See [Frequently asked questions - Azure Container Registry](../container-registry/container-registry-faq.yml).
2222
### **Adaptive network hardening**
2323
Adaptive network hardening provides recommendations to further harden the [network security groups (NSG)](../virtual-network/network-security-groups-overview.md) rules. See [What is Adaptive Network Hardening?](../defender-for-cloud/adaptive-network-hardening.md#what-is-adaptive-network-hardening).
2424
### **ADO**
@@ -72,6 +72,8 @@ Cloud Workload Protection Platform. See [CWPP](./overview-page.md).
7272

7373
## D
7474

75+
### Data Aware Security Posture
76+
Data-aware security posture automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. Learn about [data-aware security posture](concept-data-security-posture.md).
7577
### **DDOS Attack**
7678
Distributed denial-of-service, a type of attack where an attacker sends more requests to an application than the application is capable of handling. See [DDOS FAQs](../ddos-protection/ddos-faq.yml).
7779

@@ -195,6 +197,11 @@ Security Orchestration Automated Response, a collection of software tools design
195197
### **TVM**
196198
Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md).
197199

200+
## W
201+
202+
### **WAF**
203+
Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities. Learn more about [WAF](https://learn.microsoft.com/azure/web-application-firewall/overview).
204+
198205
## Z
199206

200207
### **Zero-Trust**

0 commit comments

Comments
 (0)