Skip to content

Commit 5d08c67

Browse files
removed extra line breaks and added "(only supported for REST API)"
1 parent 8d32a3f commit 5d08c67

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

articles/storage/files/storage-files-planning.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -135,14 +135,11 @@ You can back up your Azure file share via [share snapshots](./storage-snapshots-
135135
You can perform both item-level and share-level restores in the Azure portal using Azure Backup. All you need to do is choose the restore point (a particular snapshot), the particular file or directory if relevant, and then the location (original or alternate) you wish you restore to. The backup service handles copying the snapshot data over and shows your restore progress in the portal.
136136

137137
### Protect Azure Files with Microsoft Defender for Storage
138-
139138
Microsoft Defender for Storage is an Azure-native layer of security intelligence that detects potential threats to your storage accounts. It provides comprehensive security by analyzing the data plane and control plane telemetry generated by Azure Files. It uses advanced threat detection capabilities powered by [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) to provide contextual security alerts, including steps to mitigate the detected threats and prevent future attacks.
140139

141-
142140
Defender for Storage continuously analyzes the telemetry stream generated by Azure Files. When potentially malicious activities are detected, security alerts are generated. These alerts are displayed in Microsoft Defender for Cloud, along with the details of the suspicious activity, investigation steps, remediation actions, and security recommendations.
143141

144-
145-
Defender for Storage detects known malware, such as ransomware, viruses, spyware, and other malware uploaded to a storage account based on full blob/file hash. This capability helps prevent malware from entering the organization and spreading to more users and resources. See also the [Limitations of hash reputation analysis](https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-introduction#limitations-of-hash-reputation-analysis).
142+
Defender for Storage detects known malware, such as ransomware, viruses, spyware, and other malware uploaded to a storage account based on full file hash (only supported for REST API). This helps prevent malware from entering the organization and spreading to more users and resources. See also the [Limitations of hash reputation analysis](https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-introduction#limitations-of-hash-reputation-analysis).
146143

147144
Defender for Storage doesn't access the storage account data and doesn't impact its performance. You can [enable Microsoft Defender for Storage](https://learn.microsoft.com/en-us/azure/storage/common/azure-defender-storage-configure) at the subscription level (recommended) or the resource level.
148145

0 commit comments

Comments
 (0)