Skip to content

Commit 9c046da

Browse files
committed
acrolinx
1 parent 520e73a commit 9c046da

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/defender-for-cloud/concept-data-security-posture.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -75,23 +75,23 @@ Changes in sensitivity settings take effect the next time that resources are dis
7575

7676
Sensitive data discovery identifies sensitive resources and their related risk and then helps to prioritize and remediate those risks.
7777

78-
Defender for Cloud considers a resource sensitive if a sensitive information type (SIT) is detected in it and the customer has configured the SIT to be considered sensitive. Defender for Cloud detects SITs that are considered sensitive by default.
78+
Defender for Cloud considers a resource sensitive if a Sensitive Information Type (SIT) is detected in it and the customer has configured the SIT to be considered sensitive. Defender for Cloud detects SITs that are considered sensitive by default.
7979

8080
The sensitive data discovery process operates by taking samples of the resource’s data. The sample data is then used to identify sensitive resources with high confidence without performing a full scan of all assets in the resource.
8181

82-
The sensitive data discovery process is powered by the Microsoft Purview classification engine and uses a common set of SITs and labels for all datastores, regardless of their type or hosting cloud vendor.
82+
The sensitive data discovery process is powered by the Microsoft Purview classification engine that uses a common set of SITs and labels for all datastores, regardless of their type or hosting cloud vendor.
8383

84-
Sensitive data discovery detects the existence of sensitive data at the cloud workload level. Sensitive data discovery aims to identify various types of sensitive information, but it may not detect all types.
84+
Sensitive data discovery detects the existence of sensitive data at the cloud workload level. Sensitive data discovery aims to identify various types of sensitive information, but it might not detect all types.
8585

86-
To get complete data cataloguing scanning results with all SITs available in the cloud resource, we recommend you use the scanning features from Microsoft Purview.
86+
To get complete data cataloging scanning results with all SITs available in the cloud resource, we recommend you use the scanning features from Microsoft Purview.
8787

8888
### For cloud storage
8989

90-
Defender for Cloud's scanning algorithm selects containers that may contain sensitive information and samples up to 20MBs for each file scanned within the container.
90+
Defender for Cloud's scanning algorithm selects containers that might contain sensitive information and samples up to 20MBs for each file scanned within the container.
9191

9292
### For cloud Databases
9393

94-
Defender for Cloud selects certain tables and samples between 300 to 1024 rows using non-blocking queries.
94+
Defender for Cloud selects certain tables and samples between 300 to 1,024 rows using nonblocking queries.
9595

9696
## Next step
9797

0 commit comments

Comments
 (0)