You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/risk-prioritization.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Microsoft Defender for Cloud's resources and workloads are assessed against buil
24
24
> [!NOTE]
25
25
> Recommendations are included with the [Foundational CSPM plan](concept-cloud-security-posture-management.md#plan-availability) which is included with Defender for Cloud. However, risk prioritization and governance is supported only with the [Defender CSPM plan](concept-cloud-security-posture-management.md#plan-availability).
26
26
>
27
-
> If you environment is not protected by the Defender CSPM plan the columns with the risk prioritization features will appear blurred out.
27
+
> If your environment is not protected by the Defender CSPM plan the columns with the risk prioritization features will appear blurred out.
28
28
29
29
Different resources can have the same recommendation with different risk levels. For example, a recommendation to enable MFA on a user account can have a different risk level for different users. The risk level is determined by the risk factors of each resource, such as its configuration, network connections, and security posture. The risk level is calculated based on the potential impact of the security issue being breached, the categories of risk, and the attack path that the security issue is part of.
30
30
@@ -40,15 +40,15 @@ On this page you can review the:
40
40
41
41
-**Risk factors** - Environmental factors of the resource affected by the recommendation, which influence the exploitability and the business impact of the underlying security issue. Examples for risk factors include internet exposure, sensitive data, lateral movement potential.
42
42
43
-
-**Attack paths** - The number of attack paths that the recommendation is part of based on the security engine's search for all potential attack paths based on the resources that exist in the environment and relationship that exists between them. Each environment will present it's own unique attack paths.
43
+
-**Attack paths** - The number of attack paths that the recommendation is part of based on the security engine's search for all potential attack paths based on the resources that exist in the environment and relationship that exists between them. Each environment will present its own unique attack paths.
44
44
45
45
-**Owner** - The person the recommendation is assigned to.
46
46
47
47
-**Status** - The current status of the recommendation. For example, unassigned, on time, overdue.
48
48
49
49
-**Insights** - Information related to the recommendation such as, if it's in preview, if it can be denied, if there is a fix option available and more.
50
50
51
-
:::image type="content" source="media/risk-prioritization/recommendations-dashboard.png" alt-text="Screenshot of teh recommendations dashboard which shows recommendations prioritized by their risk." lightbox="media/risk-prioritization/recommendations-dashboard.png":::
51
+
:::image type="content" source="media/risk-prioritization/recommendations-dashboard.png" alt-text="Screenshot of the recommendations dashboard which shows recommendations prioritized by their risk." lightbox="media/risk-prioritization/recommendations-dashboard.png":::
52
52
53
53
When you select a recommendation, you can view the details of the recommendation, including the description, attack paths, scope, freshness, last change date, owner, due date, severity, tactics & techniques, and more.
54
54
@@ -103,4 +103,4 @@ The risk level is determined by a context-aware risk-prioritization engine that
0 commit comments