Skip to content

Commit bb90553

Browse files
authored
Merge pull request #185213 from ansingha/patch-7
Update deploy-vulnerability-assessment-vm.md
2 parents 3dd590a + 93ecf80 commit bb90553

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-cloud/deploy-vulnerability-assessment-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Defender for Cloud regularly checks your connected machines to ensure they're ru
1414

1515
When a machine is found that doesn't have vulnerability assessment solution deployed, Defender for Cloud generates the following security recommendation:
1616

17-
**A vulnerability assessment solution should be enabled on your virtual machines**
17+
**Machines should have a vulnerability assessment solution**
1818

1919
Use this recommendation to deploy the vulnerability assessment solution to your Azure virtual machines and your Azure Arc-enabled hybrid machines.
2020

@@ -143,7 +143,7 @@ Some of the ways you can automate deployment at scale of the integrated scanner:
143143
:::image type="content" source="./media/deploy-vulnerability-assessment-vm/deploy-at-scale-remediation-logic.png" alt-text="The remediation script includes the relevant ARM template you can use for your automation." lightbox="./media/deploy-vulnerability-assessment-vm/deploy-at-scale-remediation-logic.png":::
144144
- **DeployIfNotExists policy**[A custom policy](https://github.com/Azure/Azure-Security-Center/tree/master/Remediation%20scripts/Enable%20the%20built-in%20vulnerability%20assessment%20solution%20on%20virtual%20machines%20(powered%20by%20Qualys)/Azure%20Policy) for ensuring all newly created machines receive the scanner. Select **Deploy to Azure** and set the relevant parameters. You can assign this policy at the level of resource groups, subscriptions, or management groups.
145145
- **PowerShell Script** – Use the ```Update qualys-remediate-unhealthy-vms.ps1``` script to deploy the extension for all unhealthy virtual machines. To install on new resources, automate the script with [Azure Automation](../automation/automation-intro.md). The script finds all unhealthy machines discovered by the recommendation and executes an Azure Resource Manager call.
146-
- **Azure Logic Apps** – Build a logic app based on [the sample app](https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation/Install-VulnAssesmentAgent). Use Defender for Cloud's [workflow automation](workflow-automation.md) tools to trigger your logic app to deploy the scanner whenever the **A vulnerability assessment solution should be enabled on your virtual machines** recommendation is generated for a resource.
146+
- **Azure Logic Apps** – Build a logic app based on [the sample app](https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation/Install-VulnAssesmentAgent). Use Defender for Cloud's [workflow automation](workflow-automation.md) tools to trigger your logic app to deploy the scanner whenever the **Machines should have a vulnerability assessment solution** recommendation is generated for a resource.
147147
- **REST API** – To deploy the integrated vulnerability assessment solution using the Defender for Cloud REST API, make a PUT request for the following URL and add the relevant resource ID: ```https://management.azure.com/<resourceId>/providers/Microsoft.Security/serverVulnerabilityAssessments/default?api-Version=2015-06-01-preview​```
148148

149149

0 commit comments

Comments
 (0)