Skip to content

Commit bd345f9

Browse files
Update articles/defender-for-cloud/file-integrity-monitoring-enable-ama.md
Co-authored-by: Ben Mansheim <[email protected]>
1 parent 183aa51 commit bd345f9

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/defender-for-cloud/file-integrity-monitoring-enable-ama.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ To enable File Integrity Monitoring (FIM), use the FIM recommendation to select
5555
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
5656
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
5757

58-
You can update the DCR and Log Analytics workspace settings later.
58+
You can update the DCR and Log Analytics workspace settings later.
5959

6060
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
6161

0 commit comments

Comments
 (0)