Skip to content

Commit 96ace74

Browse files
authored
Update defender-for-sql-on-machines-vulnerability-assessment.md
1 parent f384f01 commit 96ace74

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/security-center/defender-for-sql-on-machines-vulnerability-assessment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: memildin
66
manager: rkarlin
77
ms.service: security-center
88
ms.topic: how-to
9-
ms.date: 03/04/2021
9+
ms.date: 04/09/2021
1010
---
1111

1212
# Using the integrated vulnerability assessment scanner for your SQL servers
@@ -72,7 +72,7 @@ When a finding matches the criteria you've defined in your disable rules, it won
7272
- Disable findings from benchmarks that aren't of interest for a defined scope
7373

7474
> [!IMPORTANT]
75-
> To create a rule, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy).
75+
> To disable specific findings, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy).
7676
7777
To create a rule:
7878

@@ -101,4 +101,4 @@ To create a rule:
101101

102102
## Next steps
103103

104-
Learn more about Security Center's protections for SQL resources in [Introduction to Azure Defender for SQL](defender-for-sql-introduction.md).
104+
Learn more about Security Center's protections for SQL resources in [Introduction to Azure Defender for SQL](defender-for-sql-introduction.md).

0 commit comments

Comments
 (0)