Skip to content

Commit ebfc56d

Browse files
author
David Curwin
committed
Next step
1 parent ef37ef2 commit ebfc56d

7 files changed

+7
-7
lines changed

articles/defender-for-cloud/adaptive-application-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,6 @@ No enforcement options are currently available. Adaptive application controls ar
3737
|Required roles and permissions:|**Security Reader** and **Reader** roles can both view groups and the lists of known-safe applications<br>**Contributor** and **Security Admin** roles can both edit groups and the lists of known-safe applications|
3838
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Microsoft Azure operated by 21Vianet)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts|
3939

40-
## Next steps
40+
## Next step
4141

4242
[Enable adaptive application controls](enable-adaptive-application-controls.md)

articles/defender-for-cloud/advanced-configurations-for-malware-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,6 @@ Request Body:
194194
195195
Make sure you add the parameter `overrideSubscriptionLevelSettings` and its value is set to **true**. This ensures that the settings are saved only for this storage account and will not be overrun by the subscription settings.
196196
197-
## Next steps
197+
## Next step
198198
199199
Learn more about [malware scanning settings](defender-for-storage-malware-scan.md).

articles/defender-for-cloud/agentless-malware-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,6 @@ If you believe a file is being incorrectly detected as malware (false positive),
5454

5555
Defender for Cloud allows you to [suppress false positive alerts](alerts-suppression-rules.md). Make sure to limit the suppression rule by using the malware name or file hash.
5656

57-
## Next steps
57+
## Next step
5858

5959
Learn more about how to [Enable agentless scanning for VMs](enable-agentless-scanning-vms.md).

articles/defender-for-cloud/alerts-suppression-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ The relevant HTTP methods for suppression rules in the REST API are:
9797

9898
For details and usage examples, see the [API documentation](/rest/api/defenderforcloud/operation-groups?view=rest-defenderforcloud-2020-01-01&preserve-view=true).
9999

100-
## Next steps
100+
## Next step
101101

102102
This article described the suppression rules in Microsoft Defender for Cloud that automatically dismiss unwanted alerts.
103103

articles/defender-for-cloud/concept-data-security-posture-prepare.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,6 @@ AWS:
138138
> - Exposure rules that include 0.0.0.0/0 are considered “excessively exposed”, meaning that they can be accessed from any public IP.
139139
> - Azure resources with the exposure rule “0.0.0.0” are accessible from any resource in Azure (regardless of tenant or subscription).
140140
141-
## Next steps
141+
## Next step
142142

143143
[Enable](data-security-posture-enable.md) data-aware security posture.

articles/defender-for-cloud/concept-defender-for-cosmos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Threat intelligence security alerts are triggered for:
5252
- **Suspicious database activity**: <br>
5353
For example, suspicious key-listing patterns that resemble known malicious lateral movement techniques and suspicious data extraction patterns.
5454

55-
## Next steps
55+
## Next step
5656

5757
In this article, you learned about Microsoft Defender for Azure Cosmos DB.
5858

articles/defender-for-cloud/concept-integration-365.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,6 @@ Customers who integrated their Microsoft 365 Defender incidents into Sentinel an
4949

5050
Learn how [Defender for Cloud and Microsoft 365 Defender handle your data's privacy](data-security.md#defender-for-cloud-and-microsoft-defender-365-defender-integration).
5151

52-
## Next steps
52+
## Next step
5353

5454
[Security alerts - a reference guide](alerts-reference.md)

0 commit comments

Comments
 (0)