Skip to content

Commit bf5feae

Browse files
authored
Merge pull request #188741 from ElazarK/maya-toc-fix
toc and title fixes
2 parents 83c0a4a + 56ec762 commit bf5feae

File tree

3 files changed

+12
-12
lines changed

3 files changed

+12
-12
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -219,13 +219,7 @@
219219
- name: Enable Defender for Containers
220220
displayName: kubernetes, aks, acr, registries, k8s, arc, hybrid, on-premises, azure arc, multicloud
221221
href: defender-for-containers-enable.md
222-
- name: Defender for Kubernetes (deprecated)
223-
displayName: clusters, k8s, aks
224-
href: defender-for-kubernetes-introduction.md
225-
- name: Defender for container registries (deprecated)
226-
displayName: ACR, registry, images
227-
href: defender-for-container-registries-introduction.md
228-
- name: Scan your registry images for vulnerabilities
222+
- name: Vulnerability assessment
229223
displayName: ACR, registry, images, qualys
230224
href: defender-for-container-registries-usage.md
231225
- name: Scan images in your CI/CD workflows
@@ -234,6 +228,12 @@
234228
- name: Protect your Kubernetes workloads
235229
displayName: k8s, containers, aks
236230
href: kubernetes-workload-protections.md
231+
- name: Defender for Kubernetes (deprecated)
232+
displayName: clusters, k8s, aks
233+
href: defender-for-kubernetes-introduction.md
234+
- name: Defender for container registries (deprecated)
235+
displayName: ACR, registry, images
236+
href: defender-for-container-registries-introduction.md
237237
- name: Protect your Azure App Service web apps and APIs
238238
displayName: Azure Defender for App Service, defender for app
239239
href: defender-for-app-service-introduction.md

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Container security with Microsoft Defender for Cloud
33
description: Learn about Microsoft Defender for Containers
44
ms.topic: overview
5-
ms.date: 02/14/2022
5+
ms.date: 02/16/2022
66
---
77

88
# Overview of Microsoft Defender for Containers
@@ -134,7 +134,7 @@ When reviewing the outstanding recommendations for your container-related resour
134134

135135

136136

137-
### Workload protection best-practices using Kubernetes admission control
137+
### Environment hardening
138138

139139
For a bundle of recommendations to protect the workloads of your Kubernetes containers, install the **Azure Policy for Kubernetes**. You can also auto deploy this component as explained in [enable auto provisioning of agents and extensions](enable-data-collection.md#auto-provision-mma). By default, auto provisioning is enabled when you enable Defender for Containers.
140140

articles/defender-for-cloud/release-notes-archive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Archive of what's new in Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud from six months ago and earlier.
44
ms.topic: reference
5-
ms.date: 02/13/2022
5+
ms.date: 02/17/2022
66
---
77
# Archive for what's new in Defender for Cloud?
88

@@ -900,7 +900,7 @@ When the Azure Policy add-on for Kubernetes is installed on your Azure Kubernete
900900

901901
For example, you can mandate that privileged containers shouldn't be created, and any future requests to do so will be blocked.
902902

903-
Learn more in [Workload protection best-practices using Kubernetes admission control](defender-for-containers-introduction.md#workload-protection-best-practices-using-kubernetes-admission-control).
903+
Learn more in [Workload protection best-practices using Kubernetes admission control](defender-for-containers-introduction.md#environment-hardening).
904904

905905
> [!NOTE]
906906
> While the recommendations were in preview, they didn't render an AKS cluster resource unhealthy, and they weren't included in the calculations of your secure score. with this GA announcement these will be included in the score calculation. If you haven't remediated them already, this might result in a slight impact on your secure score. Remediate them wherever possible as described in [Remediate recommendations in Azure Security Center](implement-security-recommendations.md).
@@ -1743,7 +1743,7 @@ When you've installed the Azure Policy add-on for Kubernetes on your AKS cluster
17431743

17441744
For example, you can mandate that privileged containers shouldn't be created, and any future requests to do so will be blocked.
17451745

1746-
Learn more in [Workload protection best-practices using Kubernetes admission control](defender-for-containers-introduction.md#workload-protection-best-practices-using-kubernetes-admission-control).
1746+
Learn more in [Workload protection best-practices using Kubernetes admission control](defender-for-containers-introduction.md#environment-hardening).
17471747

17481748

17491749
### Vulnerability assessment findings are now available in continuous export

0 commit comments

Comments
 (0)