Skip to content

Commit b83da52

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 425ce5e + 34cb956 commit b83da52

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/defender-for-cloud/concept-easm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to gain comprehensive visibility and insights over extern
44
titleSuffix: Defender EASM and External Attack Surface Management (EASM) and Defender for Cloud
55
ms.topic: conceptual
66
ms.custom: ignite-2022
7-
ms.date: 01/24/2023
7+
ms.date: 03/05/2023
88
---
99

1010
# What is an external attack surface?
@@ -20,7 +20,7 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
2020
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
2121
- Gain visibility into third-party attack surfaces
2222

23-
EASM collects data for publicly exposed assets (“outside-in”). That data can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
23+
EASM collects data for publicly exposed assets (“outside-in”). That data can be used by Defender for Cloud CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
2424

2525

2626
## Learn more

articles/defender-for-iot/organizations/detect-windows-endpoints-script.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ The script described in this article is supported for the following Windows oper
2222
- Windows NT
2323
- Windows 7
2424
- Windows 10
25-
- Windows Server 2003/2008/2012/2016
25+
- Windows Server 2003/2008/2012/2016/2019
2626

2727
## Prerequisites
2828

@@ -80,4 +80,4 @@ After having run the script as described [earlier](#run-the-script), import the
8080

8181
## Next steps
8282

83-
For more information, see [View detected devices on-premises](how-to-investigate-sensor-detections-in-a-device-inventory.md).
83+
For more information, see [View detected devices on-premises](how-to-investigate-sensor-detections-in-a-device-inventory.md).

0 commit comments

Comments
 (0)