Skip to content

Commit 36c4354

Browse files
committed
removed footnote updated date
1 parent 6cabde2 commit 36c4354

File tree

2 files changed

+3
-4
lines changed

2 files changed

+3
-4
lines changed

articles/defender-for-cloud/includes/azure-monitor-agent-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ ms.author: benmansheim
44
ms.service: defender-for-cloud
55
ms.custom: ignite-2022
66
ms.topic: include
7-
ms.date: 11/24/2022
7+
ms.date: 11/27/2022
88
---
99

1010
| Aspect | Details |

articles/defender-for-cloud/monitoring-components.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: bmansheim
55
ms.author: benmansheim
66
ms.topic: conceptual
77
ms.custom: ignite-2022
8-
ms.date: 11/24/2022
8+
ms.date: 11/27/2022
99
---
1010

1111
# How does Defender for Cloud collect data?
@@ -65,12 +65,11 @@ Learn more about [using the Azure Monitor Agent with Defender for Cloud](auto-de
6565
|---|:--|:--|
6666
| Release state: | Generally available (GA) | Generally available (GA) |
6767
| Relevant Defender plan: | [Microsoft Defender for Servers](defender-for-servers-introduction.md)<br>[Microsoft Defender for SQL](defender-for-sql-introduction.md) | [Microsoft Defender for Servers](defender-for-servers-introduction.md)<br>[Microsoft Defender for SQL](defender-for-sql-introduction.md) |
68-
| Required roles and permissions (subscription-level):<sup>[1](#footnote1)</sup> | [Contributor](../role-based-access-control/built-in-roles.md#contributor) or [Security Admin](../role-based-access-control/built-in-roles.md#security-admin) | [Owner](../role-based-access-control/built-in-roles.md#owner) |
68+
| Required roles and permissions (subscription-level): | [Contributor](../role-based-access-control/built-in-roles.md#contributor) or [Security Admin](../role-based-access-control/built-in-roles.md#security-admin) | [Owner](../role-based-access-control/built-in-roles.md#owner) |
6969
| Supported destinations: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure virtual machines | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Arc-enabled machines |
7070
| Policy-based: | :::image type="icon" source="./media/icons/no-icon.png"::: No | :::image type="icon" source="./media/icons/yes-icon.png"::: Yes |
7171
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government, Azure China 21Vianet | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Azure China 21Vianet |
7272

73-
<sup><a name="footnote1"></a>1</sup> Azure and Arc run on different processes, but the experience aggregates them and [Owner](../role-based-access-control/built-in-roles.md#owner) permissions are required to enable the entire component.
7473

7574
<a name="preexisting"></a>
7675

0 commit comments

Comments
 (0)