Skip to content

Commit abd5180

Browse files
Merge pull request #245970 from dcurwin/patch-160
Remove the feature capability section from secret scanning docs
2 parents f4d1296 + fec0359 commit abd5180

File tree

1 file changed

+0
-16
lines changed

1 file changed

+0
-16
lines changed

articles/defender-for-cloud/secret-scanning.md

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -32,26 +32,10 @@ In addition to detecting SSH private keys, the agentless scanner verifies whethe
3232
- [Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md)
3333
- [Defender CSPM](concept-cloud-security-posture-management.md)
3434

35-
> [!NOTE]
36-
> If both plans are not enabled, you will only have limited access to the features available from Defender for Server's agentless secret scanning capabilities. Check out [which features are available with each plan](#feature-capability).
37-
3835
- [Enable agentless scanning for machines](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines).
3936

4037
For requirements for agentless scanning, see [Learn about agentless scanning](concept-agentless-data-collection.md#availability).
4138

42-
## Feature capability
43-
44-
You must enable [Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features) and [Defender CSPM](concept-cloud-security-posture-management.md) to gain access to all of the agentless secret scanning capabilities.
45-
46-
If you only enable one of the two plans, you gain only part of the available features of the agentless secret scanning capabilities. The following table shows which plans enable which features:
47-
48-
| Plan Feature | Defender for servers plan 2 | Defender CSPM |
49-
|--|--|--|
50-
| [Attack path](#remediate-secrets-with-attack-path) | No | Yes |
51-
| [Cloud security explorer](#remediate-secrets-with-cloud-security-explorer) | Yes | Yes |
52-
| [Recommendations](#remediate-secrets-with-recommendations) | Yes | Yes |
53-
| [Asset Inventory](#remediate-secrets-from-your-asset-inventory) - Secrets | Yes | No |
54-
5539
## Remediate secrets with attack path
5640

5741
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). These scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack path analysis exposes attack paths and suggests recommendations as to how best remediate issues that break the attack path and prevent successful breach.

0 commit comments

Comments
 (0)