Skip to content

Commit 73629f9

Browse files
committed
Fixed a broken link and other minor linguistic fixes
1 parent 758e364 commit 73629f9

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/security-center/built-in-vulnerability-assessment.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: memildin
1717

1818
# Integrated vulnerability scanner for virtual machines (Standard tier only)
1919

20-
The vulnerability scanner included with Azure Security Center is powered by Qualys and widely recognized as the leading tool for identifying vulnerabilities in real time across your Azure Virtual Machines. It is only available to users on the Standard pricing tier. This feature is currently in preview.
20+
The vulnerability scanner included with Azure Security Center is powered by Qualys and widely recognized as the leading tool for identifying vulnerabilities in real time across your Azure Virtual Machines. It's only available to users on the standard pricing tier. This feature is currently in preview.
2121

2222
> [!NOTE]
2323
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md).
@@ -41,7 +41,7 @@ To deploy the vulnerability scanner extension:
4141
Your VMs will appear in one or more of the following groups:
4242
* **Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
4343
* **Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
44-
* **Not applicable resources** – These can’t have the vulnerability scanner extension deployed. This could be because they are on the free pricing tier, or the OS isn’t supported.
44+
* **Not applicable resources** – These VMs can’t have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, or running an unsupported OS.
4545

4646
1. From the Unhealthy resources tab, select the VMs on which you want to deploy the Qualys scanner and click **Remediate**.
4747

@@ -92,7 +92,7 @@ To see the findings and remediate the identified vulnerability:
9292
## Built-in Qualys vulnerability scanner FAQ
9393

9494
### Are there any additional charges for the Qualys license?
95-
No. The built-in scanner is free to all Standard tier users. No additional licenses are required and the scanner that the "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)" recommendation deploys includes all the necessary licensing and configuration information.
95+
No. The built-in scanner is free to all Standard tier users. The "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)" recommendation deploys a scanner that includes all the necessary licensing and configuration information. No additional licenses are required.
9696

9797
### If I have an existing Qualys solution, can I add the Azure Security Center extension as well?
9898
If you've already configured some of your virtual machines to use a pre-existing Qualys license, Security Center will identify that the solution is deployed. You won't see a recommendation to install the Security Center extension. You can choose to leave your existing solution in place while simultaneously deploying the new Security Center extension to other virtual machines. Or you can remove your existing Qualys scanner and add the Security Center extension as described above.
@@ -122,7 +122,7 @@ Some updates to the vulnerability scanner extension may require manual deploymen
122122

123123
1. Verify the version of the Qualys vulnerability scanner extension running on your VM:
124124

125-
1. From the Azure Portal, open Virtual machines.
125+
1. From the Azure portal, open Virtual machines.
126126
1. Select the VM on which the agent is installed.
127127
1. From the sidebar navigation, open **Extensions** and select the following extension:
128128

@@ -134,14 +134,16 @@ Some updates to the vulnerability scanner extension may require manual deploymen
134134

135135
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the Extensions page of the VM.
136136

137-
1. Restart the VM and, when its status is "Running", deploy the vulnerability scanner extension using the recommendation "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys) (Preview)" as described above in (Deploying the Qualys built-in vulnerability scanner)[#deploying-the-qualys-built-in-vulnerability-scanner-standard-tier-only].
137+
1. Restart the VM.
138+
139+
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner-standard-tier-only).
138140

139141

140142
### What is scanned by the built-in vulnerability scanner?
141143
The scanner is running on your virtual machine and looking for vulnerabilities of the VM itself. From the virtual machine, it cannot scan your network.
142144

143145
### Does the scanner integrate with my existing Qualys console?
144-
The Security Center extension is a separate tool from your existing Qualys scanner and, due to licensing restrictions, can only be used within Azure Security Center.
146+
The Security Center extension is a separate tool from your existing Qualys scanner and, because of licensing restrictions, can only be used within Azure Security Center.
145147

146148
### Microsoft Defender Advanced Threat Protection also includes Threat & Vulnerability Management (TVM). How is the Security Center Vulnerability Assessment extension different?
147149
Microsoft is actively developing world-class vulnerability management with Microsoft Defender ATP’s Threat & Vulnerability Management solution, built into Windows.

0 commit comments

Comments
 (0)