Skip to content

Commit 6643c0e

Browse files
author
David Curwin
committed
Fix formatting
1 parent f881428 commit 6643c0e

6 files changed

+7
-17
lines changed

articles/defender-for-cloud/tutorial-enable-databases-plan.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,4 +85,3 @@ These plans protect all of the supported databases in your subscription.
8585
- [Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md)
8686
- [Overview of Microsoft Defender for open-source relational databases](defender-for-databases-introduction.md)
8787
- [Overview of Microsoft Defender for Azure Cosmos DB](concept-defender-for-cosmos.md)
88-

articles/defender-for-cloud/tutorial-enable-resource-manager-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,6 @@ Microsoft Defender for Resource Manager automatically monitors the resource mana
4141

4242
1. Select **Save**.
4343

44-
## Next steps
44+
## Next step
4545

4646
[Overview of Microsoft Defender for Resource Manager](defender-for-resource-manager-introduction.md)

articles/defender-for-cloud/tutorial-enable-storage-plan.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Microsoft Defender for Storage is an Azure-native solution offering an advanced
1111

1212
With Microsoft Defender for Storage, organizations can customize their protection and enforce consistent security policies by enabling it on subscriptions and storage accounts with granular control and flexibility.
1313

14-
> [!TIP]
14+
> [!TIP]
1515
> If you're currently using Microsoft Defender for Storage classic, consider [migrating to the new plan](defender-for-storage-classic-migrate.md), which offers several benefits over the classic plan.
1616
1717
## Availability
@@ -26,6 +26,7 @@ With Microsoft Defender for Storage, organizations can customize their protectio
2626
*Azure DNS Zone is not supported for malware scanning and sensitive data threat detection.
2727

2828
## Prerequisites for malware scanning
29+
2930
To enable and configure malware scanning, you must have Owner roles (such as Subscription Owner or Storage Account Owner) or specific roles with the necessary data actions. Learn more about the [required permissions](support-matrix-defender-for-storage.md).
3031

3132
## Set up and configure Microsoft Defender for Storage
@@ -53,6 +54,3 @@ Enabling Defender for Storage via a policy is recommended because it facilitates
5354
## Next steps
5455

5556
- Learn how to [enable and Configure the Defender for Storage plan at scale with an Azure built-in policy](defender-for-storage-policy-enablement.md).
56-
57-
58-

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,6 @@ In February 2021, the deprecation of the MSCA task was communicated to all custo
5757

5858
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and additional security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
5959

60-
6160
## Update recommendations to align with Azure AI Services resources
6261

6362
**Announcement date: February 20, 2024**
@@ -97,7 +96,6 @@ Customers that are still using the API version **2022-09-01-preview** under `Mic
9796

9897
Customers currently using Defender for Cloud DevOps security from Azure portal won't be impacted.
9998

100-
10199
For details on the new API version, see [Microsoft Defender for Cloud REST APIs](/rest/api/defenderforcloud/operation-groups).
102100

103101
## Changes in endpoint protection recommendations

articles/defender-for-cloud/update-regulatory-compliance-packages.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ ms.custom: ignite-2023
88

99
# Assign security standards
1010

11-
1211
Defender for Cloud's regulatory standards and benchmarks are represented as [security standards](security-policy-concept.md). Each standard is an initiative defined in Azure Policy.
1312

1413
In Defender for Cloud, you assign security standards to specific scopes such as Azure subscriptions, AWS accounts, and GCP projects that have Defender for Cloud enabled.

articles/defender-for-cloud/workflow-automation.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,10 @@ This article describes the workflow automation feature of Microsoft Defender for
1818
- You must also have write permissions for the target resource.
1919
- To work with Azure Logic Apps workflows, you must also have the following Logic Apps roles/permissions:
2020

21-
- [Logic App Operator](../role-based-access-control/built-in-roles.md#logic-app-operator) permissions are required or Logic App read/trigger access (this role can't create or edit logic apps; only *run* existing ones)
22-
- [Logic App Contributor](../role-based-access-control/built-in-roles.md#logic-app-contributor) permissions are required for logic app creation and modification.
23-
24-
- If you want to use Logic Apps connectors, you might need other credentials to sign in to their respective services (for example, your Outlook/Teams/Slack instances).
21+
- [Logic App Operator](../role-based-access-control/built-in-roles.md#logic-app-operator) permissions are required or Logic App read/trigger access (this role can't create or edit logic apps; only *run* existing ones)
22+
- [Logic App Contributor](../role-based-access-control/built-in-roles.md#logic-app-contributor) permissions are required for logic app creation and modification.
2523

24+
- If you want to use Logic Apps connectors, you might need other credentials to sign in to their respective services (for example, your Outlook/Teams/Slack instances).
2625

2726
## Create a logic app and define when it should automatically run
2827

@@ -79,7 +78,6 @@ The logic app designer supports the following Defender for Cloud triggers:
7978
> [!NOTE]
8079
> If you are using the legacy trigger "When a response to a Microsoft Defender for Cloud alert is triggered", your logic apps will not be launched by the Workflow Automation feature. Instead, use either of the triggers mentioned above.
8180
82-
8381
1. After you've defined your logic app, return to the workflow automation definition pane ("Add workflow automation").
8482
1. Select **Refresh** to ensure your new logic app is available for selection.
8583
1. Select your logic app and save the automation. The logic app dropdown only shows those with supporting Defender for Cloud connectors mentioned above.
@@ -92,7 +90,7 @@ To manually run a logic app, open an alert, or a recommendation and select **Tri
9290

9391
[![Manually trigger a logic app.](media/workflow-automation/manually-trigger-logic-app.png)](media/workflow-automation/manually-trigger-logic-app.png#lightbox)
9492

95-
## Configure workflow automation at scale
93+
## Configure workflow automation at scale
9694

9795
Automating your organization's monitoring and incident response processes can greatly improve the time it takes to investigate and mitigate security incidents.
9896

@@ -110,9 +108,7 @@ To implement these policies:
110108
|Workflow automation for security recommendations |[Deploy Workflow Automation for Microsoft Defender for Cloud recommendations](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F73d6ab6c-2475-4850-afd6-43795f3492ef)|73d6ab6c-2475-4850-afd6-43795f3492ef|
111109
|Workflow automation for regulatory compliance changes|[Deploy Workflow Automation for Microsoft Defender for Cloud regulatory compliance](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F509122b9-ddd9-47ba-a5f1-d0dac20be63c)|509122b9-ddd9-47ba-a5f1-d0dac20be63c|
112110

113-
114111
You can also find these by searching Azure Policy. In Azure Policy, select **Definitions** and search for them by name.
115-
116112

117113
1. From the relevant Azure Policy page, select **Assign**.
118114
:::image type="content" source="./media/workflow-automation/export-policy-assign.png" alt-text="Assigning the Azure Policy.":::

0 commit comments

Comments
 (0)