You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/attack-path-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ This section lists all of the cloud security graph components (connections & in
95
95
| Is managed | Indicates that an identity is managed by the cloud provider | Azure Managed Identity |
96
96
| Contains common usernames | Indicates that a SQL server has user accounts with common usernames which are prone to brute force attacks. | SQL on VM |
97
97
| Can execute code on the host | Indicates that a SQL server allows executing code on the underlying VM using a built-in mechanism such as xp_cmdshell. | SQL on VM |
98
-
| Has vulnerabilities |indicates that the resource SQL server has vulnerabilities detected | SQL on VM |
98
+
| Has vulnerabilities |Indicates that the resource SQL server has vulnerabilities detected | SQL on VM |
99
99
| DEASM findings | Microsoft Defender External Attack Surface Management (DEASM) internet scanning findings | Public IP |
100
100
| Privileged container | Indicates that a Kubernetes container runs in a privileged mode | Kubernetes container |
101
101
| Uses host network | Indicates that a Kubernetes pod uses the network namespace of its host machine | Kubernetes pod |
0 commit comments