Skip to content

Commit bc44a28

Browse files
author
David Curwin
committed
Fix formatting
1 parent 65de8ab commit bc44a28

File tree

4 files changed

+29
-32
lines changed

4 files changed

+29
-32
lines changed

articles/defender-for-cloud/enable-adaptive-application-controls.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Enable and manage adaptive application controls
3-
description: This document helps you enable and manage adaptive application control in Microsoft Defender for Cloud to create an allowlist of applications running for Azure machines.
3+
description: Learn how to enable and manage adaptive application control in Microsoft Defender for Cloud to create an allowlist of applications running for Azure machines.
44
author: dcurwin
55
ms.author: dacurwin
66
ms.topic: how-to
@@ -45,7 +45,7 @@ Select the recommendation, or open the adaptive application controls page to vie
4545
4646
1. Open the **Recommended** tab. The groups of machines with recommended allowlists appear.
4747

48-
:::image type="content" source="media/enable-adaptive-application-controls/adaptive-application-recommended-tab.png" alt-text="Screenshot that shows you where on the screen the recommendation tab is.":::
48+
:::image type="content" source="media/enable-adaptive-application-controls/adaptive-application-recommended-tab.png" alt-text="Screenshot that shows you where on the screen the recommendation tab is.":::
4949

5050
1. Select a group.
5151

@@ -82,7 +82,7 @@ To edit the rules for a group of machines:
8282

8383
1. Select **Add rule**.
8484

85-
:::image type="content" source="media/enable-adaptive-application-controls/adaptive-application-add-custom-rule.png" alt-text="Screenshot that showsyou where the add rule button is located.":::
85+
:::image type="content" source="media/enable-adaptive-application-controls/adaptive-application-add-custom-rule.png" alt-text="Screenshot that shows you where the add rule button is located.":::
8686

8787
1. If you're defining a known safe path, change the **Rule type** to 'Path' and enter a single path. You can include wildcards in the path. The following screens show some examples of how to use wildcards.
8888

@@ -134,7 +134,7 @@ To remediate the issues:
134134

135135
1. To investigate further, select a group.
136136

137-
:::image type="content" source="media/enable-adaptive-application-controls/recent-alerts.png" alt-text="Screenshot showing recent alerts.":::
137+
:::image type="content" source="media/enable-adaptive-application-controls/recent-alerts.png" alt-text="Screenshot showing recent alerts in Configured tab.":::
138138

139139
1. For further details, and the list of affected machines, select an alert.
140140

@@ -180,10 +180,10 @@ Some of the functions available from the REST API include:
180180
>
181181
> Remove the following properties before using the JSON in the **Put** request: recommendationStatus, configurationStatus, issues, location, and sourceSystem.
182182
183-
## Next steps
183+
## Related content
184184

185185
On this page, you learned how to use adaptive application control in Microsoft Defender for Cloud to define allowlists of applications running on your Azure and non-Azure machines. To learn more about some other cloud workload protection features, see:
186186

187187
- [Understanding just-in-time (JIT) VM access](just-in-time-access-overview.md)
188188
- [Securing your Azure Kubernetes clusters](defender-for-kubernetes-introduction.md)
189-
- View common question about [Adaptive application controls](faq-defender-for-servers.yml)
189+
- View common question about [Adaptive application controls](faq-defender-for-servers.yml)

articles/defender-for-cloud/enable-agentless-scanning-vms.md

Lines changed: 22 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ When you enable [Defender Cloud Security Posture Management (CSPM)](concept-clou
3737
If you have Defender for Servers P2 already enabled and agentless scanning is turned off, you need to turn on agentless scanning manually.
3838

3939
You can enable agentless scanning on
40+
4041
- [Azure](#agentless-vulnerability-assessment-on-azure)
4142
- [AWS](#agentless-vulnerability-assessment-on-aws)
4243
- [GCP](#enable-agentless-scanning-in-gcp)
@@ -58,7 +59,7 @@ You can enable agentless scanning on
5859

5960
1. In the settings pane, turn on **Agentless scanning for machines**.
6061

61-
:::image type="content" source="media/enable-vulnerability-assessment-agentless/turn-on-agentles-scanning-azure.png" alt-text="Screenshot of settings and monitoring screen to turn on agentless scanning." lightbox="media/enable-vulnerability-assessment-agentless/turn-on-agentles-scanning-azure.png":::
62+
:::image type="content" source="media/enable-vulnerability-assessment-agentless/turn-on-agentless-scanning-azure.png" alt-text="Screenshot of settings and monitoring screen to turn on agentless scanning." lightbox="media/enable-vulnerability-assessment-agentless/turn-on-agentless-scanning-azure.png":::
6263

6364
1. Select **Save**.
6465

@@ -90,23 +91,23 @@ After you enable agentless scanning, software inventory and vulnerability inform
9091

9192
### Enable agentless scanning in GCP
9293

93-
1. In Defender for Cloud, select **Environment settings**.
94-
1. Select the relevant project or organization.
95-
1. For either the Defender Cloud Security Posture Management (CSPM) or Defender for Servers P2 plan, select  **Settings**.
94+
1. In Defender for Cloud, select **Environment settings**.
95+
1. Select the relevant project or organization.
96+
1. For either the Defender Cloud Security Posture Management (CSPM) or Defender for Servers P2 plan, select  **Settings**.
9697

9798
:::image type="content" source="media/enable-agentless-scanning-vms/gcp-select-plan.png" alt-text="Screenshot that shows where to select the plan for GCP projects." lightbox="media/enable-agentless-scanning-vms/gcp-select-plan.png":::
9899

99100
1. Toggle Agentless scanning to **On**.
100101

101102
:::image type="content" source="media/enable-agentless-scanning-vms/gcp-select-agentless.png" alt-text="Screenshot that shows where to select agentless scanning." lightbox="media/enable-agentless-scanning-vms/gcp-select-agentless.png":::
102103

103-
1. Select **Save and Next: Configure Access**.
104+
1. Select **Save and Next: Configure Access**.
104105
1. Copy the onboarding script.
105106
1. Run the onboarding script in the GCP organization/project scope (GCP portal or gcloud CLI).
106-
1. Select  **Next: Review and generate**.
107-
1. Select  **Update**.
107+
1. Select  **Next: Review and generate**.
108+
1. Select  **Update**.
108109

109-
## Test the agentless malware scanner's deployment
110+
## Test the agentless malware scanner's deployment
110111

111112
Security alerts appear on the portal only in cases where threats are detected on your environment. If you do not have any alerts it may be because there are no threats on your environment. You can test to see that the device is properly onboarded and reporting to Defender for Cloud by creating a test file.
112113

@@ -167,37 +168,35 @@ The alert `MDC_Test_File malware was detected (Agentless)` will appear within 24
167168

168169
1. Execute the following script.
169170

170-
171171
```powershell
172172
# Virus test string
173173
$TEST_STRING = '$$89-barbados-dublin-damascus-notice-pulled-natural-31$$'
174-
 
174+
175175
# File to be created
176176
$FILE_PATH = "C:\temp\virus_test_file.txt"
177-
 
177+
178178
# Create "temp" directory if it does not exist
179179
$DIR_PATH = "C:\temp"
180180
if (!(Test-Path -Path $DIR_PATH)) {
181-
    New-Item -ItemType Directory -Path $DIR_PATH
181+
New-Item -ItemType Directory -Path $DIR_PATH
182182
}
183-
 
183+
184184
# Write the test string to the file without a trailing newline
185185
[IO.File]::WriteAllText($FILE_PATH, $TEST_STRING)
186-
 
186+
187187
# Check if the file was created and contains the correct string
188188
if (Test-Path -Path $FILE_PATH) {
189-
    $content = [IO.File]::ReadAllText($FILE_PATH)
190-
    if ($content -eq $TEST_STRING) {
191-
        Write-Host "Test file created and validated successfully."
192-
    } else {
193-
        Write-Host "Test file does not contain the correct string."
194-
    }
189+
$content = [IO.File]::ReadAllText($FILE_PATH)
190+
if ($content -eq $TEST_STRING) {
191+
Write-Host "Test file created and validated successfully."
192+
} else {
193+
Write-Host "Test file does not contain the correct string."
194+
}
195195
} else {
196-
    Write-Host "Failed to create test file."
196+
Write-Host "Failed to create test file."
197197
}
198198
```
199199
200-
201200
The alert `MDC_Test_File malware was detected (Agentless)` will appear within 24 hours in the Defender for Cloud Alerts page and in the Defender XDR portal.
202201
203202
:::image type="content" source="media/enable-agentless-scanning-vms/test-alert.jpg" alt-text="Screenshot of the test alert that appears in Defender for Cloud for Windows with because of the PowerShell script." lightbox="media/enable-agentless-scanning-vms/test-alert.jpg":::
@@ -221,7 +220,7 @@ Agentless scanning applies to all of the eligible machines in the subscription.
221220
222221
1. Select **Save**.
223222
224-
## Next steps
223+
## Related content
225224
226225
Learn more about:
227226

articles/defender-for-cloud/enable-defender-for-endpoint.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -304,10 +304,8 @@ To remove the Defender for Endpoint solution from your machines:
304304
305305
1. Follow the steps in [Offboard devices from the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/offboard-machines) from the Defender for Endpoint documentation.
306306
307-
## Next steps
307+
## Related content
308308
309309
- [Platforms and features supported by Microsoft Defender for Cloud](security-center-os-coverage.md)
310310
- [Learn how recommendations help you protect your Azure resources](review-security-recommendations.md)
311311
- View common question about the [Defender for Cloud integration with Microsoft Defender for Endpoint](faq-defender-for-servers.yml)
312-
313-

0 commit comments

Comments
 (0)