Skip to content

Commit 65e6ff2

Browse files
committed
Update partner-vulnerability-assessment.md
1 parent 9c8e884 commit 65e6ff2

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/security-center/partner-vulnerability-assessment.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ ms.author: memildin
1919

2020
If you're on the standard tier, you're able to use Azure Security Center's built-in vulnerability assessment tool as described in [Integrated vulnerability scanner for virtual machines](built-in-vulnerability-assessment.md). This tool doesn't require a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
2121

22-
Alternatively, you might want to deploy your own privately-licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/). You can install one of these partner solutions on multiple VMs that belong to the same subscription.
22+
Alternatively, you might want to deploy your own privately licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/). You can install one of these partner solutions on multiple VMs that belong to the same subscription.
2323

24-
## Configuring a partner solution (in the Azure Portal)
24+
## Configuring a partner solution (in the Azure portal)
2525

2626
1. On the **Security Center** dashboard, in the **Overview** section, click **Recommendations**.
2727

@@ -63,7 +63,7 @@ Alternatively, you might want to deploy your own privately-licensed vulnerabilit
6363

6464
## Configuring a partner solution (using PowerShell and the REST API)
6565

66-
To programatically deploy your own privately-licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/), use the supplied script [Powershell > Vulnerability Solution](https://github.com/Azure/Azure-Security-Center/tree/master/Powershell%20scripts/Vulnerability%20Solution).
66+
To programatically deploy your own privately licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/), use the supplied script [PowerShell > Vulnerability Solution](https://github.com/Azure/Azure-Security-Center/tree/master/Powershell%20scripts/Vulnerability%20Solution).
6767

6868
This script uses the REST API to create a new Security Solution in ASC. The solution requires a license and a key provided by the service provider: Qualys or Rapid7.
6969

@@ -83,21 +83,21 @@ To run the script, you'll need the relevant information for the parameters below
8383

8484
| **Parameter** | **Required** | **Notes** |
8585
|----|:----:|----|
86-
|SubscriptionId||The subscriptionID of the Azure Subscription that contains the resources you want to analyze.|
87-
|ResourceGroupName||Name of the resource group. Use any existing resource group including the default ("DefaultResourceGroup-xxx"). Since the solution is not an Azure resource, it won't be listed under the resource group, but still it is attached to it.|
88-
|vaSolutionName||The name of the new solution.|
89-
|vaType|-|Qualys or Rapid7.|
90-
|autoUpdate|-|Enable (true) or disable (false) auto deploy for this VA solution. When enabled, every new VM on the subscription will automatically attempt to link to the solution.<br/>(Default: False)|
91-
|licenceCode|-|Vendor provided license string.|
92-
|publicKey|-|Vendor provided public key.|
86+
|**SubscriptionId**||The subscriptionID of the Azure Subscription that contains the resources you want to analyze.|
87+
|**ResourceGroupName**||Name of the resource group. Use any existing resource group including the default ("DefaultResourceGroup-xxx"). Since the solution isn't an Azure resource, it won't be listed under the resource group, but still it is attached to it.|
88+
|**vaSolutionName**||The name of the new solution.|
89+
|**vaType**|-|Qualys or Rapid7.|
90+
|**autoUpdate**|-|Enable (true) or disable (false) auto deploy for this VA solution. When enabled, every new VM on the subscription will automatically attempt to link to the solution.<br/>(Default: False)|
91+
|**licenceCode**|-|Vendor provided license string.|
92+
|**publicKey**|-|Vendor provided public key.|
9393

9494

9595
Syntax:
9696

9797
```
9898
.\New-ASCVASolution.ps1 -subscriptionId <Subscription Id> -resourceGroupName <RG Name>
9999
-vaSolutionName <New solution name> -vaType <Qualys / Rapid7> -autoUpdate <true/false>
100-
-licenceCode <License Code from vendor> -publicKey <Public Key recieved from vendor>
100+
-licenceCode <License Code from vendor> -publicKey <Public Key received from vendor>
101101
```
102102

103103
Example:
@@ -110,7 +110,7 @@ Example:
110110

111111

112112
## Review the recommendation
113-
After the vulnerability assessment solution is installed on the target VM, Security Center scans the VM to detect and identify system and application vulnerabilities.
113+
After the vulnerability assessment solution is installed on the target VM, Security Center scans the VM to detect and identify vulnerabilities in the system and application.
114114

115115
> [!NOTE]
116116
> It might take a couple of hours for the first scan to complete. After that, it is an hourly process.

0 commit comments

Comments
 (0)