Skip to content

Commit 3f075d3

Browse files
authored
Moved anchor outside the important note
Was breaking the markdown
1 parent 06051d1 commit 3f075d3

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,14 +123,14 @@ The native cloud connector requires:
123123

124124
(Optional) Select **Management account** to create a connector to a management account. Connectors will be created for each member account discovered under the provided management account. Auto-provisioning will be enabled for all of the newly onboarded accounts.
125125

126-
1. Select **Next: Select plans**.
126+
1. Select **Next: Select plans**.<a name="cloudtrail-implications-note"></a>
127127

128128
> [!NOTE]
129129
> Each plan has its own requirements for permissions, and might incur charges.
130130
131131
:::image type="content" source="media/quickstart-onboard-aws/add-aws-account-plans-selection.png" alt-text="The select plans tab is where you choose which Defender for Cloud capabilities to enable for this AWS account.":::
132132

133-
> [!IMPORTANT]<a name="cloudtrail-implications-note"></a>
133+
> [!IMPORTANT]
134134
> To present the current status of your recommendations, the CSPM plan queries the AWS resource APIs several times a day. These read-only API calls incur no charges, but they *are* registered in CloudTrail if you've enabled a trail for read events. As explained in [the AWS documentation](https://aws.amazon.com/cloudtrail/pricing/), there are no additional charges for keeping one trail. If you're exporting the data out of AWS (for example, to an external SIEM), this increased volume of calls might also increase ingestion costs. In such cases, We recommend filtering out the read-only calls from the Defender for Cloud user or role ARN: `arn:aws:iam::[accountId]:role/CspmMonitorAws` (this is the default role name, confirm the role name configured on your account).
135135
136136
1. By default the **Servers** plan is set to **On**. This is necessary to extend Defender for server's coverage to your AWS EC2. Ensure you've fulfilled the [network requirements for Azure Arc](/azure/azure-arc/servers/network-requirements?tabs=azure-cloud).

0 commit comments

Comments
 (0)