Skip to content

Commit 3e48b53

Browse files
authored
Merge pull request #245966 from dcurwin/wi-132882-change-url-agentless-scanning
Change agentless scanning URL
2 parents ee2bb9c + 768c2e4 commit 3e48b53

File tree

3 files changed

+15
-10
lines changed

3 files changed

+15
-10
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -835,6 +835,11 @@
835835
"redirect_url": "/azure/defender-for-cloud/connect-azure-subscription",
836836
"redirect_document_id": true
837837
},
838+
{
839+
"source_path_from_root": "/articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md",
840+
"redirect_url": "/azure/defender-for-cloud/enable-agentless-scanning-vms",
841+
"redirect_document_id": true
842+
},
838843
{
839844
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
840845
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -478,9 +478,9 @@
478478
href: tutorial-enable-servers-plan.md
479479
- name: Configure vulnerability scanning
480480
items:
481-
- name: Enable agentless vulnerability scanning
481+
- name: Enable agentless scanning for VMs
482482
displayName: vulnerability, software inventory, agentless scanning
483-
href: enable-vulnerability-assessment-agentless.md
483+
href: enable-agentless-scanning-vms.md
484484
- name: Enable vulnerability scanning with Microsoft Defender Vulnerability Management
485485
displayName: mde, tvm, vulnerability, va, arc, hybrid, defender vulnerability management
486486
href: deploy-vulnerability-assessment-defender-vulnerability-management.md

articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md renamed to articles/defender-for-cloud/enable-agentless-scanning-vms.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Enable agentless vulnerability scanning
2+
title: Enable agentless scanning for VMs
33
description: Find installed software and software vulnerabilities on your Azure machines and AWS machines without installing an agent.
44
author: dcurwin
55
ms.author: dacurwin
@@ -8,7 +8,7 @@ ms.custom: ignite-2022
88
ms.date: 06/29/2023
99
---
1010

11-
# Enable agentless vulnerability scanning
11+
# Enable agentless scanning for VMs
1212

1313
Agentless scanning provides visibility into installed software and software vulnerabilities on your workloads to extend vulnerability assessment coverage to server workloads without a vulnerability assessment agent installed.
1414

@@ -26,8 +26,8 @@ When you enable agentless vulnerability assessment:
2626

2727
- If you select **Microsoft Defender Vulnerability Management** as part of an [integration with Microsoft Defender for Endpoint](integration-defender-for-endpoint.md), Defender for Cloud shows a unified and consolidated view that optimizes coverage and freshness.
2828

29-
- Machines covered by just one of the sources (Defender Vulnerability Management or agentless) show the results from that source.
30-
- Machines covered by both sources show the agent-based results only for increased freshness.
29+
- Machines covered by just one of the sources (Defender Vulnerability Management or agentless) show the results from that source.
30+
- Machines covered by both sources show the agent-based results only for increased freshness.
3131

3232
- If you select **Vulnerability assessment with Qualys or BYOL integrations** - Defender for Cloud shows the agent-based results by default. Results from the agentless scan are shown for machines that don't have an agent installed or from machines that aren't reporting findings correctly.
3333

@@ -68,17 +68,17 @@ If you have Defender for Servers P2 already enabled and agentless scanning is tu
6868
When you enable agentless scanning on either plan, the setting applies to both plans.
6969

7070
1. In the settings pane, turn on **Agentless scanning for machines**.
71-
71+
7272
:::image type="content" source="media/enable-vulnerability-assessment-agentless/agentless-scan-on-aws.png" alt-text="Screenshot of the agentless scanning status for AWS accounts." lightbox="media/enable-vulnerability-assessment-agentless/agentless-scan-on-aws.png":::
7373

7474
1. Select **Save and Next: Configure Access**.
7575

7676
1. Download the CloudFormation template.
77-
77+
7878
1. Using the downloaded CloudFormation template, create the stack in AWS as instructed on screen. If you're onboarding a management account, you need to run the CloudFormation template both as Stack and as StackSet. Connectors will be created for the member accounts up to 24 hours after the onboarding.
79-
79+
8080
1. Select **Next: Review and generate**.
81-
81+
8282
1. Select **Update**.
8383

8484
After you enable agentless scanning, software inventory and vulnerability information are updated automatically in Defender for Cloud.

0 commit comments

Comments
 (0)