Skip to content

Commit 28af26e

Browse files
secrets docs
1 parent 1166b45 commit 28af26e

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/defender-for-cloud/remediate-cloud-deployment-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-expl
8484

8585
1. Create a query to look for secrets in your cloud deployments. To do this, select a resource type, and then select the types of secret you want to find. For example:
8686

87-
:::image type="content" source="media/remediate-cloud-deployment-secrets.md/query-example.png" alt-text="Screenshot that shows the detailed information of a secret after you have selected the secret in the findings section." lightbox="media/remediate-cloud-deployment-secrets.md/query-example.png":::
87+
:::image type="content" source="media/remediate-cloud-deployment-secrets/query-example.png" alt-text="Screenshot that shows a sample query for finding cloud deployment secrets in the cloud security graph." lightbox="media/remediate-cloud-deployment-secrets/query-example.png":::
8888

8989
## Remediate secrets in the asset inventory
9090

articles/defender-for-cloud/remediate-server-secrets.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Attack path analysis is a graph-based algorithm that scans your [cloud security
4444

4545
## Remediate secrets with recommendations
4646

47-
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the Remediate vulnerabilities security control on the Recommendations page. Defender for Cloud provides a [number of VM secrets security recommendations](secrets-scanning.md#security-recommendations).
47+
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the Remediate vulnerabilities security control on the Recommendations page. Defender for Cloud provides a [number of VM secrets security recommendations](secrets-scanning-servers.md#security-recommendations).
4848

4949

5050
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -77,7 +77,7 @@ Secrets that don't have a known attack path are referred to as `secrets without
7777

7878
## Remediate secrets with cloud security explorer
7979

80-
The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer) enables you to proactively identify potential security risks within your cloud environment. It does so by querying the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph), which is the context engine of Defender for Cloud. Cloud security explorer provides a [number of query templates](secret-scanning-servers.md#) for investigating VM secrets issues.
80+
The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer) enables you to proactively identify potential security risks within your cloud environment. It does so by querying the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph), which is the context engine of Defender for Cloud. Cloud security explorer provides a [number of query templates](secrets-scanning-servers.md#) for investigating VM secrets issues.
8181

8282

8383
1. Sign in to the [Azure portal](https://portal.azure.com).

0 commit comments

Comments
 (0)