Skip to content

Commit bf264f2

Browse files
committed
Small fixes from PR review
1 parent 0be8f2c commit bf264f2

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

articles/defender-for-cloud/adaptive-application-controls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -175,13 +175,13 @@ To remediate the issues:
175175

176176
1. To investigate further, select a group.
177177

178-
![Recent alerts.](./media/adaptive-application/recent-alerts.png)
178+
:::image type="content" source="media/adaptive-application/recent-alerts.png" alt-text="Screenshot showing recent alerts.":::
179179

180180
1. For further details, and the list of affected machines, select an alert.
181181

182182
The security alerts page shows more details of the alerts and provides a **Take action** link with recommendations of how to mitigate the threat.
183183

184-
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="The start time of adaptive application controls alerts is the time that adaptive application controls created the alert.":::
184+
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="Screenshot of the start time of adaptive application controls alerts showing that the time is when adaptive application controls created the alert.":::
185185

186186
> [!NOTE]
187187
> Adaptive application controls calculates events once every twelve hours. The "activity start time" shown in the security alerts page is the time that adaptive application controls created the alert, **not** the time that the suspicious process was active.

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-elastic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ To enable scanning of vulnerabilities in containers, you have to [connect your A
1616

1717
Defender for Containers creates resources in your AWS account to build an inventory of the software in your images. The scan then sends only the software inventory to Defender for Cloud. This architecture protects your information privacy and intellectual property, and also keeps the outbound network traffic to a minimum.
1818

19-
These resources are created under us-east-1 and eu-central-1 in each AWS account where container vulnerability assesment is enabled:
19+
These resources are created under us-east-1 and eu-central-1 in each AWS account where container vulnerability assessment is enabled:
2020

2121
- **S3 bucket** with the prefix `defender-for-containers-va`
2222
- **ECS cluster** with the name `defender-for-containers-va`

articles/defender-for-cloud/faq-general.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,8 +102,8 @@ sections:
102102
answer: |
103103
Azure Subscriptions may have multiple administrators with permissions to change the pricing settings. To find out which user made a change, use the Azure Activity Log.
104104
105-
:::image type="content" source="media/faq-general/logged-change-to-pricing.png" alt-text="Azure Activity log showing a pricing change event.":::
105+
:::image type="content" source="media/faq-general/logged-change-to-pricing.png" alt-text="Screenshot of Azure Activity log showing a pricing change event.":::
106106
107107
If the user's info isn't listed in the **Event initiated by** column, explore the event's JSON for the relevant details.
108108
109-
:::image type="content" source="media/faq-general/tracking-pricing-changes-in-activity-log.png" alt-text="Azure Activity log JSON explorer.":::
109+
:::image type="content" source="media/faq-general/tracking-pricing-changes-in-activity-log.png" alt-text="Screenshot of Azure Activity log JSON explorer.":::

articles/defender-for-cloud/plan-defender-for-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ When you enable [Microsoft Defender for Servers](defender-for-servers-introducti
6161
| Deallocating | This state is transitional. When completed, the VM will show as Deallocated. | Not billed |
6262
| Deallocated | The VM has been stopped successfully and removed from the host. | Not billed |
6363

64-
:::image type="content" source="media/plan-defender-for-servers/deallocated-virtual-machines.png" alt-text="Azure Virtual Machines showing a deallocated machine.":::
64+
:::image type="content" source="media/plan-defender-for-servers/deallocated-virtual-machines.png" alt-text="Screenshot of Azure Virtual Machines showing a deallocated machine.":::
6565

6666
### If I already have a license for Microsoft Defender for Endpoint, can I get a discount for Defender for Servers?
6767

0 commit comments

Comments
 (0)