Skip to content

Commit 84c6042

Browse files
author
David Curwin
committed
Fix formatting
1 parent 023502a commit 84c6042

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/defender-for-cloud/assign-access-to-workload.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Permissions for security connectors are managed through Azure role-based access
3232

3333
1. Assign permissions to the workload owners with All resources or the Azure Resource Graph option in the Azure portal.
3434

35-
### [All resources](#tab/all-resources)
35+
### [All resources](#tab/all-resources)
3636

3737
1. Search for and select **All resources**.
3838

@@ -52,15 +52,15 @@ Permissions for security connectors are managed through Azure role-based access
5252

5353
1. Select the relevant resource connector.
5454

55-
### [Azure Resource Graph](#tab/azure-resource-graph)
55+
### [Azure Resource Graph](#tab/azure-resource-graph)
5656

5757
1. Search for and select **Resource Graph Explorer**.
5858

5959
:::image type="content" source="media/assign-access-to-workload/resource-graph-explorer.png" alt-text="Screenshot that shows you how to search for and select resource graph explorer." lightbox="media/assign-access-to-workload/resource-graph-explorer.png":::
6060

6161
1. Copy and paste the following query to locate the security connector:
6262

63-
### [AWS](#tab/aws)
63+
### [AWS](#tab/aws)
6464

6565
```bash
6666
resources
@@ -70,7 +70,7 @@ Permissions for security connectors are managed through Azure role-based access
7070
| project name, subscriptionId, resourceGroup, accountId = properties.hierarchyIdentifier, cloud = properties.environmentName 
7171
```
7272

73-
### [GCP](#tab/gcp)
73+
### [GCP](#tab/gcp)
7474

7575
```bash
7676
resources

0 commit comments

Comments
 (0)