Skip to content

Commit d7dc010

Browse files
authored
Merge pull request #193874 from bmansheim/fix-dfservers-p1-table
Fix Defender for Servers P1 feature table
2 parents 3068c7e + 183271b commit d7dc010

File tree

1 file changed

+16
-17
lines changed

1 file changed

+16
-17
lines changed

articles/defender-for-cloud/defender-for-servers-introduction.md

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -44,23 +44,22 @@ To enable the Microsoft Defender for Servers plans:
4444

4545
The following table describes what's included in each plan at a high level.
4646

47-
| Feature | Free in Microsoft Defender for Cloud | Defender for Servers Plan 1 | Defender for Servers Plan 2 |
48-
|:---|:---|:---|:---|
49-
| Automatic onboarding for resources in Azure, AWS, GCP | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
50-
| Microsoft threat and vulnerability management | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
51-
| Cloud security posture management (CSPM) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
52-
| Flexibility to use Microsoft Defender for Cloud or Microsoft 365 Defender portal | | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
53-
| Integration of Microsoft Defender for Cloud and Microsoft Defender for Endpoint (alerts, software inventory, Vulnerability Assessment) | | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
54-
| Log-analytics (500MB free) | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
55-
| Security Policy & Regulatory Compliance | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
56-
| Vulnerability Assessment using Qualys | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
57-
| Threat detections: OS level, network layer, control plane | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
58-
| Adaptive application controls | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
59-
| File integrity monitoring | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
60-
| Just-in time VM access | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
61-
| Adaptive Network Hardening | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
62-
<!-- | Future – TVM P2 | | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
63-
| Future – disk scanning insights | | | :::image type="icon" source="./media/icons/yes-icon.png"::: | -->
47+
| Feature | Defender for Servers Plan 1 | Defender for Servers Plan 2 |
48+
|:---|:---:|:---:|
49+
| Automatic onboarding for resources in Azure, AWS, GCP | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
50+
| Microsoft threat and vulnerability management | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
51+
| Flexibility to use Microsoft Defender for Cloud or Microsoft 365 Defender portal | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
52+
| Integration of Microsoft Defender for Cloud and Microsoft Defender for Endpoint (alerts, software inventory, Vulnerability Assessment) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
53+
| Log-analytics (500MB free) | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
54+
| Security Policy & Regulatory Compliance | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
55+
| Vulnerability Assessment using Qualys | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
56+
| Threat detections: OS level, network layer, control plane | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
57+
| Adaptive application controls | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
58+
| File integrity monitoring | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
59+
| Just-in time VM access | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
60+
| Adaptive Network Hardening | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
61+
<!-- | Future – TVM P2 | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
62+
| Future – disk scanning insights | | :::image type="icon" source="./media/icons/yes-icon.png"::: | -->
6463

6564
## What are the benefits of Defender for Servers?
6665

0 commit comments

Comments
 (0)