Skip to content

Commit d88c2a3

Browse files
Merge pull request #274656 from dcurwin/yml-acrolinx-may8-2024
Improve Acrolinx
2 parents 7831ff5 + 4666069 commit d88c2a3

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

articles/defender-for-cloud/azure-devops-extension.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ procedureSection:
138138
While Defender for Cloud provides the MSDO CLI for standardized
139139
functionality and policy controls across a set of open source security
140140
analyzers, you have the flexibility to upload results from other
141-
third-party security tooling that you may have configured in CI/CD
141+
third-party security tooling that you might have configured in CI/CD
142142
pipelines to Defender for Cloud for comprehensive code-to-cloud
143143
contextualization. All results uploaded to Defender for Cloud must be in
144144
standard SARIF format.
@@ -150,7 +150,7 @@ procedureSection:
150150
151151
You can use the 'PublishBuildArtifacts@1' task to ensure SARIF output is
152152
published to the correct artifact. For example, if a security analyzer
153-
outputs 'results.sarif', you can configure the following task in your job
153+
outputs `results.sarif`, you can configure the following task in your job
154154
to ensure results are uploaded to Defender for Cloud:
155155
code: |
156156
```yml

articles/defender-for-cloud/update-regulatory-compliance-packages.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ procedureSection:
3737
3838
:::image type="content" source="media/update-regulatory-compliance-packages/manage-compliance.png" alt-text="Screenshot of the regulatory compliance page that shows you where to select the manage compliance policy button." lightbox="media/update-regulatory-compliance-packages/manage-compliance.png":::
3939
- |
40-
Select an account or management account (Azure subscription or nmanagement group, AWS account or management account, GCP project or organization) on which you want to assign the security standard.
40+
Select an account or management account (Azure subscription or management group, AWS account or management account, GCP project or organization) on which you want to assign the security standard.
4141
4242
> [!NOTE]
4343
> We recommend selecting the highest scope for which the standard is applicable so that compliance data is aggregated and tracked for all nested resources.
@@ -53,11 +53,11 @@ procedureSection:
5353
The selected standard appears in **Regulatory compliance** dashboard as enabled for the subscription it was enabled on.
5454
5555
relatedContent:
56-
- text: Create custom standards for Azure
56+
- text: Create custom standards for Azure.
5757
url: custom-security-policies.md
58-
- text: Create custom standards for AWS, and GCP
58+
- text: Create custom standards for AWS and GCP.
5959
url: create-custom-recommendations.md
60-
- text: Improve regulatory compliance
60+
- text: Improve regulatory compliance.
6161
url: regulatory-compliance-dashboard.md
6262

6363
# - Create custom standards for [Azure](custom-security-policies.md), [AWS, and GCP](create-custom-recommendations.md).

articles/defender-for-cloud/workflow-automation.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
metadata:
44
title: Workflow automation
5-
description: Learn how to create and automate workflows in Microsoft Defender for Cloud
5+
description: Learn how to create and automate workflows in Microsoft Defender for Cloud.
66
author: dcurwin
77
ms.author: dacurwin
88
ms.date: 06/18/2023
@@ -78,14 +78,14 @@ procedureSection:
7878
summary: |
7979
The logic app designer supports the following Defender for Cloud triggers:
8080
81-
- **When a Microsoft Defender for Cloud Recommendation is created or triggered** - If your logic app relies on a recommendation that gets deprecated or replaced, your automation will stop working and you'll need to update the trigger. To track changes to recommendations, use the [release notes](release-notes.md).
81+
- **When a Microsoft Defender for Cloud Recommendation is created or triggered** - If your logic app relies on a recommendation that gets deprecated or replaced, your automation stops working and you need to update the trigger. To track changes to recommendations, use the [release notes](release-notes.md).
8282
8383
- **When a Defender for Cloud Alert is created or triggered** - You can customize the trigger so that it relates only to alerts with the severity levels that interest you.
8484
8585
- **When a Defender for Cloud regulatory compliance assessment is created or triggered** - Trigger automations based on updates to regulatory compliance assessments.
8686
8787
> [!NOTE]
88-
> If you are using the legacy trigger "When a response to a Microsoft Defender for Cloud alert is triggered", your logic apps will not be launched by the Workflow Automation feature. Instead, use either of the triggers mentioned above.
88+
> If you're using the legacy trigger **When a response to a Microsoft Defender for Cloud alert is triggered**, your logic apps won't be launched by the Workflow Automation feature. Instead, use either of the triggers mentioned above.
8989
steps:
9090
- |
9191
After you've defined your logic app, return to the workflow automation definition pane ("Add workflow automation").

0 commit comments

Comments
 (0)