Skip to content

Commit 42efe63

Browse files
authored
Apply suggestions from code review
Implement various Acrolinx and related suggestions to accomplish quick publish timeline.
1 parent 585a3c8 commit 42efe63

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/defender-for-cloud/concept-data-security-posture-prepare.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Support and prerequisites for data-aware security posture - Microsoft Defender for Cloud
3-
description: Learn about the requirements for data-aware security posture
3+
description: Learn about the requirements for data-aware security posture in Microsoft Defender for Cloud
44
author: bmansheim
55
ms.author: benmansheim
66
ms.service: defender-for-cloud
@@ -49,7 +49,7 @@ What's the cost? | The feature is included with the Defender CSPM and Defender f
4949
## Configuring data sensitivity settings
5050

5151
The main steps for configuring data sensitivity setting include:
52-
- [Import custom sensitive info types/labels from Microsoft Microsoft Purview compliance portal](data-sensitivity-settings.md#import-custom-sensitive-info-typeslabels-from-microsoft-purview-compliance-portal)
52+
- [Import custom sensitive info types/labels from Microsoft Purview compliance portal](data-sensitivity-settings.md#import-custom-sensitive-info-typeslabels-from-microsoft-purview-compliance-portal)
5353
- [Customize sensitive data categories/types](data-sensitivity-settings.md#customize-sensitive-data-categoriestypes)
5454
- [Set the threshold for sensitivity labels](data-sensitivity-settings.md#set-the-threshold-for-sensitive-data-labels)
5555

articles/defender-for-cloud/data-security-review-risks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ View predefined attack paths to discover data breach risks, and get remediation
2424
1. In Defender for Cloud, open **Recommendations** > **Attack paths**.
2525
1. In **Risk category filter**, select **Data exposure** or **Sensitive data exposure** to filter the data-related attack paths.
2626

27-
:::image type="content" source="./media/data-security-review-risks/attack-paths.png" alt-text="Attack paths for data risk.":::
27+
:::image type="content" source="./media/data-security-review-risks/attack-paths.png" alt-text="Screenshot that shows attack paths for data risk.":::
2828

2929
1. Review the data attack paths.
3030
1. To view sensitive information detected in data resources, select the resource name > **Insights**. Then, expand the **Contain sensitive data** insight.
@@ -47,7 +47,7 @@ Explore data risks and exposure in cloud security graph insights using a query t
4747
1. In Defender for Cloud, open **Cloud Security Explorer**.
4848
1. Select a query template, or build your own query. Here's an example:
4949

50-
:::image type="content" source="./media/data-security-review-risks/query.png" alt-text="Insights data query.":::
50+
:::image type="content" source="./media/data-security-review-risks/query.png" alt-text="Screenshot that shows an Insights data query.":::
5151

5252
## Explore sensitive data security alerts
5353

0 commit comments

Comments
 (0)