Skip to content

Commit 411ed15

Browse files
Acrolinx check and corrections
Acrolinx check and corrections
1 parent a4a5405 commit 411ed15

File tree

3 files changed

+4
-3
lines changed

3 files changed

+4
-3
lines changed

articles/defender-for-cloud/auto-deploy-azure-monitoring-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,15 +109,15 @@ The required [Log Analytics workspace solutions](../azure-monitor/insights/solut
109109

110110
### Additional extensions for Defender for Cloud
111111

112-
The Azure Monitor Agent requires additional extensions. The ASA extension, which supports endpoint protection recommendations, fileless attack detection, and Adaptive Application controls, is automatically installed when you auto-provision the Azure Monitor Agent.
112+
The Azure Monitor Agent requires more extensions. The ASA extension, which supports endpoint protection recommendations, fileless attack detection, and Adaptive Application controls, is automatically installed when you auto-provision the Azure Monitor Agent.
113113

114114
### Additional security events collection
115115

116116
When you auto-provision the Log Analytics agent in Defender for Cloud, you can choose to collect additional security events to the workspace. When you auto-provision the Azure Monitor agent in Defender for Cloud, the option to collect additional security events to the workspace isn't available. Defender for Cloud doesn't rely on these security events, but they can be helpful for investigations through Microsoft Sentinel.
117117

118118
If you want to collect security events when you auto-provision the Azure Monitor Agent, you can create a [Data Collection Rule](../azure-monitor/essentials/data-collection-rule-overview.md) to collect the required events.
119119

120-
Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500-MB of free data](enhanced-security-features-overview.md#faq---pricing-and-billing) daily on defined data types that include security events.
120+
Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500 MB of free data](enhanced-security-features-overview.md#faq---pricing-and-billing) daily on defined data types that include security events.
121121

122122
## Next steps
123123

articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ To assess your machines for vulnerabilities, you can use one of the following so
1616

1717
- Microsoft's threat and vulnerability management module of Microsoft Defender for Endpoint (included with Microsoft Defender for Servers)
1818
- An integrated Qualys agent (included with Microsoft Defender for Servers)
19-
- A Qualys or Rapid7 scanner which you have licensed separately and configured within Defender for Cloud (this is called the Bring Your Own License, or BYOL, scenario)
19+
- A Qualys or Rapid7 scanner that you've licensed separately and configured within Defender for Cloud (this scenario is called the Bring Your Own License, or BYOL, scenario)
2020

2121
> [!NOTE]
2222
> To automatically configure a BYOL solution, see [Integrate security solutions in Microsoft Defender for Cloud](partner-integration.md).
@@ -28,6 +28,7 @@ To assess your machines for vulnerabilities, you can use one of the following so
2828
1. In the Monitoring coverage column of the Defender for Servers plan, select **Settings**.
2929
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-server-setting.png" alt-text="screenshot showing selecting service plan settings for server." lightbox="media/auto-deploy-azure-monitoring-agent/select-server-setting.png":::
3030
1. Turn on the vulnerability assessment for machines and select the relevant solution.
31+
:::image type="content" source="media/auto-deploy-vulnerability-assessment/turn-on-deploy-va.png" alt-text="Screenshot showing where to turn on deployment of vulnerability assessment for machines." lightbox="media/auto-deploy-vulnerability-assessment/turn-on-deploy-va.png":::
3132

3233
> [!TIP]
3334
> Defender for Cloud enables the following policy: [(Preview) Configure machines to receive a vulnerability assessment provider](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f13ce0167-8ca6-4048-8e6b-f996402e3c1b).
79.8 KB
Loading

0 commit comments

Comments
 (0)