You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secret-scanning.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -151,13 +151,13 @@ Agentless secrets scanning for GCP VM instances supports the following attack pa
151
151
152
152
## Remediate secrets with recommendations
153
153
154
-
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the Remediate vulnerabilities security control on the Recommendations page. Depending on your resources, either one or more of the following recommendations appear:
154
+
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the Remediate vulnerabilities security control on the Recommendations page. Depending on your resources, either one or more of the following recommendations appears:
155
155
156
-
-**Azure resources**: `Machines should have secret findings resolved`
156
+
-**Azure resources**: `Machines should have secrets findings resolved`
157
157
158
-
-**AWS resources**: `EC2 instances should have secret findings resolved`
158
+
-**AWS resources**: `EC2 instances should have secrets findings resolved`
159
159
160
-
-**GCP resources**: `VM instances should have secret findings resolved`
160
+
-**GCP resources**: `VM instances should have secrets findings resolved`
161
161
162
162
**To remediate secrets from the recommendations page**:
163
163
@@ -169,9 +169,9 @@ If a secret is found on your resource, that resource triggers an affiliated reco
169
169
170
170
1. Select one of the following:
171
171
172
-
-**Azure resources**: `Machines should have secret findings resolved`
173
-
-**AWS resources**: `EC2 instances should have secret findings resolved`
174
-
-**GCP resources**: `VM instances should have secret findings resolved`
172
+
-**Azure resources**: `Machines should have secrets findings resolved`
173
+
-**AWS resources**: `EC2 instances should have secrets findings resolved`
174
+
-**GCP resources**: `VM instances should have secrets findings resolved`
175
175
176
176
:::image type="content" source="media/secret-scanning/recommendation-findings.png" alt-text="Screenshot that shows either of the two results under the Remediate vulnerabilities security control." lightbox="media/secret-scanning/recommendation-findings.png":::
0 commit comments