Skip to content

Commit c06e36d

Browse files
Merge pull request #228648 from AlizaBernstein/WI-65372-update-tip-auto-deploy-VA
WI-65372-Update tip in auto-deploy-vulnerability-assessment.md
2 parents 5b453c6 + 3c47b6a commit c06e36d

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: how-to
55
ms.custom: ignite-2022
66
ms.author: benmansheim
77
author: bmansheim
8-
ms.date: 02/28/2023
8+
ms.date: 03/21/2023
99
---
1010

1111
# Automatically configure vulnerability assessment for your machines
@@ -14,8 +14,8 @@ Defender for Cloud collects data from your machines using agents and extensions.
1414

1515
To assess your machines for vulnerabilities, you can use one of the following solutions:
1616

17-
- Microsoft Defender Vulnerability Management available in Microsoft Defender for Endpoint (included with Microsoft Defender for Servers)
18-
- An integrated Qualys agent (included with Microsoft Defender for Servers)
17+
- Microsoft Defender Vulnerability Management solution (included with Microsoft Defender for Servers)
18+
- Built-in Qualys agent (included with Microsoft Defender for Servers)
1919
- A Qualys or Rapid7 scanner that you've licensed separately and configured within Defender for Cloud (this scenario is called the Bring Your Own License, or BYOL, scenario)
2020

2121
> [!NOTE]
@@ -31,9 +31,9 @@ To assess your machines for vulnerabilities, you can use one of the following so
3131
:::image type="content" source="media/auto-deploy-vulnerability-assessment/turn-on-deploy-vulnerability-assessment.png" alt-text="Screenshot showing where to turn on deployment of vulnerability assessment for machines." lightbox="media/auto-deploy-vulnerability-assessment/turn-on-deploy-vulnerability-assessment.png":::
3232

3333
> [!TIP]
34-
> Defender for Cloud enables the following policy: [(Preview) Configure machines to receive a vulnerability assessment provider](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f13ce0167-8ca6-4048-8e6b-f996402e3c1b).
34+
> If you select the "Microsoft Defender for Cloud built-in Qualys solution" solution, Defender for Cloud enables the following policy: [(Preview) Configure machines to receive a vulnerability assessment provider](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f13ce0167-8ca6-4048-8e6b-f996402e3c1b).
3535
36-
1. Select **Apply** and **Save**.
36+
1. Select **Apply** and then select **Save**.
3737

3838
1. To view the findings for **all** supported vulnerability assessment solutions, see the **Machines should have vulnerability findings resolved** recommendation.
3939

0 commit comments

Comments
 (0)