Skip to content

Commit 84f5ab7

Browse files
committed
Minor tweaks
1 parent c437644 commit 84f5ab7

8 files changed

+11
-11
lines changed

articles/security-center/asset-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ As soon as you've applied filters, the summary values are updated to relate to t
6868
> [!TIP]
6969
> The KQL documentation provides a database with some sample data together with some simple queries to get the "feel" for the language. [Learn more in this KQL tutorial](/azure/data-explorer/kusto/query/tutorial?pivots=azuredataexplorer).
7070
71-
**Asset management options** - Inventory lets you perform complex discovery queries. When you've found the resources that match your queries, inventory provides shortcuts for operations such as:
71+
**Asset management options** - When you've found the resources that match your queries, inventory provides shortcuts for operations such as:
7272

7373
- Assign tags to the filtered resources - select the checkboxes alongside the resources you want to tag.
7474
- Onboard new servers to Defender for Cloud - use the **Add non-Azure servers** toolbar button.

articles/security-center/configure-email-notifications.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,17 +5,17 @@ author: memildin
55
manager: rkarlin
66
ms.service: security-center
77
ms.topic: quickstart
8-
ms.date: 10/20/2021
8+
ms.date: 11/09/2021
99
ms.author: memildin
1010

1111
---
1212
# Configure email notifications for security alerts
1313

1414
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
1515

16-
Security alerts need to reach the right people in your organization. By default, Defender for Cloud emails subscription owners whenever a high-severity alert is triggered for their subscription. This page explains how to customize these notifications.
16+
Security alerts need to reach the right people in your organization. By default, Microsoft Defender for Cloud emails subscription owners whenever a high-severity alert is triggered for their subscription. This page explains how to customize these notifications.
1717

18-
To define your own preferences for notification emails, Microsoft Defender for Cloud's **Email notifications** settings page lets you choose:
18+
Use Defender for Cloud's **Email notifications** settings page to define preferences for notification emails including:
1919

2020
- ***who* should be notified** - Emails can be sent to select individuals or to anyone with a specified Azure role for a subscription.
2121
- ***what* they should be notified about** - Modify the severity levels for which Defender for Cloud should send out notifications.
@@ -81,4 +81,4 @@ To learn more about security alerts, see the following pages:
8181

8282
- [Security alerts - a reference guide](alerts-reference.md)--Learn about the security alerts you might see in Microsoft Defender for Cloud's Threat Protection module
8383
- [Manage and respond to security alerts in Microsoft Defender for Cloud](managing-and-responding-alerts.md)--Learn how to manage and respond to security alerts
84-
- [Workflow automation](workflow-automation.md)--Automate responses to alerts with custom notification logic
84+
- [Workflow automation](workflow-automation.md)--Automate responses to alerts with custom notification logic

articles/security-center/continuous-export.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.author: memildin
1515

1616
Microsoft Defender for Cloud generates detailed security alerts and recommendations. You can view them in the portal or through programmatic tools. You might also need to export some or all of this information for tracking with other monitoring tools in your environment.
1717

18-
**Continuous export** lets you fully customize *what* will be exported, and *where* it will go. For example, you can configure it so that:
18+
You fully customize *what* will be exported, and *where* it will go with **continuous export**. For example, you can configure it so that:
1919

2020
- All high severity alerts are sent to an Azure Event Hub
2121
- All medium or higher severity findings from vulnerability assessment scans of your SQL servers are sent to a specific Log Analytics workspace

articles/security-center/custom-dashboards-azure-workbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ This workbook gathers these findings and organizes them by severity, resource ty
114114

115115
Microsoft Defender for Cloud continually compares the configuration of your resources with requirements in industry standards, regulations, and benchmarks. Built-in standards include NIST SP 800-53, SWIFT CSP CSCF v2020, Canada Federal PBMM, HIPAA HITRUST, and more. You can select the specific standards relevant to your organization using the regulatory compliance dashboard. Learn more in [Customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
116116

117-
This workbook lets you track your compliance status over time with the various standards you've added to your dashboard.
117+
This workbook tracks your compliance status over time with the various standards you've added to your dashboard.
118118

119119
:::image type="content" source="media/custom-dashboards-azure-workbooks/compliance-over-time-select-standards.png" alt-text="Select the standards for your compliance over time report.":::
120120

articles/security-center/defender-for-sql-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Microsoft Defender for SQL includes two Microsoft Defender plans that extend Mic
2323
|----|:----|
2424
|Release state:|**Microsoft Defender for Azure SQL database servers** - Generally available (GA)<br>**Microsoft Defender for SQL servers on machines** - Generally available (GA) |
2525
|Pricing:|The two plans that form **Microsoft Defender for SQL** are billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/security-center/)|
26-
|Protected SQL versions:|[SQL on Azure virtual machines](../azure-sql/virtual-machines/windows/sql-server-on-azure-vm-iaas-what-is-overview.md)<br>[Azure Arc-enabled SQL servers](/sql/sql-server/azure-arc/overview)<br>On-premises SQL servers on Windows machines without Azure Arc<br>Azure SQL [single databases](../azure-sql/database/single-database-overview.md) and [elastic pools](../azure-sql/database/elastic-pool-overview.md)<br>[Azure SQL Managed Instance](../azure-sql/managed-instance/sql-managed-instance-paas-overview.md)<br>[Azure Synapse Analytics (formerly SQL DW) dedicated SQL pool](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md)|
26+
|Protected SQL versions:|[SQL on Azure virtual machines](../azure-sql/virtual-machines/windows/sql-server-on-azure-vm-iaas-what-is-overview.md)<br>[SQL Server on Azure Arc-enabled servers](/sql/sql-server/azure-arc/overview)<br>On-premises SQL servers on Windows machines without Azure Arc<br>Azure SQL [single databases](../azure-sql/database/single-database-overview.md) and [elastic pools](../azure-sql/database/elastic-pool-overview.md)<br>[Azure SQL Managed Instance](../azure-sql/managed-instance/sql-managed-instance-paas-overview.md)<br>[Azure Synapse Analytics (formerly SQL DW) dedicated SQL pool](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md)|
2727
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure China 21Vianet (**Partial**: Subset of alerts and vulnerability assessment for SQL servers. Behavioral threat protections aren't available.)|
2828
|||
2929

articles/security-center/defender-for-sql-on-machines-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.date: 09/14/2021
1717

1818
- [SQL Server on Virtual Machines](https://azure.microsoft.com/services/virtual-machines/sql-server/)
1919
- On-premises SQL servers:
20-
- [Azure Arc-enabled SQL Server (preview)](/sql/sql-server/azure-arc/overview)
20+
- [SQL Server on Azure Arc-enabled servers](/sql/sql-server/azure-arc/overview)
2121
- [SQL Server running on Windows machines without Azure Arc](../azure-monitor/agents/agent-windows.md)
2222

2323
The integrated [vulnerability assessment scanner](../azure-sql/database/sql-vulnerability-assessment.md) discovers, tracks, and helps you remediate potential database vulnerabilities. Assessment scans findings provide an overview of your SQL machines' security state, and details of any security findings.

articles/security-center/file-integrity-monitoring-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ The **Changes** tab (shown below) lists all changes for the workspace during the
192192
- File content
193193
- Windows services
194194

195-
Each tab lists the entities that you can edit in that category. For each entity listed, Defender for Cloud identifies whether FIM is enabled (true) or not enabled (false). Editing the entity lets you enable or disable FIM.
195+
Each tab lists the entities that you can edit in that category. For each entity listed, Defender for Cloud identifies whether FIM is enabled (true) or not enabled (false). Edit the entity to enable or disable FIM.
196196

197197
:::image type="content" source="./media/file-integrity-monitoring-overview/file-integrity-monitoring-workspace-configuration.png" alt-text="Workspace configuration for file integrity monitoring in Microsoft Defender for Cloud.":::
198198

articles/security-center/update-regulatory-compliance-packages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ To add standards to your dashboard:
9696

9797
## Remove a standard from your dashboard
9898

99-
If any of the supplied regulatory standards isn't relevant to your organization, it's a simple process to remove them from the UI. This lets you further customize the regulatory compliance dashboard, and focus only on the standards that are applicable to you.
99+
You can continue to customize the regulatory compliance dashboard, to focus only on the standards that are applicable to you, by removing any of the supplied regulatory standards that aren't relevant to your organization.
100100

101101
To remove a standard:
102102

0 commit comments

Comments
 (0)