Skip to content

Commit c437644

Browse files
committed
Removed a few "allows"
1 parent 0ecda81 commit c437644

5 files changed

+5
-5
lines changed

articles/security-center/continuous-export.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Continuous export can be configured and managed via the Microsoft Defender for C
111111

112112
The API provides additional functionality not available from the Azure portal, for example:
113113

114-
* **Greater volume** - The API allows you to create multiple export configurations on a single subscription. The **Continuous Export** page in Defender for Cloud's portal UI supports only one export configuration per subscription.
114+
* **Greater volume** - You can create multiple export configurations on a single subscription with the API. The **Continuous Export** page in Defender for Cloud's portal UI supports only one export configuration per subscription.
115115

116116
* **Additional features** - The API offers additional parameters that aren't shown in the UI. For example, you can add tags to your automation resource as well as define your export based on a wider set of alert and recommendation properties than those offered in the **Continuous Export** page in Defender for Cloud's portal UI.
117117

articles/security-center/defender-for-key-vault-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Enable **Microsoft Defender for Key Vault** for Azure-native, advanced threat pr
3030

3131
## What are the benefits of Microsoft Defender for Key Vault?
3232

33-
Microsoft Defender detects unusual and potentially harmful attempts to access or exploit Key Vault accounts. This layer of protection allows you to address threats without being a security expert, and without the need to manage third-party security monitoring systems.
33+
Microsoft Defender detects unusual and potentially harmful attempts to access or exploit Key Vault accounts. This layer of protection helps you address threats even if you're not a security expert, and without the need to manage third-party security monitoring systems.
3434

3535
When anomalous activities occur, Defender shows alerts and optionally sends them via email to relevant members of your organization. These alerts include the details of the suspicious activity and recommendations on how to investigate and remediate threats.
3636

articles/security-center/defender-for-sql-on-machines-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ Metadata information about the connected machine is also collected. Specifically
143143
- UUID (BIOS ID)
144144
- SQL server name and underlying database names
145145

146-
SQL Vulnerability Assessment allows you to specify the region where your data will be stored by choosing the Log Analytics workspace location. Microsoft may replicate to other regions for data resiliency, but Microsoft does not replicate data outside the geography.
146+
You can specify the region where your SQL Vulnerability Assessment data will be stored by choosing the Log Analytics workspace location. Microsoft may replicate to other regions for data resiliency, but Microsoft does not replicate data outside the geography.
147147

148148
## Next steps
149149

articles/security-center/enhanced-security-features-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,4 +139,4 @@ This article explained Defender for Cloud's pricing options. For related materia
139139

140140
- [How to optimize your Azure workload costs](https://azure.microsoft.com/blog/how-to-optimize-your-azure-workload-costs/)
141141
- [Pricing details in your currency of choice, and according to your region](https://azure.microsoft.com/pricing/details/security-center/)
142-
- You may want to manage your costs and limit the amount of data collected for a solution by limiting it to a particular set of agents. [Solution targeting](../azure-monitor/insights/solution-targeting.md) allows you to apply a scope to the solution and target a subset of computers in the workspace. If you're using solution targeting, Defender for Cloud lists the workspace as not having a solution.
142+
- You may want to manage your costs and limit the amount of data collected for a solution by limiting it to a particular set of agents. Use [solution targeting](../azure-monitor/insights/solution-targeting.md) to apply a scope to the solution and target a subset of computers in the workspace. If you're using solution targeting, Defender for Cloud lists the workspace as not having a solution.

articles/security-center/quickstart-onboard-gcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ With cloud workloads commonly spanning multiple cloud platforms, cloud security
1717

1818
Microsoft Defender for Cloud protects workloads in Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
1919

20-
Adding a GCP account to an Azure subscription allows Defender for Cloud to connect with GCP Security Command. Defender for Cloud can then protect your resources across both of these cloud environments and provide:
20+
Adding a GCP account to an Azure subscription connects Defender for Cloud with GCP Security Command. Defender for Cloud can then protect your resources across both of these cloud environments and provide:
2121

2222
- Detection of security misconfigurations
2323
- A single view showing Defender for Cloud recommendations and GCP Security Command Center findings

0 commit comments

Comments
 (0)