Skip to content

Commit 68085b5

Browse files
authored
Merge pull request #134607 from memildin/asc-melvyn-workflowautomation
VM VA BYOL options in the UI changed
2 parents 6c8cfee + ecb88ab commit 68085b5

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/security-center/deploy-vulnerability-assessment-byol-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Supported solutions report vulnerability data to the partner's management platfo
6363
6464
:::image type="content" source="./media/deploy-vulnerability-assessment-vm/recommendation-remediation-options.png" alt-text="The options for which type of remediation flow you want to choose when responding to the recommendation **A vulnerability assessment solution should be enabled on your virtual machines** recommendation page":::
6565

66-
1. If you're setting up a new BYOL configuration, select **Configure a new third-party vulnerability scanner**, select **Proceed**, and enter the details from the provider as follows:
66+
1. If you're setting up a new BYOL configuration, select **Configure a new third-party vulnerability scanner**, select the relevant extension, select **Proceed**, and enter the details from the provider as follows:
6767

6868
1. For **Resource group**, select **Use existing**.
6969
1. For **Location**, select where the solution is geographically located.
@@ -73,7 +73,7 @@ Supported solutions report vulnerability data to the partner's management platfo
7373
1. To automatically install this vulnerability assessment agent on all discovered VMs in the subscription of this solution, select **Auto deploy**.
7474
1. Select **OK**.
7575

76-
1. If you've already set up your BYOL solution, select **Deploy your configured third-party vulnerability scanner**, and **Proceed**.
76+
1. If you've already set up your BYOL solution, select **Deploy your configured third-party vulnerability scanner**, select the relevant extension, and select **Proceed**.
7777

7878
After the vulnerability assessment solution is installed on the target machines, Security Center performs a scan to detect and identify vulnerabilities in the system and application. It might take a couple of hours for the first scan to complete. After that, it runs hourly.
7979

14 KB
Loading

0 commit comments

Comments
 (0)