Skip to content

Commit 6fabb6c

Browse files
Merge pull request #277257 from ElazarK/WI259221-update-prereqs
updated prereqs
2 parents 71c276c + ff9fe86 commit 6fabb6c

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/defender-for-cloud/how-to-manage-attack-path.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ author: Elazark
44
ms.author: elkrieger
55
description: Learn how to identify and remediate attack paths in Microsoft Defender for Cloud and enhance the security of your environment.
66
ms.topic: how-to
7-
ms.date: 03/05/2024
7+
ms.date: 06/05/2024
88
#customer intent: As a security analyst, I want to learn how to identify and remediate attack paths in Microsoft Defender for Cloud so that I can enhance the security of my environment.
99
---
1010

@@ -18,9 +18,9 @@ By default attack paths are organized by their risk level. The risk level is det
1818

1919
## Prerequisites
2020

21-
You must [enable Defender Cloud Security Posture Management (CSPM)](enable-enhanced-security.md) and have [agentless scanning](enable-vulnerability-assessment-agentless.md) enabled.
21+
- You must [enable Defender Cloud Security Posture Management (CSPM)](enable-enhanced-security.md) and have [agentless scanning](enable-vulnerability-assessment-agentless.md) enabled.
2222

23-
- You must enable [Defender for Server P1 (which includes MDVM)](defender-for-servers-introduction.md) or [Defender for Server P2 (which includes MDVM and Qualys)](defender-for-servers-introduction.md).
23+
- **Required roles and permissions**: Security Reader, Security Admin, Reader, Contributor or Owner.
2424

2525
**To view attack paths that are related to containers**:
2626

0 commit comments

Comments
 (0)