Skip to content

Commit 8d03919

Browse files
authored
Merge pull request #262647 from AlizaBernstein/WI-197136-episode-forty-two
WI-197136-episode-forty-two
2 parents e77bd8f + 205ae40 commit 8d03919

File tree

3 files changed

+41
-2
lines changed

3 files changed

+41
-2
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -956,7 +956,9 @@
956956
- name: Live from Microsoft Ignite 2023
957957
href: episode-forty.md
958958
- name: Native integration with ServiceNow
959-
href: episode-forty-one.md
959+
href: episode-forty-one.md
960+
- name: Agentless secrets scanning for virtual machines
961+
href: episode-forty-two.md
960962
- name: Manage user data
961963
href: privacy.md
962964
- name: Microsoft Defender for IoT documentation

articles/defender-for-cloud/episode-forty-one.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,4 +31,4 @@ ms.date: 01/03/2024
3131
## Next steps
3232

3333
> [!div class="nextstepaction"]
34-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
34+
> [Agentless secrets scanning for virtual machines](episode-forty-two.md)
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
title: Agentless secrets scanning for virtual machines | Defender for Cloud in the field
3+
description: Learn about agentless secrets scanning for virtual machines
4+
ms.topic: reference
5+
ms.date: 01/08/2024
6+
---
7+
8+
# Agentless secrets scanning for virtual machines
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Ortal Parpara joins Yuri Diogenes to talk about agentless secrets scanning for virtual machines in Microsoft Defender for Cloud. Ortal explains the use case scenario for this feature, how the feature works, and the prerequisites for this feature to work. The demonstration shows how the attack path uses this feature to provide more insights about secrets that are located in virtual machines, and how it can be used to detect potential cross-cloud attacks.
11+
12+
> [!VIDEO https://aka.ms/docs/player?id=3eb19963-8988-44eb-8052-e2255616a95e]
13+
14+
- [01:18](/shows/mdc-in-the-field/agentless-secret-scanning-for-virtual-machines#time=01m18s) - Understanding secrets scanning capability for VMs in Defender for Cloud
15+
- [02:40](/shows/mdc-in-the-field/agentless-secret-scanning-for-virtual-machines#time=02m40s) - How agentless scanning for VMs works
16+
- [04:30](/shows/mdc-in-the-field/agentless-secret-scanning-for-virtual-machines#time=04m30s) - Secrets detection
17+
- [06:50](/shows/mdc-in-the-field/agentless-secret-scanning-for-virtual-machines#time=06m50s) - Performance considerations
18+
- [08:32](/shows/mdc-in-the-field/agentless-secret-scanning-for-virtual-machines#time=08m32s) - Demonstration
19+
20+
## Recommended resources
21+
22+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY).
23+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS).
24+
25+
26+
27+
- Follow us on social media:
28+
29+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
30+
- [Twitter](https://twitter.com/msftsecurity)
31+
32+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity).
33+
34+
## Next steps
35+
36+
> [!div class="nextstepaction"]
37+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

0 commit comments

Comments
 (0)