Skip to content

Commit f07d9aa

Browse files
committed
Formatting
1 parent f29886f commit f07d9aa

11 files changed

+11
-11
lines changed

articles/security/benchmarks/security-control-data-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,4 +127,4 @@ Use Azure Monitor with the Azure Activity Log to create alerts for when changes
127127

128128
## Next Steps
129129

130-
See the next Security Control: [Vulnerability Management](security-control-vulnerability-management.md)
130+
- See the next Security Control: [Vulnerability Management](security-control-vulnerability-management.md)

articles/security/benchmarks/security-control-data-recovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,4 +67,4 @@ Enable Soft-Delete and purge protection in Key Vault to protect keys against acc
6767

6868
## Next Steps
6969

70-
See the next Security Control: [Incident Response](security-control-incident-response.md)
70+
- See the next Security Control: [Incident Response](security-control-incident-response.md)

articles/security/benchmarks/security-control-identity-access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,4 +163,4 @@ In support scenarios where Microsoft needs to access customer data, Customer Loc
163163

164164
## Next Steps
165165

166-
See the next Security Control: [Data Protection](security-control-data-protection.md)
166+
- See the next Security Control: [Data Protection](security-control-data-protection.md)

articles/security/benchmarks/security-control-incident-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,4 +87,4 @@ Use the Workflow Automation feature in Azure Security Center to automatically tr
8787

8888
## Next Steps
8989

90-
See the next Security Control: [Penetration Tests and Red Team Exercises](security-control-penetration-tests-red-team-exercises.md)
90+
- See the next Security Control: [Penetration Tests and Red Team Exercises](security-control-penetration-tests-red-team-exercises.md)

articles/security/benchmarks/security-control-inventory-asset-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,4 +171,4 @@ Software that is required for business operations, but may incur higher risk for
171171

172172
## Next Steps
173173

174-
See the next Security Control: [Secure Configuration](security-control-secure-configuration.md)
174+
- See the next Security Control: [Secure Configuration](security-control-secure-configuration.md)

articles/security/benchmarks/security-control-logging-monitoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,4 +151,4 @@ Use Microsoft Monitoring Agent on all supported Azure Windows virtual machines t
151151

152152
## Next Steps
153153

154-
See the next Security Control: [Identity and Access Control](security-control-identity-access-control.md)
154+
- See the next Security Control: [Identity and Access Control](security-control-identity-access-control.md)

articles/security/benchmarks/security-control-malware-defense.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,4 +55,4 @@ Microsoft Antimalware will automatically install the latest signatures and engin
5555

5656
## Next Steps
5757

58-
See the next Security Control: [Data Recovery](security-control-data-recovery.md)
58+
- See the next Security Control: [Data Recovery](security-control-data-recovery.md)

articles/security/benchmarks/security-control-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,4 +184,4 @@ Use Azure Activity Log to monitor resource configurations and detect changes to
184184

185185
## Next Steps
186186

187-
See the next Security Control: [Logging and Monitoring](security-control-logging-monitoring.md)
187+
- See the next Security Control: [Logging and Monitoring](security-control-logging-monitoring.md)

articles/security/benchmarks/security-control-penetration-tests-red-team-exercises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,4 +29,4 @@ Follow the Microsoft Rules of Engagement to ensure your Penetration Tests are no
2929

3030
## Next Steps
3131

32-
Return to the [Azure Security Benchmark overview](overview.md)
32+
- Return to the [Azure Security Benchmark overview](overview.md)

articles/security/benchmarks/security-control-secure-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,4 +195,4 @@ Implement Credential Scanner to identify credentials within code. Credential Sca
195195

196196
## Next Steps
197197

198-
See the next Security Control: [Malware Defense](security-control-malware-defense.md)
198+
- See the next Security Control: [Malware Defense](security-control-malware-defense.md)

0 commit comments

Comments
 (0)