Skip to content

Commit d5193e7

Browse files
author
David Curwin
committed
fix links
1 parent 0e1c045 commit d5193e7

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/defender-for-cloud/data-classification.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Within Defender for APIs inventory experience, you can search for sensitivity la
1818
## Explore API exposure through attack paths
1919

2020
When the Defender Cloud Security Posture Management (CSPM) plan is enabled, API attack paths let you discover and remediate the risk of API data
21-
exposure. For more information, see [Data security in Defender CSPM](concept-data-security-posture.md#data-security-in-defender-cspm).
21+
exposure. For more information, see [Data security posture management in Defender CSPM](concept-data-security-posture.md#data-security-posture-management-in-defender-cspm).
2222

2323
1. Select the API attack path **Internet exposed APIs that are unauthenticated carry sensitive data** and review the data path:
2424

articles/defender-for-cloud/data-security-review-risks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ ms.custom: template-how-to-pattern
1212

1313
After you [discover resources with sensitive data](data-security-posture-enable.md), Microsoft Defender for Cloud lets you explore sensitive data risk for those resources with these features:
1414

15-
- **Attack paths**: When sensitive data discovery is enabled in the Defender Cloud Security Posture Management (CSPM) plan, you can use attack paths to discover risk of data breaches. [Learn more](concept-data-security-posture.md#data-security-in-defender-cspm).
16-
- **Security Explorer**: When sensitive data discovery is enabled in the Defender CSPM plan, you can use Cloud Security Explorer to find sensitive data insights. [Learn more](concept-data-security-posture.md#data-security-in-defender-cspm).
15+
- **Attack paths**: When sensitive data discovery is enabled in the Defender Cloud Security Posture Management (CSPM) plan, you can use attack paths to discover risk of data breaches. For more information, see [Data security posture management in Defender CSPM](concept-data-security-posture.md#data-security-posture-management-in-defender-cspm).
16+
- **Security Explorer**: When sensitive data discovery is enabled in the Defender CSPM plan, you can use Cloud Security Explorer to find sensitive data insights. For more information, see [Data security posture management in Defender CSPM](concept-data-security-posture.md#data-security-posture-management-in-defender-cspm).
1717
- **Security alerts**: When sensitive data discovery is enabled in the Defender for Storage plan, you can prioritize and explore ongoing threats to sensitive data stores by applying sensitivity filters Security Alerts settings.
1818

1919
## Explore risks through attack paths

0 commit comments

Comments
 (0)