Skip to content

Commit 363b97a

Browse files
committed
Fix build errors
1 parent 14e9bdd commit 363b97a

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ author: bmansheim
1515
- Discover vulnerabilities and misconfigurations in near real time
1616
- Prioritize vulnerabilities based on the threat landscape and detections in your organization
1717

18-
To learn more about agentless scanning, see [Find vulnerabilities and collect software inventory with agentless scanning](enable-vulnerability-assessment-agentless)
18+
To learn more about agentless scanning, see [Find vulnerabilities and collect software inventory with agentless scanning](enable-vulnerability-assessment-agentless.md)
1919

2020
>[!Note]
2121
> Microsoft Defender Vulnerability Management Add-on capabilities are included in Defender for Servers Plan 2. This provides consolidated inventories, new assessments, and mitigation tools to further enhance your vulnerability management program. To learn more, see [Vulnerability Management capabilities for servers](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities#vulnerability-managment-capabilities-for-servers).

articles/defender-for-cloud/plan-multicloud-security-determine-multicloud-dependencies.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -62,10 +62,10 @@ Enabling Defender for Servers on your AWS or GCP connector allows Defender for C
6262
Defender for Servers offers two different plans:
6363

6464
- **Plan 1:**
65-
- **MDE integration:** Plan 1 integrates with [Microsoft Defender for Endpoint Plan 2](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2?view=o365-worldwide) to provide a full endpoint detection and response (EDR) solution for machines running a [range of operating systems](/microsoft-365/security/defender-endpoint/minimum-requirements?view=o365-worldwide). Defender for Endpoint features include:
66-
- [Reducing the attack surface](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction?view=o365-worldwide) for machines.
67-
- Providing [antivirus](/microsoft-365/security/defender-endpoint/next-generation-protection?view=o365-worldwide) capabilities.
68-
- Threat management, including [threat hunting](/microsoft-365/security/defender-endpoint/advanced-hunting-overview?view=o365-worldwide), [detection](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response?view=o365-worldwide), [analytics](/microsoft-365/security/defender-endpoint/threat-analytics?view=o365-worldwide), and [automated investigation and response](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response?view=o365-worldwide).
65+
- **MDE integration:** Plan 1 integrates with [Microsoft Defender for Endpoint Plan 2](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2) to provide a full endpoint detection and response (EDR) solution for machines running a [range of operating systems](/microsoft-365/security/defender-endpoint/minimum-requirements). Defender for Endpoint features include:
66+
- [Reducing the attack surface](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction) for machines.
67+
- Providing [antivirus](/microsoft-365/security/defender-endpoint/next-generation-protection) capabilities.
68+
- Threat management, including [threat hunting](/microsoft-365/security/defender-endpoint/advanced-hunting-overview), [detection](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response), [analytics](/microsoft-365/security/defender-endpoint/threat-analytics), and [automated investigation and response](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response).
6969
- **Provisioning:** Automatic provisioning of the Defender for Endpoint sensor on every supported machine that's connected to Defender for Cloud.
7070
- **Licensing:** Charges Defender for Endpoint licenses per hour instead of per seat, lowering costs by protecting virtual machines only when they are in use.
7171
- **Plan 2:** Includes all the components of Plan 1 along with additional capabilities such as File Integrity Monitoring (FIM), Just-in-time (JIT) VM access, and more.
@@ -80,7 +80,7 @@ The following components and requirements are needed to receive full protection
8080
- The Azure Arc agent is needed to read security information on the host level and allow Defender for Cloud to deploy the agents/extensions required for complete protection.
8181
To auto-provision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
8282
- **Defender for Endpoint capabilities**: The [Microsoft Defender for Endpoint](./integration-defender-for-endpoint.md?tabs=linux) agent provides comprehensive endpoint detection and response (EDR) capabilities.
83-
- **Vulnerability assessment**: Using either the integrated [Qualys vulnerability scanner](./deploy-vulnerability-assessment-vm.md), or the [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide) solution.
83+
- **Vulnerability assessment**: Using either the integrated [Qualys vulnerability scanner](./deploy-vulnerability-assessment-vm.md), or the [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) solution.
8484
- **Log Analytics agent/[Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA) (in preview)**: Collects security-related configuration information and event logs from machines.
8585

8686
#### Check networking requirements

0 commit comments

Comments
 (0)