Skip to content

Commit 907cdc2

Browse files
authored
Remove the feature capability section from secret scanning docs
1 parent cabd22b commit 907cdc2

File tree

1 file changed

+0
-13
lines changed

1 file changed

+0
-13
lines changed

articles/defender-for-cloud/secret-scanning.md

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -39,19 +39,6 @@ In addition to detecting SSH private keys, the agentless scanner verifies whethe
3939

4040
For requirements for agentless scanning, see [Learn about agentless scanning](concept-agentless-data-collection.md#availability).
4141

42-
## Feature capability
43-
44-
You must enable [Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features) and [Defender CSPM](concept-cloud-security-posture-management.md) to gain access to all of the agentless secret scanning capabilities.
45-
46-
If you only enable one of the two plans, you gain only part of the available features of the agentless secret scanning capabilities. The following table shows which plans enable which features:
47-
48-
| Plan Feature | Defender for servers plan 2 | Defender CSPM |
49-
|--|--|--|
50-
| [Attack path](#remediate-secrets-with-attack-path) | No | Yes |
51-
| [Cloud security explorer](#remediate-secrets-with-cloud-security-explorer) | Yes | Yes |
52-
| [Recommendations](#remediate-secrets-with-recommendations) | Yes | Yes |
53-
| [Asset Inventory](#remediate-secrets-from-your-asset-inventory) - Secrets | Yes | No |
54-
5542
## Remediate secrets with attack path
5643

5744
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). These scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack path analysis exposes attack paths and suggests recommendations as to how best remediate issues that break the attack path and prevent successful breach.

0 commit comments

Comments
 (0)