Skip to content

Commit 35ee5dc

Browse files
committed
acrolinx
1 parent c0156ec commit 35ee5dc

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/defender-for-cloud/episode-forty-five.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Risk prioritization | Defender for Cloud in the field
3-
description: Learn about risk prioritization in Defender for Cloud
3+
description: Learn about risk prioritization in Defender for Cloud.
44
ms.topic: reference
55
ms.date: 04/11/2024
66
---

articles/defender-for-cloud/episode-forty-seven.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
22
title: Vulnerability management in Defender CSPM | Defender for Cloud in the field
3-
description: Learn about vulnerability management in Defender CSPM in Defender for Cloud
3+
description: Learn about vulnerability management in Defender CSPM in Defender for Cloud.
44
ms.topic: reference
55
ms.date: 04/11/2024
66
---
77

8-
# Vulnerability anagement in Defender CSPM
8+
# Vulnerability management in Defender CSPM
99

10-
**Episode description**: In this episode of Defender for Cloud in the Field, Shahar Bahat joins Yuri Diogenes to talk about some updates in vulnerability management in Defender for Cloud. Shahar talks about the different aspects of vulnerability management in Defender for Cloud, how to leverage attack path to identify the impact of a vulnerability and how to use Cloud Security Explorer to gain visualization of CVEs at scale across all your subscriptions. Shahar also demonstrates how to utilize these capabilities in Defender for Cloud.
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Shahar Bahat joins Yuri Diogenes to talk about some updates in vulnerability management in Defender for Cloud. Shahar talks about the different aspects of vulnerability management in Defender for Cloud, how to use attack path to identify the effect of a vulnerability and how to use Cloud Security Explorer to gain visualization of CVEs at scale across all your subscriptions. Shahar also demonstrates how to utilize these capabilities in Defender for Cloud.
1111

1212

1313
> [!VIDEO https://aka.ms/docs/player?id=1827b0e1-dd27-4e83-a2b5-6adfea3f8ed5]
1414
1515
- [01:15](/shows/mdc-in-the-field/vulnerability-management#time=01m15s) - Overview of Vulnerability Management solution in Defender for Cloud
16-
- [02:31](/shows/mdc-in-the-field/vulnerability-management#time=02m31s) - Insights available as result of the vulnerability scanning
16+
- [02:31](/shows/mdc-in-the-field/vulnerability-management#time=02m31s) - Insights available as a result of the vulnerability scanning
1717
- [03:41](/shows/mdc-in-the-field/vulnerability-management#time=03m41s) - Integration with Microsoft Threat Vulnerability Management
1818
- [04:52](/shows/mdc-in-the-field/vulnerability-management#time=04m52s) - Querying vulnerability scan results at scale
1919
- [06:53](/shows/mdc-in-the-field/vulnerability-management#time=06m53s) - Demonstration

articles/defender-for-cloud/episode-forty-six.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: DevOps Security Capabilities in Defender CSPM | Defender for Cloud in the field
3-
description: Learn about devOps security capabilities in Defender for Cloud
3+
description: Learn about DevOps security capabilities in Defender for Cloud.
44
ms.topic: reference
55
ms.date: 04/11/2024
66
---
@@ -13,7 +13,7 @@ ms.date: 04/11/2024
1313
1414
- [01:47](/shows/mdc-in-the-field/devops-security#time=01m54s) - What role does DevOps Security plays in a CNAPP solution?
1515
- [04:40](/shows/mdc-in-the-field/devops-security#time=04m40s) - What's new in Defender for Cloud DevOps Security GA?
16-
- [07:08](/shows/mdc-in-the-field/devops-security#time=07m08s) - How Defender for Cloud DevOps Security capabilities help customers to identify risk across devops state?
16+
- [07:08](/shows/mdc-in-the-field/devops-security#time=07m08s) - How Defenders for Cloud DevOps Security capabilities help customers to identify risk across devops state?
1717
- [09:38](/shows/mdc-in-the-field/devops-security#time=09m38s) - Code to cloud contextualization
1818
- [13:44](/shows/mdc-in-the-field/devops-security#time=13m44s) - Demonstration
1919

0 commit comments

Comments
 (0)