Skip to content

Commit 33fd100

Browse files
Merge pull request #249465 from memildin/patch-96
Update defender-for-resource-manager-usage.md
2 parents 19f25ab + a6b21d9 commit 33fd100

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/defender-for-cloud/defender-for-resource-manager-usage.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ author: dcurwin
99

1010
# Respond to Microsoft Defender for Resource Manager alerts
1111

12-
When you receive an alert from Microsoft Defender for Resource Manager, we recommend you investigate and respond to the alert as described below. Microsoft Defender for Resource Manager protects all connected resources, so even if you're familiar with the application or user that triggered the alert, it's important to verify the situation surrounding every alert.
12+
When you receive an alert from Microsoft Defender for Resource Manager, we recommend you investigate and respond to the alert as described below. Defender for Resource Manager protects all connected resources, so even if you're familiar with the application or user that triggered the alert, it's important to verify the situation surrounding every alert.
1313

1414
## Step 1: Contact
1515

@@ -19,17 +19,17 @@ When you receive an alert from Microsoft Defender for Resource Manager, we recom
1919

2020
## Step 2: Investigate alerts from Microsoft Defender for Resource Manager
2121

22-
Security alerts from Microsoft Defender for Resource Manager are based on threats detected by monitoring Azure Resource Manager operations. Defender for Cloud uses internal log sources of Azure Resource Manager as well as Azure Activity log, a platform log in Azure that provides insight into subscription-level events.
22+
Security alerts from Defender for Resource Manager are based on threats detected by monitoring Azure Resource Manager operations. Defender for Cloud uses internal log sources of Azure Resource Manager as well as Azure Activity log, a platform log in Azure that provides insight into subscription-level events.
2323

24-
Microsoft Defender for Resource Manager provides visibility into activity that comes from third party service providers that have delegated access as part of the resource manager alerts. For example, `Azure Resource Manager operation from suspicious proxy IP address - delegated access`.
24+
Defender for Resource Manager provides visibility into activity that comes from third party service providers that have delegated access as part of the resource manager alerts. For example, `Azure Resource Manager operation from suspicious proxy IP address - delegated access`.
2525

2626
`Delegated access` refers to access with [Azure Lighthouse](/azure/lighthouse/overview) or with [Delegated administration privileges](/partner-center/dap-faq).
2727

2828
Alerts that show `Delegated access` also include a customized description and remediation steps.
2929

3030
Learn more about [Azure Activity log](../azure-monitor/essentials/activity-log.md).
3131

32-
To investigate security alerts from Microsoft Defender for Resource Manager:
32+
To investigate security alerts from Defender for Resource Manager:
3333

3434
1. Open Azure Activity log.
3535

@@ -66,7 +66,7 @@ To investigate security alerts from Microsoft Defender for Resource Manager:
6666

6767
## Next steps
6868

69-
This page explained the process of responding to an alert from Microsoft Defender for Resource Manager. For related information see the following pages:
69+
This page explained the process of responding to an alert from Defender for Resource Manager. For related information, see the following pages:
7070

7171
- [Overview of Microsoft Defender for Resource Manager](defender-for-resource-manager-introduction.md)
7272
- [Suppress security alerts](alerts-suppression-rules.md)

0 commit comments

Comments
 (0)