Skip to content

Commit 2b427b4

Browse files
episode twenty
updated time stamps, spelling, update TOC
1 parent 39f5429 commit 2b427b4

File tree

3 files changed

+13
-13
lines changed

3 files changed

+13
-13
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -535,7 +535,7 @@
535535
href: episode-eighteen.md
536536
- name: Defender for DevOps
537537
href: episode-nineteen.md
538-
- name: Cloud security explorer and Attack path analysis
538+
- name: Cloud security explorer and attack path analysis
539539
href: episode-twenty.md
540540
- name: Manage user data
541541
href: privacy.md

articles/defender-for-cloud/episode-nineteen.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Defender for DevOps | Defender for Cloud in the Field
33
titleSuffix: Microsoft Defender for Cloud
44
description: Learn about Defender for Cloud integration with Defender for DevOps.
55
ms.topic: reference
6-
ms.date: 11/03/2022
6+
ms.date: 11/08/2022
77
---
88

99
# Defender for DevOps | Defender for Cloud in the Field
@@ -45,4 +45,4 @@ ms.date: 11/03/2022
4545
## Next steps
4646

4747
> [!div class="nextstepaction"]
48-
> [Cloud security explorer and Attack path analysis](episode-twenty.md)
48+
> [Cloud security explorer and attack path analysis](episode-twenty.md)

articles/defender-for-cloud/episode-twenty.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,29 @@
11
---
2-
title: Cloud security explorer and Attack path analysis | Defender for Cloud in the Field
2+
title: Cloud security explorer and attack path analysis | Defender for Cloud in the Field
33
titleSuffix: Microsoft Defender for Cloud
44
description: Learn about cloud security explorer and attack path analysis.
55
ms.topic: reference
6-
ms.date: 11/06/2022
6+
ms.date: 11/08/2022
77
---
88

9-
# Cloud security explorer and Attack path analysis | Defender for Cloud in the Field
9+
# Cloud security explorer and attack path analysis | Defender for Cloud in the Field
1010

11-
**Episode description**: In this episode of Defender for Cloud in the Field, Tal Rosler joins Yuri Diogenes to talk about Cloud security explorer and Attack path analysis, two new capabilities in Defender for CSPM that were released at Ignite. The talk explains the rationale behind creating these features and how to use these features to prioritize what is more important to keep your environment more secure. Tal also demonstrates how to use these capabilities to quickly identify vulnerabilities and misconfigurations in cloud workloads.
11+
**Episode description**: In this episode of Defender for Cloud in the Field, Tal Rosler joins Yuri Diogenes to talk about cloud security explorer and attack path analysis, two new capabilities in Defender for CSPM that were released at Ignite. The talk explains the rationale behind creating these features and how to use these features to prioritize what is more important to keep your environment more secure. Tal also demonstrates how to use these capabilities to quickly identify vulnerabilities and misconfigurations in cloud workloads.
1212
<br>
1313
<br>
1414
<iframe src="https://aka.ms/docs/player?id=ce442350-7fab-40c0-b934-d93027b00853" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
1515

16-
- [01:27](/shows/mdc-in-the-field/defender-for-devops#time=01m16s) - The busines case for Cloud Security Graph
16+
- [01:27](/shows/mdc-in-the-field/security-explorer#time=01m27s) - The business case for cloud security graph
1717

18-
- [03:00](/shows/mdc-in-the-field/defender-for-devops) - What is Cloud Security Graph
18+
- [03:00](/shows/mdc-in-the-field/security-explorer#time=03m00s) - What is cloud security graph
1919

20-
- [05:06](/shows/mdc-in-the-field/defender-for-devops)- Demonstration
20+
- [05:06](/shows/mdc-in-the-field/security-explorer#time=05m06s) - Demonstration
2121

22-
- [09:30](/shows/mdc-in-the-field/defender-for-devops) - How paths are created under attack path
22+
- [09:30](/shows/mdc-in-the-field/security-explorer#time=09m30s) - How paths are created under attack path
2323

24-
- [12:00](/shows/mdc-in-the-field/defender-for-devops) - Cloud Security explorer demonstration
24+
- [12:00](/shows/mdc-in-the-field/security-explorer#time=12m00s) - Cloud security explorer demonstration
2525

26-
- [19:25](/shows/mdc-in-the-field/defender-for-devops) - Saving Cloud Security Explorer queries
26+
- [19:25](/shows/mdc-in-the-field/security-explorer#time=19m25s) - Saving cloud security explorer queries
2727

2828

2929
## Recommended resources

0 commit comments

Comments
 (0)