Skip to content

Commit 98c34dd

Browse files
Merge pull request #263381 from dcurwin/replace-click-jan17-2024
Fix formatting
2 parents 736070d + 0279750 commit 98c34dd

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/defender-for-cloud/remediate-vulnerability-findings-vm.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ To view vulnerability assessment findings (from all of your configured scanners)
2323

2424
:::image type="content" source="media/remediate-vulnerability-findings-vm/vulnerabilities-should-be-remediated.png" alt-text="The findings from your vulnerability assessment solutions for all selected subscriptions." lightbox="media/remediate-vulnerability-findings-vm/vulnerabilities-should-be-remediated.png":::
2525

26-
1. To filter the findings by a specific VM, open the "Affected resources" section and click the VM that interests you. Or you can select a VM from the resource health view, and view all relevant recommendations for that resource.
26+
1. To filter the findings by a specific VM, open the "Affected resources" section and select the VM that interests you. Or you can select a VM from the resource health view, and view all relevant recommendations for that resource.
2727

2828
Defender for Cloud shows the findings for that VM, ordered by severity.
2929

@@ -41,9 +41,9 @@ To view vulnerability assessment findings (from all of your configured scanners)
4141

4242
## Disable specific findings
4343

44-
If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't impact your secure score or generate unwanted noise.
44+
If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't affect your secure score or generate unwanted noise.
4545

46-
When a finding matches the criteria you've defined in your disable rules, it won't appear in the list of findings. Typical scenarios include:
46+
When a finding matches the criteria you defined in your disable rules, it doesn't appear in the list of findings. Typical scenarios include:
4747

4848
- Disable findings with severity below medium
4949
- Disable findings that are non-patchable
@@ -82,7 +82,7 @@ To create a rule:
8282

8383
## Export the results
8484

85-
To export vulnerability assessment results, you'll need to use [Azure Resource Graph](https://azure.microsoft.com/features/resource-graph/) (ARG). This tool provides instant access to resource information across your cloud environments with robust filtering, grouping, and sorting capabilities. It's a quick and efficient way to query information across Azure subscriptions programmatically or from within the Azure portal.
85+
To export vulnerability assessment results, you need to use [Azure Resource Graph](https://azure.microsoft.com/features/resource-graph/) (ARG). This tool provides instant access to resource information across your cloud environments with robust filtering, grouping, and sorting capabilities. It's a quick and efficient way to query information across Azure subscriptions programmatically or from within the Azure portal.
8686

8787
For full instructions and a sample ARG query, see the following Tech Community post: [Exporting vulnerability assessment results in Microsoft Defender for Cloud](https://techcommunity.microsoft.com/t5/azure-security-center/exporting-vulnerability-assessment-results-in-azure-security/ba-p/1212091).
8888

0 commit comments

Comments
 (0)