Skip to content

Commit 9fb9b12

Browse files
authored
Merge pull request #208089 from memildin/patch-39
Revised order of items in "relevant defender plan"
2 parents 479e213 + 240b9d0 commit 9fb9b12

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/defender-for-cloud/enable-data-collection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,10 +124,10 @@ We recommend enabling auto provisioning, but it's disabled by default.
124124

125125
## How does auto provisioning work?
126126

127-
Defender for Cloud's auto provisioning settings has a toggle for each type of supported extension. When you enable auto provisioning of an extension, you assign the appropriate **Deploy if not exists** policy. This policy type ensures the extension is provisioned on all existing and future resources of that type.
127+
Defender for Cloud's auto provisioning settings page has a toggle for each type of supported extension. When you enable auto provisioning of an extension, you assign the appropriate **Deploy if not exists** policy. This policy type ensures the extension is provisioned on all existing and future resources of that type.
128128

129129
> [!TIP]
130-
> Learn more about Azure Policy effects including deploy if not exists in [Understand Azure Policy effects](../governance/policy/concepts/effects.md).
130+
> Learn more about Azure Policy effects including **Deploy if not exists** in [Understand Azure Policy effects](../governance/policy/concepts/effects.md).
131131
132132

133133
<a name="auto-provision-mma"></a>

articles/defender-for-cloud/includes/azure-monitor-agent-availability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 08/14/2022
99
| Aspect | Details |
1010
|------------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
1111
| Release state: | Preview |
12-
| Relevant Defender plan: | - For [Endpoint protection assessment](../endpoint-protection-recommendations-technical.md): [Security posture management (CSPM)](../overview-page.md) (Free and enabled by default)<br>- For [Adaptive application controls](../adaptive-application-controls.md): [Defender for Servers Plan 2](../defender-for-servers-introduction.md)<br>- For [File Integrity Monitoring](../file-integrity-monitoring-overview.md): [Defender for Servers Plan 2](../defender-for-servers-introduction.md)<br>- For [Fileless attack detection](../defender-for-servers-introduction.md#plan-features): [Defender for Servers Plan 2](../defender-for-servers-introduction.md) |
12+
| Relevant Defender plan: | - [Security posture management (CSPM)](../overview-page.md) (free and enabled by default) for [Endpoint protection assessment](../endpoint-protection-recommendations-technical.md)<br>- [Microsoft Defender for Servers Plan 2](../defender-for-servers-introduction.md) for [adaptive application controls](../adaptive-application-controls.md), [file integrity monitoring](../file-integrity-monitoring-overview.md), and [fileless attack detection](../defender-for-servers-introduction.md#plan-features) |
1313
| Supported destinations: | :::image type="icon" source="../media/icons/yes-icon.png"::: Azure virtual machines<br> :::image type="icon" source="../media/icons/yes-icon.png"::: Azure Arc-enabled machines |
1414
| Policy-based: | :::image type="icon" source="../media/icons/no-icon.png"::: No |
15-
| Clouds: | :::image type="icon" source="../media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="../media/icons/no-icon.png"::: Azure Government, Azure China 21Vianet |
15+
| Clouds: | :::image type="icon" source="../media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="../media/icons/no-icon.png"::: Azure Government, Azure China 21Vianet |

0 commit comments

Comments
 (0)