You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,11 +63,11 @@ Agentless vulnerability scanning is available in both Defender Cloud Security Po
63
63
64
64
### Defender for DevOps (Preview)
65
65
66
-
Microsoft Defender for Cloud enables comprehensive visibility, posture management, and threat protection across multicloud environments including Azure, AWS, Google, and on-premises resources.
66
+
Microsoft Defender for Cloud enables comprehensive visibility, posture management, and threat protection across hybrid and multicloud environments including Azure, AWS, Google, and on-premises resources.
67
67
68
68
Now, the new Defender for DevOps service integrates source code management systems, like GitHub and Azure DevOps, into Defender for Cloud. With this new integration we are empowering security teams to protect their resources from code to cloud.
69
69
70
-
Defender for DevOps allows you to gain visibility into and manage your connected developer environments and code resources. Currently, you can connect [Azure DevOps](quickstart-onboard-devops.md) and [GitHub](quickstart-onboard-github.md) systems to Defender for Cloud and onboard DevOps repositories to Inventory and the new DevOps Security page. It provides security teams with a highlevel overview of the discovered security issues that exist within them in a unified DevOps Security page.
70
+
Defender for DevOps allows you to gain visibility into and manage your connected developer environments and code resources. Currently, you can connect [Azure DevOps](quickstart-onboard-devops.md) and [GitHub](quickstart-onboard-github.md) systems to Defender for Cloud and onboard DevOps repositories to Inventory and the new DevOps Security page. It provides security teams with a high-level overview of the discovered security issues that exist within them in a unified DevOps Security page.
71
71
72
72
Security teams can configure pull request annotations to help developers address secret scanning findings in Azure DevOps directly on their pull requests.
73
73
@@ -150,7 +150,7 @@ We are announcing the addition of the new Defender Cloud Security Posture Manage
150
150
- Attack path analysis
151
151
- Agentless scanning for machines
152
152
153
-
You can learn more about the [Defender Cloud Security Posture Management (CSPM) plan](concept-cloud-security-posture-management.md).
153
+
Larn more about the [Defender Cloud Security Posture Management (CSPM) plan](concept-cloud-security-posture-management.md).
154
154
155
155
### MITRE ATT&CK framework mapping is now available also for AWS and GCP security recommendations
156
156
@@ -335,7 +335,7 @@ Note, if you're using the preview version, the `AKS-AzureDefender` feature flag
335
335
336
336
Defender for Container's vulnerability assessment (VA) is able to detect vulnerabilities in OS packages deployed via the OS package manager. We have now extended VA's abilities to detect vulnerabilities included in language specific packages.
337
337
338
-
This feature is in `preview` and is only available for Linux images.
338
+
This feature is in preview and is only available for Linux images.
339
339
340
340
To see all of the included language specific packages that have been added, check out Defender for Container's full list of [features and their availability](supported-machines-endpoint-solutions-clouds-containers.md#registries-and-images).
341
341
@@ -496,7 +496,7 @@ There are now connector-level settings for Defender for Servers in multicloud.
496
496
497
497
The new connector-level settings provide granularity for pricing and auto-provisioning configuration per connector, independently of the subscription.
498
498
499
-
All auto-provisioning components available in the connectorlevel (Azure Arc, MDE, and vulnerability assessments) are enabled by default, and the new configuration supports both [Plan 1 and Plan 2 pricing tiers](defender-for-servers-introduction.md#defender-for-servers-plans).
499
+
All auto-provisioning components available in the connector-level (Azure Arc, MDE, and vulnerability assessments) are enabled by default, and the new configuration supports both [Plan 1 and Plan 2 pricing tiers](defender-for-servers-introduction.md#defender-for-servers-plans).
500
500
501
501
Updates in the UI include a reflection of the selected pricing tier and the required components configured.
0 commit comments